Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/iacr/iacr2011.bht:"
@article{DBLP:journals/iacr/AbazariS11, author = {Farzaneh Abazari and Babak Sadeghian}, title = {Cryptanalysis with Ternary Difference: Applied to Block Cipher {PRESENT}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {22}, year = {2011}, url = {http://eprint.iacr.org/2011/022}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbazariS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbbasiA11, author = {Imran Abbasi and Mehreen Afzal}, title = {A Compact S-Box Design for {SMS4} Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {522}, year = {2011}, url = {http://eprint.iacr.org/2011/522}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbbasiA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdelraheemBNVZ11, author = {Mohamed Ahmed Abdelraheem and C{\'{e}}line Blondeau and Mar{\'{\i}}a Naya{-}Plasencia and Marion Videau and Erik Zenner}, title = {Cryptanalysis of {ARMADILLO2}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {160}, year = {2011}, url = {http://eprint.iacr.org/2011/160}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdelraheemBNVZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdelraheemBZ11, author = {Mohamed Ahmed Abdelraheem and Julia Borghoff and Erik Zenner}, title = {Cryptanalysis of the Light-Weight Cipher {A2U2} - Reduced draft version}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {262}, year = {2011}, url = {http://eprint.iacr.org/2011/262}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdelraheemBZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AcarLNS11, author = {Tolga Acar and Kristin E. Lauter and Michael Naehrig and Daniel Shumow}, title = {Affine Pairings on {ARM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {243}, year = {2011}, url = {http://eprint.iacr.org/2011/243}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AcarLNS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalBVVW11, author = {Shweta Agrawal and Xavier Boyen and Vinod Vaikuntanathan and Panagiotis Voulgaris and Hoeteck Wee}, title = {Fuzzy Identity Based Encryption from Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {414}, year = {2011}, url = {http://eprint.iacr.org/2011/414}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalBVVW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalFV11, author = {Shweta Agrawal and David Mandell Freeman and Vinod Vaikuntanathan}, title = {Functional Encryption for Inner Product Predicates from Learning with Errors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {410}, year = {2011}, url = {http://eprint.iacr.org/2011/410}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalFV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalMS11, author = {Shashank Agrawal and Abhinav Mehta and Kannan Srinathan}, title = {Secure Message Transmission In Asynchronous Directed Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {13}, year = {2011}, url = {http://eprint.iacr.org/2011/013}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalMS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalMS11a, author = {Shashank Agrawal and Abhinav Mehta and Kannan Srinathan}, title = {Unconditionally Reliable Message Transmission in Directed Neighbour Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {14}, year = {2011}, url = {http://eprint.iacr.org/2011/014}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalMS11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Agren11, author = {Martin {\AA}gren}, title = {Some Instant- and Practical-Time Related-Key Attacks on {KTANTAN32/48/64}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {140}, year = {2011}, url = {http://eprint.iacr.org/2011/140}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Agren11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrenJ11, author = {Martin {\AA}gren and Thomas Johansson}, title = {Linear Cryptanalysis of PRINTcipher - Trails and Samples Everywhere}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {423}, year = {2011}, url = {http://eprint.iacr.org/2011/423}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrenJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AhmadLSS11, author = {Junaid Jameel Ahmad and Shujun Li and Ahmad{-}Reza Sadeghi and Thomas Schneider}, title = {{CTL:} {A} Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {679}, year = {2011}, url = {http://eprint.iacr.org/2011/679}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AhmadLSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AhmadiG11, author = {Omran Ahmadi and Robert Granger}, title = {On isogeny classes of Edwards curves over finite fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {135}, year = {2011}, url = {http://eprint.iacr.org/2011/135}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AhmadiG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AhmadiG11a, author = {Omran Ahmadi and Robert Granger}, title = {An efficient deterministic test for Kloosterman sum zeros}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {199}, year = {2011}, url = {http://eprint.iacr.org/2011/199}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AhmadiG11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AhmadiS11, author = {Hadi Ahmadi and Reihaneh Safavi{-}Naini}, title = {Secret Keys from Channel Noise}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {63}, year = {2011}, url = {http://eprint.iacr.org/2011/063}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AhmadiS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AhmadiS11a, author = {Hadi Ahmadi and Reihaneh Safavi{-}Naini}, title = {Common Randomness and Secret Key Capacities of Two-way Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {106}, year = {2011}, url = {http://eprint.iacr.org/2011/106}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AhmadiS11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AhmedJZ11, author = {Naveed Ahmed and Christian Damsgaard Jensen and Erik Zenner}, title = {Private-key Symbolic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {564}, year = {2011}, url = {http://eprint.iacr.org/2011/564}, timestamp = {Fri, 19 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AhmedJZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AhnBCHSW11, author = {Jae Hyun Ahn and Dan Boneh and Jan Camenisch and Susan Hohenberger and Abhi Shelat and Brent Waters}, title = {Computing on Authenticated Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {96}, year = {2011}, url = {http://eprint.iacr.org/2011/096}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AhnBCHSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Aimani11, author = {Laila El Aimani}, title = {Generic Constructions for Verifiable Signcryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {592}, year = {2011}, url = {http://eprint.iacr.org/2011/592}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Aimani11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AkinyeleGR11, author = {Joseph A. Akinyele and Matthew Green and Aviel D. Rubin}, title = {Charm: {A} framework for Rapidly Prototyping Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {617}, year = {2011}, url = {http://eprint.iacr.org/2011/617}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AkinyeleGR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Al-KuwariDB11, author = {Saif Al{-}Kuwari and James H. Davenport and Russell J. Bradford}, title = {Cryptographic Hash Functions: Recent Design Trends and Security Notions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {565}, year = {2011}, url = {http://eprint.iacr.org/2011/565}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Al-KuwariDB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbrechtC11, author = {Martin R. Albrecht and Carlos Cid}, title = {Cold Boot Key Recovery by Solving Polynomial Systems with Noise}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {38}, year = {2011}, url = {http://eprint.iacr.org/2011/038}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbrechtC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbrechtCFP11, author = {Martin R. Albrecht and Carlos Cid and Jean{-}Charles Faug{\`{e}}re and Ludovic Perret}, title = {On the Relation Between the Mutant Strategy and the Normal Selection Strategy in Gr{\"{o}}bner Basis Algorithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {164}, year = {2011}, url = {http://eprint.iacr.org/2011/164}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbrechtCFP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbrechtFFP11, author = {Martin R. Albrecht and Pooya Farshim and Jean{-}Charles Faug{\`{e}}re and Ludovic Perret}, title = {Polly Cracker, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {289}, year = {2011}, url = {http://eprint.iacr.org/2011/289}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbrechtFFP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbrechtFPW11, author = {Martin R. Albrecht and Pooya Farshim and Kenneth G. Paterson and Gaven J. Watson}, title = {On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {213}, year = {2011}, url = {http://eprint.iacr.org/2011/213}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbrechtFPW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlekseychukK11, author = {A. N. Alekseychuk and L. V. Kovalchuk}, title = {Towards a Theory of Security Evaluation for GOST-like Ciphers against Differential and Linear Cryptanalysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {489}, year = {2011}, url = {http://eprint.iacr.org/2011/489}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlekseychukK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlizadehM11, author = {Javad Alizadeh and Abdolrasoul Mirghadri}, title = {A New Distinguisher for CubeHash-8/b and CubeHash-15/b Compression Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {550}, year = {2011}, url = {http://eprint.iacr.org/2011/550}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlizadehM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlwenKMZ11, author = {Jo{\"{e}}l Alwen and Jonathan Katz and Ueli Maurer and Vassilis Zikas}, title = {Collusion-Preserving Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {433}, year = {2011}, url = {http://eprint.iacr.org/2011/433}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlwenKMZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AmarilliMNPRT11, author = {Antoine Amarilli and Sascha M{\"{u}}ller and David Naccache and Daniel Page and Pablo Rauzy and Michael Tunstall}, title = {Can Code Polymorphism Limit Information Leakage?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {99}, year = {2011}, url = {http://eprint.iacr.org/2011/099}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AmarilliMNPRT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AmarilliNRS11, author = {Antoine Amarilli and David Naccache and Pablo Rauzy and Emil Simion}, title = {Can a Program Reverse-Engineer Itself?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {497}, year = {2011}, url = {http://eprint.iacr.org/2011/497}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AmarilliNRS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AndreevaLM11, author = {Elena Andreeva and Atul Luykx and Bart Mennink}, title = {Provable Security of {BLAKE} with Non-Ideal Compression Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {620}, year = {2011}, url = {http://eprint.iacr.org/2011/620}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AndreevaLM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AndreevaMP11, author = {Elena Andreeva and Bart Mennink and Bart Preneel}, title = {The Parazoa Family: Generalizing the Sponge Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {28}, year = {2011}, url = {http://eprint.iacr.org/2011/028}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AndreevaMP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AouinatouB11, author = {Rkia Aouinatou and Mostafa Belkasmi}, title = {Identification Based Encryption with {RSA-OAEP.} Using {SEM} and Without}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {684}, year = {2011}, url = {http://eprint.iacr.org/2011/684}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AouinatouB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ApplebaumBR11, author = {Benny Applebaum and Andrej Bogdanov and Alon Rosen}, title = {A Dichotomy for Local Small-Bias Generators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {512}, year = {2011}, url = {http://eprint.iacr.org/2011/512}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ApplebaumBR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AriffinAA11, author = {Muhammad Rezal Kamel Ariffin and M. A. Asbullah and Nor Azman Abu}, title = {Security Features of an Asymmetric Cryptosystem based on the Diophantine Equation Discrete Log Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {467}, year = {2011}, url = {http://eprint.iacr.org/2011/467}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AriffinAA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Arita11, author = {Seiko Arita}, title = {A constant-round resettably-sound resettable zero-knowledge argument in the {BPK} model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {404}, year = {2011}, url = {http://eprint.iacr.org/2011/404}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Arita11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArmknechtAPS11, author = {Frederik Armknecht and Daniel Augot and Ludovic Perret and Ahmad{-}Reza Sadeghi}, title = {On Constructing Homomorphic Encryption Schemes from Coding Theory}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {309}, year = {2011}, url = {http://eprint.iacr.org/2011/309}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArmknechtAPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AsharovCH11, author = {Gilad Asharov and Ran Canetti and Carmit Hazay}, title = {Towards a Game Theoretic View of Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {137}, year = {2011}, url = {http://eprint.iacr.org/2011/137}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AsharovCH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AsharovJW11, author = {Gilad Asharov and Abhishek Jain and Daniel Wichs}, title = {Multiparty Computation with Low Communication, Computation and Interaction via Threshold {FHE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {613}, year = {2011}, url = {http://eprint.iacr.org/2011/613}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AsharovJW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AsharovL11, author = {Gilad Asharov and Yehuda Lindell}, title = {A Full Proof of the {BGW} Protocol for Perfectly-Secure Multiparty Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {136}, year = {2011}, url = {http://eprint.iacr.org/2011/136}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AsharovL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AvoineC11, author = {Gildas Avoine and Xavier Carpent}, title = {Yet Another Ultralightweight Authentication Protocol that is Broken}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {691}, year = {2011}, url = {http://eprint.iacr.org/2011/691}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AvoineC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BabaKT11, author = {Srinath Baba and Srinivas Kotyad and Raghu Teja}, title = {A non-Abelian factorization problem and an associated cryptosystem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {48}, year = {2011}, url = {http://eprint.iacr.org/2011/048}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BabaKT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesGKM11, author = {Michael Backes and Ian Goldberg and Aniket Kate and Esfandiar Mohammadi}, title = {Provably Secure and Practical Onion Routing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {308}, year = {2011}, url = {http://eprint.iacr.org/2011/308}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesGKM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesKP11, author = {Michael Backes and Aniket Kate and Arpita Patra}, title = {Computational Verifiable Secret Sharing Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {281}, year = {2011}, url = {http://eprint.iacr.org/2011/281}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesKP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BagheriSNS11, author = {Nasour Bagheri and Masoumeh Safkhani and Majid Naderi and Somitra Kumar Sanadhya}, title = {Security Analysis of LMAP\({}^{\mbox{++}}\), an {RFID} Authentication Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {193}, year = {2011}, url = {http://eprint.iacr.org/2011/193}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BagheriSNS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaiL11, author = {Dongxia Bai and Leibo Li}, title = {New Impossible Differential Attacks on Camellia}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {661}, year = {2011}, url = {http://eprint.iacr.org/2011/661}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaiL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BainMSSZ11, author = {Alex Bain and John C. Mitchell and Rahul Sharma and Deian Stefan and Joe Zimmerman}, title = {A Domain-Specific Language for Computing on Encrypted Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {561}, year = {2011}, url = {http://eprint.iacr.org/2011/561}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BainMSSZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Balamohan11, author = {Balasingham Balamohan}, title = {{ACCELERATING} {THE} {SCALAR} {MULTIPLICATION} {ON} {GENUS} 2 {HYPERELLIPTIC} {CURVE} {CRYPTOSYSTEMS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {578}, year = {2011}, url = {http://eprint.iacr.org/2011/578}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Balamohan11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BanerjeePR11, author = {Abhishek Banerjee and Chris Peikert and Alon Rosen}, title = {Pseudorandom Functions and Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {401}, year = {2011}, url = {http://eprint.iacr.org/2011/401}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BanerjeePR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarakDKPPSY11, author = {Boaz Barak and Yevgeniy Dodis and Hugo Krawczyk and Olivier Pereira and Krzysztof Pietrzak and Fran{\c{c}}ois{-}Xavier Standaert and Yu Yu}, title = {Leftover Hash Lemma, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {88}, year = {2011}, url = {http://eprint.iacr.org/2011/088}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarakDKPPSY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarbosaF11, author = {Manuel Barbosa and Pooya Farshim}, title = {Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {215}, year = {2011}, url = {http://eprint.iacr.org/2011/215}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarbosaF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BargK11, author = {Alexander Barg and Grigory Kabatiansky}, title = {Robust parent-identifying codes and combinatorial arrays}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {227}, year = {2011}, url = {http://eprint.iacr.org/2011/227}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BargK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarretoLM11, author = {Paulo S. L. M. Barreto and Richard Lindner and Rafael Misoczki}, title = {Monoidic Codes in Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {371}, year = {2011}, url = {http://eprint.iacr.org/2011/371}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarretoLM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarsoumH11, author = {Ayad F. Barsoum and M. Anwar Hasan}, title = {On Verifying Dynamic Multiple Data Copies over Cloud Servers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {447}, year = {2011}, url = {http://eprint.iacr.org/2011/447}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarsoumH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BartheK11, author = {Gilles Barthe and Boris K{\"{o}}pf}, title = {Information-theoretic Bounds for Differentially Private Mechanisms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {71}, year = {2011}, url = {http://eprint.iacr.org/2011/071}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BartheK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaumslagFNSS11, author = {Gilbert Baumslag and Nelly Fazio and Antonio Nicolosi and Vladimir Shpilrain and William E. Skeith III}, title = {Generalized Learning Problems and Applications to Non-Commutative Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {357}, year = {2011}, url = {http://eprint.iacr.org/2011/357}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaumslagFNSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeckerCJ11, author = {Anja Becker and Jean{-}S{\'{e}}bastien Coron and Antoine Joux}, title = {Improved Generic Algorithms for Hard Knapsacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {474}, year = {2011}, url = {http://eprint.iacr.org/2011/474}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeckerCJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareCK11, author = {Mihir Bellare and David Cash and Sriram Keelveedhi}, title = {Ciphers that Securely Encipher their own Keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {432}, year = {2011}, url = {http://eprint.iacr.org/2011/432}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareCK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareCM11, author = {Mihir Bellare and David Cash and Rachel Miller}, title = {Cryptography Secure Against Related-Key Attacks and Tampering}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {252}, year = {2011}, url = {http://eprint.iacr.org/2011/252}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareCM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareDWY11, author = {Mihir Bellare and Rafael Dowsley and Brent Waters and Scott Yilek}, title = {Standard Security Does Not Imply Security Against Selective-Opening}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {581}, year = {2011}, url = {http://eprint.iacr.org/2011/581}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareDWY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareK11, author = {Mihir Bellare and Sriram Keelveedhi}, title = {Authenticated and Misuse-Resistant Encryption of Key-Dependent Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {269}, year = {2011}, url = {http://eprint.iacr.org/2011/269}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareKPW11, author = {Mihir Bellare and Eike Kiltz and Chris Peikert and Brent Waters}, title = {Identity-Based (Lossy) Trapdoor Functions and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {479}, year = {2011}, url = {http://eprint.iacr.org/2011/479}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareKPW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ben-SassonFO11, author = {Eli Ben{-}Sasson and Serge Fehr and Rafail Ostrovsky}, title = {Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {629}, year = {2011}, url = {http://eprint.iacr.org/2011/629}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ben-SassonFO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenabbasGV11, author = {Siavosh Benabbas and Rosario Gennaro and Yevgeniy Vahlis}, title = {Verifiable Delegation of Computation over Large Datasets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {132}, year = {2011}, url = {http://eprint.iacr.org/2011/132}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenabbasGV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BendlinNNO11, author = {Rikke Bendlin and Jesper Buus Nielsen and Peter Sebastian Nordholt and Claudio Orlandi}, title = {Lower and Upper Bounds for Deniable Public-Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {46}, year = {2011}, url = {http://eprint.iacr.org/2011/046}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BendlinNNO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernhardFGSW11, author = {David Bernhard and Georg Fuchsbauer and Essam Ghadafi and Nigel P. Smart and Bogdan Warinschi}, title = {Anonymous attestation with user-controlled linkability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {658}, year = {2011}, url = {http://eprint.iacr.org/2011/658}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernhardFGSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinDLSY11, author = {Daniel J. Bernstein and Niels Duif and Tanja Lange and Peter Schwabe and Bo{-}Yin Yang}, title = {High-speed high-security signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {368}, year = {2011}, url = {http://eprint.iacr.org/2011/368}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinDLSY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinLP11, author = {Daniel J. Bernstein and Tanja Lange and Christiane Peters}, title = {Wild McEliece Incognito}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {502}, year = {2011}, url = {http://eprint.iacr.org/2011/502}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinLP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinLPS11, author = {Daniel J. Bernstein and Tanja Lange and Christiane Peters and Peter Schwabe}, title = {Really fast syndrome-based hashing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {74}, year = {2011}, url = {http://eprint.iacr.org/2011/074}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinLPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinLPS11a, author = {Daniel J. Bernstein and Tanja Lange and Christiane Peters and Peter Schwabe}, title = {Faster 2-regular information-set decoding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {120}, year = {2011}, url = {http://eprint.iacr.org/2011/120}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinLPS11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinLS11, author = {Daniel J. Bernstein and Tanja Lange and Peter Schwabe}, title = {On the correct use of the negation map in the Pollard rho method}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {3}, year = {2011}, url = {http://eprint.iacr.org/2011/003}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinLS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinLS11a, author = {Daniel J. Bernstein and Tanja Lange and Peter Schwabe}, title = {The security impact of a new cryptographic library}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {646}, year = {2011}, url = {http://eprint.iacr.org/2011/646}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinLS11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BertoniDPA11, author = {Guido Bertoni and Joan Daemen and Micha{\"{e}}l Peeters and Gilles Van Assche}, title = {Duplexing the sponge: single-pass authenticated encryption and other applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {499}, year = {2011}, url = {http://eprint.iacr.org/2011/499}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BertoniDPA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BettaleFP11, author = {Luk Bettale and Jean{-}Charles Faug{\`{e}}re and Ludovic Perret}, title = {Cryptanalysis of HFE, Multi-HFE and Variants for Odd and Even Characteristic}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {399}, year = {2011}, url = {http://eprint.iacr.org/2011/399}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BettaleFP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeuchatOY11, author = {Jean{-}Luc Beuchat and Eiji Okamoto and Teppei Yamazaki}, title = {A Low-Area Unified Hardware Architecture for the {AES} and the Cryptographic Hash Function {ECHO}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {78}, year = {2011}, url = {http://eprint.iacr.org/2011/078}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeuchatOY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeyeV11, author = {Michael Beye and Thijs Veugen}, title = {Improved Anonymity for Key-Trees}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {395}, year = {2011}, url = {http://eprint.iacr.org/2011/395}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeyeV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhaskarBGLT11, author = {Raghav Bhaskar and Abhishek Bhowmick and Vipul Goyal and Srivatsan Laxman and Abhradeep Thakurta}, title = {Noiseless Database Privacy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {487}, year = {2011}, url = {http://eprint.iacr.org/2011/487}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BhaskarBGLT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhattacherjeeS11, author = {Sanjay Bhattacherjee and Palash Sarkar}, title = {Complete Tree Subset Difference Broadcast Encryption Scheme and its Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {480}, year = {2011}, url = {http://eprint.iacr.org/2011/480}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BhattacherjeeS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BiC11, author = {Jingguo Bi and Qi Cheng}, title = {Lower bounds of shortest vector lengths in random knapsack lattices and random {NTRU} lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {153}, year = {2011}, url = {http://eprint.iacr.org/2011/153}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BiC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BihamDKS11, author = {Eli Biham and Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {New Data-Efficient Attacks on Reduced-Round {IDEA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {417}, year = {2011}, url = {http://eprint.iacr.org/2011/417}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BihamDKS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BirknerLS11, author = {Peter Birkner and Patrick Longa and Francesco Sica}, title = {Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {608}, year = {2011}, url = {http://eprint.iacr.org/2011/608}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BirknerLS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BiryukovG11, author = {Alex Biryukov and Johann Gro{\ss}sch{\"{a}}dl}, title = {Cryptanalysis of the Full {AES} Using GPU-Like Special-Purpose Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {710}, year = {2011}, url = {http://eprint.iacr.org/2011/710}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BiryukovG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BiryukovKZ11, author = {Alex Biryukov and Ilya Kizhvatov and Bin Zhang}, title = {Cryptanalysis of The Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {707}, year = {2011}, url = {http://eprint.iacr.org/2011/707}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BiryukovKZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bisson11, author = {Gaetan Bisson}, title = {Computing endomorphism rings of elliptic curves under the {GRH}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {42}, year = {2011}, url = {http://eprint.iacr.org/2011/042}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bisson11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BissonS11, author = {Gaetan Bisson and Andrew V. Sutherland}, title = {A low-memory algorithm for finding short product representations in finite groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {4}, year = {2011}, url = {http://eprint.iacr.org/2011/004}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BissonS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BitanskyCCT11, author = {Nir Bitansky and Ran Canetti and Alessandro Chiesa and Eran Tromer}, title = {From Extractable Collision Resistance to Succinct Non-Interactive Arguments of Knowledge, and Back Again}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {443}, year = {2011}, url = {http://eprint.iacr.org/2011/443}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BitanskyCCT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BitanskyCGHKR11, author = {Nir Bitansky and Ran Canetti and Shafi Goldwasser and Shai Halevi and Yael Tauman Kalai and Guy N. Rothblum}, title = {Program Obfuscation with Leaky Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {660}, year = {2011}, url = {http://eprint.iacr.org/2011/660}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BitanskyCGHKR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BitanskyCH11, author = {Nir Bitansky and Ran Canetti and Shai Halevi}, title = {Leakage Tolerant Interactive Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {204}, year = {2011}, url = {http://eprint.iacr.org/2011/204}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BitanskyCH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BitanskyP11, author = {Nir Bitansky and Omer Paneth}, title = {From Point Obfuscation To 3-round Zero-Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {493}, year = {2011}, url = {http://eprint.iacr.org/2011/493}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BitanskyP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlackburnCM11, author = {Simon R. Blackburn and Carlos Cid and Ciaran Mullan}, title = {Cryptanalysis of three matrix-based key establishment protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {73}, year = {2011}, url = {http://eprint.iacr.org/2011/073}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlackburnCM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlackburnOS11, author = {Simon R. Blackburn and Alina Ostafe and Igor E. Shparlinski}, title = {On the Distribution of the Subset Sum Pseudorandom Number Generator on Elliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {67}, year = {2011}, url = {http://eprint.iacr.org/2011/067}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlackburnOS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlantonA11, author = {Marina Blanton and Mehrdad Aliasgari}, title = {Secure Outsourced Computation of Iris Matching}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {462}, year = {2011}, url = {http://eprint.iacr.org/2011/462}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlantonA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlantonA11a, author = {Marina Blanton and Everaldo Aguiar}, title = {Private and Oblivious Set and Multiset Operations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {464}, year = {2011}, url = {http://eprint.iacr.org/2011/464}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlantonA11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlassPMO11, author = {Erik{-}Oliver Blass and Roberto Di Pietro and Refik Molva and Melek {\"{O}}nen}, title = {{PRISM} - Privacy-Preserving Search in MapReduce}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {244}, year = {2011}, url = {http://eprint.iacr.org/2011/244}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlassPMO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlomerGL11, author = {Johannes Bl{\"{o}}mer and Peter G{\"{u}}nther and Gennadij Liske}, title = {Improved Side Channel Attacks on Pairing Based Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {706}, year = {2011}, url = {http://eprint.iacr.org/2011/706}, timestamp = {Sun, 27 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlomerGL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlondeauG11, author = {C{\'{e}}line Blondeau and Beno{\^{\i}}t G{\'{e}}rard}, title = {Multiple Differential Cryptanalysis: Theory and Practice (Corrected)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {115}, year = {2011}, url = {http://eprint.iacr.org/2011/115}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlondeauG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BogdanovKLTVV11, author = {Andrey Bogdanov and Miroslav Knezevic and Gregor Leander and Deniz Toz and Kerem Varici and Ingrid Verbauwhede}, title = {{SPONGENT:} The Design Space of Lightweight Cryptographic Hashing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {697}, year = {2011}, url = {http://eprint.iacr.org/2011/697}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BogdanovKLTVV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BogdanovKR11, author = {Andrey Bogdanov and Dmitry Khovratovich and Christian Rechberger}, title = {Biclique Cryptanalysis of the Full {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {449}, year = {2011}, url = {http://eprint.iacr.org/2011/449}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BogdanovKR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BogdanovL11, author = {Andrej Bogdanov and Chin Ho Lee}, title = {Homomorphic encryption from codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {622}, year = {2011}, url = {http://eprint.iacr.org/2011/622}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BogdanovL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BogdanovR11, author = {Andrey Bogdanov and Vincent Rijmen}, title = {Zero-Correlation Linear Cryptanalysis of Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {123}, year = {2011}, url = {http://eprint.iacr.org/2011/123}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BogdanovR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BogdanovTW11, author = {Dan Bogdanov and Riivo Talviste and Jan Willemson}, title = {Deploying secure multi-party computation for financial data analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {662}, year = {2011}, url = {http://eprint.iacr.org/2011/662}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BogdanovTW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BohlHK11, author = {Florian B{\"{o}}hl and Dennis Hofheinz and Daniel Kraschewski}, title = {On definitions of selective opening security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {678}, year = {2011}, url = {http://eprint.iacr.org/2011/678}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BohlHK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehF11, author = {Dan Boneh and David Mandell Freeman}, title = {Homomorphic Signatures for Polynomial Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {18}, year = {2011}, url = {http://eprint.iacr.org/2011/018}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehSW11, author = {Dan Boneh and Gil Segev and Brent Waters}, title = {Targeted Malleability: Homomorphic Encryption for Restricted Computations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {311}, year = {2011}, url = {http://eprint.iacr.org/2011/311}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonisC11, author = {Annalisa De Bonis and Giovanni Di Crescenzo}, title = {A Group Testing Approach to Improved Corruption Localizing Hashing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {562}, year = {2011}, url = {http://eprint.iacr.org/2011/562}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonisC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosleyHN11, author = {Carl Bosley and Kristiyan Haralambiev and Antonio Nicolosi}, title = {HB\({}^{\mbox{N}}\): An HB-like protocol secure against man-in-the-middle attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {350}, year = {2011}, url = {http://eprint.iacr.org/2011/350}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosleyHN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BouillaguetFM11, author = {Charles Bouillaguet and Pierre{-}Alain Fouque and Gilles Macario{-}Rat}, title = {Practical Key-recovery For All Possible Parameters of {SFLASH}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {271}, year = {2011}, url = {http://eprint.iacr.org/2011/271}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BouillaguetFM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoumanF11, author = {Niek J. Bouman and Serge Fehr}, title = {Secure Authentication from a Weak Key, Without Leaking Information}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {34}, year = {2011}, url = {http://eprint.iacr.org/2011/034}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoumanF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BouraC11, author = {Christina Boura and Anne Canteaut}, title = {On the influence of the algebraic degree of F\({}^{\mbox{-1}}\) on the algebraic degree of {G} circ {F}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {503}, year = {2011}, url = {http://eprint.iacr.org/2011/503}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BouraC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyarP11, author = {Joan Boyar and Ren{\'{e}} Peralta}, title = {A depth-16 circuit for the {AES} S-box}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {332}, year = {2011}, url = {http://eprint.iacr.org/2011/332}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BoyarP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyleGK11, author = {Elette Boyle and Shafi Goldwasser and Yael Tauman Kalai}, title = {Leakage-Resilient Coin Tossing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {291}, year = {2011}, url = {http://eprint.iacr.org/2011/291}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyleGK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiGV11, author = {Zvika Brakerski and Craig Gentry and Vinod Vaikuntanathan}, title = {Fully Homomorphic Encryption without Bootstrapping}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {277}, year = {2011}, url = {http://eprint.iacr.org/2011/277}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiGV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiK11, author = {Zvika Brakerski and Yael Tauman Kalai}, title = {A Parallel Repetition Theorem for Leakage Resilience}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {250}, year = {2011}, url = {http://eprint.iacr.org/2011/250}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiS11, author = {Zvika Brakerski and Gil Segev}, title = {Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {209}, year = {2011}, url = {http://eprint.iacr.org/2011/209}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiV11, author = {Zvika Brakerski and Vinod Vaikuntanathan}, title = {Efficient Fully Homomorphic Encryption from (Standard) {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {344}, year = {2011}, url = {http://eprint.iacr.org/2011/344}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrierNNT11, author = {Eric Brier and David Naccache and Phong Q. Nguyen and Mehdi Tibouchi}, title = {Modulus Fault Attacks Against {RSA-CRT} Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {388}, year = {2011}, url = {http://eprint.iacr.org/2011/388}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrierNNT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BringerP11, author = {Julien Bringer and Alain Patey}, title = {Backward Unlinkability for a {VLR} Group Signature Scheme with Efficient Revocation Check}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {376}, year = {2011}, url = {http://eprint.iacr.org/2011/376}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BringerP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrogleGR11, author = {Kyle Brogle and Sharon Goldberg and Leonid Reyzin}, title = {Sequential Aggregate Signatures with Lazy Verification from Trapdoor Permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {222}, year = {2011}, url = {http://eprint.iacr.org/2011/222}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrogleGR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Brown11, author = {Daniel R. L. Brown}, title = {Identity-Based Decryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {266}, year = {2011}, url = {http://eprint.iacr.org/2011/266}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Brown11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Brown11a, author = {Daniel R. L. Brown}, title = {Formally Assessing Cryptographic Entropy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {659}, year = {2011}, url = {http://eprint.iacr.org/2011/659}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Brown11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrumleyBPV11, author = {Billy Bob Brumley and Manuel Barbosa and Dan Page and Frederik Vercauteren}, title = {Practical realisation and elimination of an ECC-related software bug attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {633}, year = {2011}, url = {http://eprint.iacr.org/2011/633}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrumleyBPV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrumleyT11, author = {Billy Bob Brumley and Nicola Tuveri}, title = {Remote Timing Attacks are Still Practical}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {232}, year = {2011}, url = {http://eprint.iacr.org/2011/232}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrumleyT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrzuskaFSK11, author = {Christina Brzuska and Marc Fischlin and Heike Schr{\"{o}}der and Stefan Katzenbeisser}, title = {Physically Uncloneable Functions in the Universal Composition Framework}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {681}, year = {2011}, url = {http://eprint.iacr.org/2011/681}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrzuskaFSK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BuchmannDEHR11, author = {Johannes Buchmann and Erik Dahmen and Sarah Ereth and Andreas H{\"{u}}lsing and Markus R{\"{u}}ckert}, title = {On the Security of the Winternitz One-Time Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {191}, year = {2011}, url = {http://eprint.iacr.org/2011/191}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BuchmannDEHR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BuchmannDH11, author = {Johannes Buchmann and Erik Dahmen and Andreas H{\"{u}}lsing}, title = {{XMSS} - {A} Practical Forward Secure Signature Scheme based on Minimal Security Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {484}, year = {2011}, url = {http://eprint.iacr.org/2011/484}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BuchmannDH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bulygin11, author = {Stanislav Bulygin}, title = {Algebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {287}, year = {2011}, url = {http://eprint.iacr.org/2011/287}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bulygin11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Cai-SenTXP11, author = {Cai{-}Sen Chen and Tao Wang and Xiaocen Chen and Ping Zhou}, title = {An Improved Trace Driven Instruction Cache Timing Attack on {RSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {557}, year = {2011}, url = {http://eprint.iacr.org/2011/557}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Cai-SenTXP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Camacho11, author = {Philippe Camacho}, title = {Optimal Data Authentication from Directed Transitive Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {439}, year = {2011}, url = {http://eprint.iacr.org/2011/439}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Camacho11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CamachoH11, author = {Philippe Camacho and Alejandro Hevia}, title = {Short Transitive Signatures for Directed Trees}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {438}, year = {2011}, url = {http://eprint.iacr.org/2011/438}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CamachoH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CamenischHKLN11, author = {Jan Camenisch and Kristiyan Haralambiev and Markulf Kohlweiss and Jorn Lapon and Vincent Naessens}, title = {Structure Preserving {CCA} Secure Encryption and Its Application to Oblivious Third Parties}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {319}, year = {2011}, url = {http://eprint.iacr.org/2011/319}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CamenischHKLN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CamenischKS11, author = {Jan Camenisch and Stephan Krenn and Victor Shoup}, title = {A Framework for Practical Universally Composable Zero-Knowledge Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {228}, year = {2011}, url = {http://eprint.iacr.org/2011/228}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CamenischKS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiRR11, author = {Ran Canetti and Ben Riva and Guy N. Rothblum}, title = {Two 1-Round Protocols for Delegation of Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {518}, year = {2011}, url = {http://eprint.iacr.org/2011/518}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiRR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CaoZZ11, author = {Zhenfu Cao and Zongyang Zhang and Yunlei Zhao}, title = {Adaptive Security of Concurrent Non-Malleable Zero-Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {621}, year = {2011}, url = {http://eprint.iacr.org/2011/621}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CaoZZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CaroIP11, author = {Angelo De Caro and Vincenzo Iovino and Giuseppe Persiano}, title = {Hidden Vector Encryption Fully Secure Against Unrestricted Queries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {546}, year = {2011}, url = {http://eprint.iacr.org/2011/546}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CaroIP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CatalanoF11, author = {Dario Catalano and Dario Fiore}, title = {Concise Vector Commitments and their Applications to Zero-Knowledge Elementary Databases}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {495}, year = {2011}, url = {http://eprint.iacr.org/2011/495}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CatalanoF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CatalanoFW11, author = {Dario Catalano and Dario Fiore and Bogdan Warinschi}, title = {Adaptive Pseudo-Free Groups and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {53}, year = {2011}, url = {http://eprint.iacr.org/2011/053}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CatalanoFW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CatalanoFW11a, author = {Dario Catalano and Dario Fiore and Bogdan Warinschi}, title = {Efficient Network Coding Signatures in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {696}, year = {2011}, url = {http://eprint.iacr.org/2011/696}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CatalanoFW11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaiFG11, author = {Qi Chai and Xinxin Fan and Guang Gong}, title = {An Ultra-Efficient Key Recovery Attack on the Lightweight Stream Cipher {A2U2}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {247}, year = {2011}, url = {http://eprint.iacr.org/2011/247}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaiFG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChakrabortyMRS11, author = {Debrup Chakraborty and Cuauhtemoc Mancillas{-}L{\'{o}}pez and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and Palash Sarkar}, title = {Efficient Hardware Implementations of {BRW} Polynomials and Tweakable Enciphering Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {161}, year = {2011}, url = {http://eprint.iacr.org/2011/161}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChakrabortyMRS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChanSS11, author = {T.{-}H. Hubert Chan and Elaine Shi and Dawn Song}, title = {Privacy-Preserving Stream Aggregation with Fault Tolerance}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {655}, year = {2011}, url = {http://eprint.iacr.org/2011/655}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChanSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChandranCV11, author = {Nishanth Chandran and Melissa Chase and Vinod Vaikuntanathan}, title = {Collusion Resistant Obfuscation and Functional Re-encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {337}, year = {2011}, url = {http://eprint.iacr.org/2011/337}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChandranCV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChangNY11, author = {Donghoon Chang and Mridul Nandi and Moti Yung}, title = {Indifferentiability of the Hash Algorithm {BLAKE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {623}, year = {2011}, url = {http://eprint.iacr.org/2011/623}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChangNY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChariJR11, author = {Suresh Chari and Charanjit S. Jutla and Arnab Roy}, title = {Universally Composable Security Analysis of OAuth v2.0}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {526}, year = {2011}, url = {http://eprint.iacr.org/2011/526}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChariJR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaseK11, author = {Melissa Chase and Seny Kamara}, title = {Structured Encryption and Controlled Disclosure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {10}, year = {2011}, url = {http://eprint.iacr.org/2011/010}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaseK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaseK11a, author = {Melissa Chase and Markulf Kohlweiss}, title = {A Domain Transformation for Structure-Preserving Signatures on Group Elements}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {342}, year = {2011}, url = {http://eprint.iacr.org/2011/342}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaseK11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaseL11, author = {Melissa Chase and Kristin E. Lauter}, title = {An Anonymous Health Care System}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {16}, year = {2011}, url = {http://eprint.iacr.org/2011/016}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaseL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChatterjeeMS11, author = {Sanjit Chatterjee and Alfred Menezes and Palash Sarkar}, title = {Another Look at Tightness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {442}, year = {2011}, url = {http://eprint.iacr.org/2011/442}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChatterjeeMS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chen11, author = {Keke Chen}, title = {On Security of the Utility Preserving {RASP} Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {614}, year = {2011}, url = {http://eprint.iacr.org/2011/614}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Chen11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chen11a, author = {Yitao Chen}, title = {Comments of an efficient and secure multi-server authentication scheme with key agreement}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {702}, year = {2011}, url = {http://eprint.iacr.org/2011/702}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Chen11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenC11, author = {Liqun Chen and Yu Chen}, title = {The n-Diffie-Hellman Problem and its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {397}, year = {2011}, url = {http://eprint.iacr.org/2011/397}, timestamp = {Fri, 06 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChenC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenCC11, author = {Yu Chen and Liqun Chen and Zhong Chen}, title = {Generic Methods to Achieve Tighter Security Reductions for a Category of {IBE} Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {90}, year = {2011}, url = {http://eprint.iacr.org/2011/090}, timestamp = {Thu, 22 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChenCC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenCLW11, author = {Yalin Chen and Jue{-}Sam Chou and Chi{-}Fong Lin and Cheng{-}Lun Wu}, title = {A Novel {RFID} Authentication Protocol based on Elliptic Curve Cryptosystem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {381}, year = {2011}, url = {http://eprint.iacr.org/2011/381}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenCLW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenCWL11, author = {Yalin Chen and Jue{-}Sam Chou and Cheng{-}Lun Wu and Chi{-}Fong Lin}, title = {Identifying Large-Scale {RFID} Tags Using Non-Cryptographic Approach}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {167}, year = {2011}, url = {http://eprint.iacr.org/2011/167}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenCWL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenCZ11, author = {Yu Chen and Liqun Chen and Zongyang Zhang}, title = {{CCA} Secure {IB-KEM} from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {593}, year = {2011}, url = {http://eprint.iacr.org/2011/593}, timestamp = {Fri, 06 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChenCZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenDLSWW11, author = {Liqun Chen and Kurt Dietrich and Hans L{\"{o}}hr and Ahmad{-}Reza Sadeghi and Christian Wachsmann and Johannes Winter}, title = {Lightweight Anonymous Authentication with {TLS} and {DAA} for Embedded Mobile Devices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {101}, year = {2011}, url = {http://eprint.iacr.org/2011/101}, timestamp = {Tue, 26 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenDLSWW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenH11, author = {Yu{-}Chi Chen and Gwoboa Horng}, title = {On the security models for certificateless signature schemes achieving level 3 security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {554}, year = {2011}, url = {http://eprint.iacr.org/2011/554}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenJYW11, author = {Jiazhe Chen and Keting Jia and Hongbo Yu and Xiaoyun Wang}, title = {New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {17}, year = {2011}, url = {http://eprint.iacr.org/2011/017}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenJYW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenLLW11, author = {Jie Chen and Hoon Wei Lim and San Ling and Huaxiong Wang}, title = {The Relation and Transformation between Hierarchical Inner Product Encryption and Spatial Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {455}, year = {2011}, url = {http://eprint.iacr.org/2011/455}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenLLW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenLLW11a, author = {Jie Chen and Hoon Wei Lim and San Ling and Huaxiong Wang}, title = {Fully Secure Spatial Encryption under Simple Assumptions with Constant-Size Ciphertexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {650}, year = {2011}, url = {http://eprint.iacr.org/2011/650}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenLLW11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenLLWN11, author = {Jie Chen and Hoon Wei Lim and San Ling and Huaxiong Wang and Khoa Nguyen}, title = {Revocable Identity-Based Encryption from Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {583}, year = {2011}, url = {http://eprint.iacr.org/2011/583}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChenLLWN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenN11, author = {Yuanmi Chen and Phong Q. Nguyen}, title = {Faster Algorithms for Approximate Common Divisors: Breaking Fully-Homomorphic-Encryption Challenges over the Integers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {436}, year = {2011}, url = {http://eprint.iacr.org/2011/436}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenTH11, author = {Yu{-}Chi Chen and Du{-}shiau Tsai and Gwoboa Horng}, title = {On the Security of a Cheating Immune Visual Secret Sharing Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {631}, year = {2011}, url = {http://eprint.iacr.org/2011/631}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenTH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenWP11, author = {Jiazhe Chen and Meiqin Wang and Bart Preneel}, title = {Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, {XTEA} and {HIGHT}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {616}, year = {2011}, url = {http://eprint.iacr.org/2011/616}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenWP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenZF11, author = {Cheng Chen and Zhenfeng Zhang and Dengguo Feng}, title = {Fully Secure (Doubly-)Spatial Encryption under Simpler Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {692}, year = {2011}, url = {http://eprint.iacr.org/2011/692}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenZF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Cheong11, author = {Kai{-}Yuen Cheong}, title = {A Survey of Cryptography Based on Physically Unclonable Objects}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {488}, year = {2011}, url = {http://eprint.iacr.org/2011/488}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Cheong11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChilikovA11, author = {Alexey A. Chilikov and Evgeny K. Alekseev}, title = {Some Words About Cryptographic Key Recognition In Data Streams}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {643}, year = {2011}, url = {http://eprint.iacr.org/2011/643}, timestamp = {Thu, 19 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChilikovA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoiHKMR11, author = {Seung Geol Choi and Kyung{-}Wook Hwang and Jonathan Katz and Tal Malkin and Dan Rubenstein}, title = {Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {257}, year = {2011}, url = {http://eprint.iacr.org/2011/257}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoiHKMR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoiKKZ11, author = {Seung Geol Choi and Jonathan Katz and Ranjit Kumaresan and Hong{-}Sheng Zhou}, title = {On the Security of the Free-XOR Technique}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {510}, year = {2011}, url = {http://eprint.iacr.org/2011/510}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoiKKZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChouCWL11, author = {Jue{-}Sam Chou and Yalin Chen and Cheng{-}Lun Wu and Chi{-}Fong Lin}, title = {An efficient {RFID} mutual authentication scheme based on {ECC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {418}, year = {2011}, url = {http://eprint.iacr.org/2011/418}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChouCWL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChouHC11, author = {Jue{-}Sam Chou and Shih{-}Che Hung and Yalin Chen}, title = {An Efficient Secure Anonymous Proxy Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {498}, year = {2011}, url = {http://eprint.iacr.org/2011/498}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChouHC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChouWC11, author = {Jue{-}Sam Chou and Cheng{-}Lun Wu and Yalin Chen}, title = {A Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {150}, year = {2011}, url = {http://eprint.iacr.org/2011/150}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChouWC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Choudhury11, author = {Ashish Choudhury}, title = {Simple and Asymptotically Optimal t-Cheater Identifiable Secret Sharing Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {330}, year = {2011}, url = {http://eprint.iacr.org/2011/330}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Choudhury11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoudhuryKP11, author = {Ashish Choudhury and Kaoru Kurosawa and Arpita Patra}, title = {Simple and Efficient Single Round Almost Perfectly Secure Message Transmission Tolerating Generalized Adversary}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {27}, year = {2011}, url = {http://eprint.iacr.org/2011/027}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoudhuryKP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoudhuryP11, author = {Ashish Choudhury and Arpita Patra}, title = {Statistical Asynchronous Weak Commitment Scheme: {A} New Primitive to Design Statistical Asynchronous Verifiable Secret Sharing Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {31}, year = {2011}, url = {http://eprint.iacr.org/2011/031}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoudhuryP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoudhuryP11a, author = {Ashish Choudhury and Arpita Patra}, title = {On the Communication Complexity of Reliable and Secure Message Transmission in Asynchronous Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {288}, year = {2011}, url = {http://eprint.iacr.org/2011/288}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoudhuryP11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoyZKHP11, author = {Jiali Choy and Aileen Zhang and Khoongming Khoo and Matt Henricksen and Axel Poschmann}, title = {{AES} Variants Secure Against Related-Key Differential and Boomerang Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {72}, year = {2011}, url = {http://eprint.iacr.org/2011/072}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoyZKHP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChungKLR11, author = {Kai{-}Min Chung and Yael Tauman Kalai and Feng{-}Hao Liu and Ran Raz}, title = {Memory Delegation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {273}, year = {2011}, url = {http://eprint.iacr.org/2011/273}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChungKLR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chunsheng11a, author = {Chunsheng Gu}, title = {Fully Homomorphic Encryption, Approximate Lattice Problem and {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {114}, year = {2011}, url = {http://eprint.iacr.org/2011/114}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Chunsheng11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chunsheng11b, author = {Chunsheng Gu}, title = {Cryptanalysis of the Smart-Vercauteren and Gentry-Halevi's Fully Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {328}, year = {2011}, url = {http://eprint.iacr.org/2011/328}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Chunsheng11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ciobotaru11, author = {Oana Ciobotaru}, title = {Comparing {UC} Security Variants}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {355}, year = {2011}, url = {http://eprint.iacr.org/2011/355}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ciobotaru11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CissS11, author = {Abdoul Aziz Ciss and Djiby Sow}, title = {On a new generalization of Huff curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {580}, year = {2011}, url = {http://eprint.iacr.org/2011/580}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CissS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CissS11a, author = {Abdoul Aziz Ciss and Djiby Sow}, title = {Randomness Extraction in finite fields F\({}_{\mbox{p\({}^{\mbox{n}}\)}}\)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {582}, year = {2011}, url = {http://eprint.iacr.org/2011/582}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CissS11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ClarkE11, author = {Jeremy Clark and Aleksander Essex}, title = {CommitCoin: Carbon Dating Commitments with Bitcoin}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {677}, year = {2011}, url = {http://eprint.iacr.org/2011/677}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ClarkE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ClarkH11, author = {Jeremy Clark and Urs Hengartner}, title = {Selections: Internet Voting with Over-the-Shoulder Coercion-Resistance}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {166}, year = {2011}, url = {http://eprint.iacr.org/2011/166}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ClarkH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CohenF11, author = {G{\'{e}}rard D. Cohen and Jean{-}Pierre Flori}, title = {On a generalized combinatorial conjecture involving addition mod 2\({}^{\mbox{k}}\)-1}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {400}, year = {2011}, url = {http://eprint.iacr.org/2011/400}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CohenF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CohnH11, author = {Henry Cohn and Nadia Heninger}, title = {Approximate common divisors via lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {437}, year = {2011}, url = {http://eprint.iacr.org/2011/437}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CohnH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronGIP11, author = {Jean{-}S{\'{e}}bastien Coron and Aline Gouget and Thomas Icart and Pascal Paillier}, title = {Supplemental Access Control {(PACE} v2): Security Analysis of {PACE} Integrated Mapping}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {58}, year = {2011}, url = {http://eprint.iacr.org/2011/058}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronGIP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronMNT11, author = {Jean{-}S{\'{e}}bastien Coron and Avradip Mandal and David Naccache and Mehdi Tibouchi}, title = {Fully Homomorphic Encryption over the Integers with Shorter Public Keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {441}, year = {2011}, url = {http://eprint.iacr.org/2011/441}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronMNT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronNT11, author = {Jean{-}S{\'{e}}bastien Coron and David Naccache and Mehdi Tibouchi}, title = {Another Look at {RSA} Signatures With Affine Padding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {57}, year = {2011}, url = {http://eprint.iacr.org/2011/057}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronNT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronNT11a, author = {Jean{-}S{\'{e}}bastien Coron and David Naccache and Mehdi Tibouchi}, title = {Optimization of Fully Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {440}, year = {2011}, url = {http://eprint.iacr.org/2011/440}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronNT11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CossetR11, author = {Romain Cosset and Damien Robert}, title = {Computing (l, l)-isogenies in polynomial time on Jacobians of genus 2 curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {143}, year = {2011}, url = {http://eprint.iacr.org/2011/143}, timestamp = {Wed, 16 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CossetR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CostelloL11, author = {Craig Costello and Kristin E. Lauter}, title = {Group Law Computations on Jacobians of Hyperelliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {306}, year = {2011}, url = {http://eprint.iacr.org/2011/306}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CostelloL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CostelloLN11, author = {Craig Costello and Kristin E. Lauter and Michael Naehrig}, title = {Attractive Subfamilies of {BLS} Curves for Implementing High-Security Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {465}, year = {2011}, url = {http://eprint.iacr.org/2011/465}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CostelloLN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Courtois11, author = {Nicolas T. Courtois}, title = {Security Evaluation of {GOST} 28147-89 In View Of International Standardisation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {211}, year = {2011}, url = {http://eprint.iacr.org/2011/211}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Courtois11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Courtois11a, author = {Nicolas T. Courtois}, title = {Algebraic Complexity Reduction and Cryptanalysis of {GOST}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {626}, year = {2011}, url = {http://eprint.iacr.org/2011/626}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Courtois11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CourtoisHM11, author = {Nicolas T. Courtois and Daniel Hulme and Theodosis Mourouzis}, title = {Solving Circuit Optimisation Problems in Cryptography and Cryptanalysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {475}, year = {2011}, url = {http://eprint.iacr.org/2011/475}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CourtoisHM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CourtoisM11, author = {Nicolas T. Courtois and Michal Misztal}, title = {Differential Cryptanalysis of {GOST}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {312}, year = {2011}, url = {http://eprint.iacr.org/2011/312}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CourtoisM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CouveignesK11, author = {Jean Marc Couveignes and Jean{-}Gabriel Kammerer}, title = {The Geometry of Flex Tangents to a Cubic Curve and its Parameterizations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {33}, year = {2011}, url = {http://eprint.iacr.org/2011/033}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CouveignesK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerDKZZ11, author = {Ronald Cramer and Ivan Damg{\aa}rd and Eike Kiltz and Sarah Zakarias and Angela Zottarel}, title = {DDH-like Assumptions Based on Extension Rings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {280}, year = {2011}, url = {http://eprint.iacr.org/2011/280}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerDKZZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerDP11, author = {Ronald Cramer and Ivan Damg{\aa}rd and Valerio Pastro}, title = {On the Amortized Complexity of Zero Knowledge Protocols for Multiplicative Relations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {301}, year = {2011}, url = {http://eprint.iacr.org/2011/301}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerDP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CremersF11, author = {Cas Cremers and Mich{\`{e}}le Feltz}, title = {One-round Strongly Secure Key Exchange with Perfect Forward Secrecy and Deniability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {300}, year = {2011}, url = {http://eprint.iacr.org/2011/300}, timestamp = {Mon, 23 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CremersF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CremersRC11, author = {Cas Cremers and Kasper Bonne Rasmussen and Srdjan Capkun}, title = {Distance Hijacking Attacks on Distance Bounding Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {129}, year = {2011}, url = {http://eprint.iacr.org/2011/129}, timestamp = {Mon, 23 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CremersRC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CristofaroDA11, author = {Emiliano De Cristofaro and Anthony Durussel and Imad Aad}, title = {Reclaiming Privacy for Smartphone Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {41}, year = {2011}, url = {http://eprint.iacr.org/2011/041}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CristofaroDA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CristofaroGT11, author = {Emiliano De Cristofaro and Paolo Gasti and Gene Tsudik}, title = {Fast and Private Computation of Set Intersection Cardinality}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {141}, year = {2011}, url = {http://eprint.iacr.org/2011/141}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CristofaroGT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CristofaroLT11, author = {Emiliano De Cristofaro and Yanbin Lu and Gene Tsudik}, title = {Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {113}, year = {2011}, url = {http://eprint.iacr.org/2011/113}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CristofaroLT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CristofaroMP11, author = {Emiliano De Cristofaro and Mark Manulis and Bertram Poettering}, title = {Private Discovery of Common Social Contacts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {26}, year = {2011}, url = {http://eprint.iacr.org/2011/026}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CristofaroMP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CristofaroSTW11, author = {Emiliano De Cristofaro and Claudio Soriente and Gene Tsudik and Andrew Williams}, title = {Hummingbird: Privacy at the time of Twitter}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {640}, year = {2011}, url = {http://eprint.iacr.org/2011/640}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CristofaroSTW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Csirmaz11, author = {L{\'{a}}szl{\'{o}} Csirmaz}, title = {Complexity of universal access structures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {375}, year = {2011}, url = {http://eprint.iacr.org/2011/375}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Csirmaz11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Csirmaz11a, author = {L{\'{a}}szl{\'{o}} Csirmaz}, title = {How to share secrets simultaneously}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {386}, year = {2011}, url = {http://eprint.iacr.org/2011/386}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Csirmaz11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CsirmazT11, author = {L{\'{a}}szl{\'{o}} Csirmaz and G{\'{a}}bor Tardos}, title = {On-line secret sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {174}, year = {2011}, url = {http://eprint.iacr.org/2011/174}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CsirmazT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledGKM11, author = {Dana Dachman{-}Soled and Rosario Gennaro and Hugo Krawczyk and Tal Malkin}, title = {Computational Extractors and Pseudorandomness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {708}, year = {2011}, url = {http://eprint.iacr.org/2011/708}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledGKM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledMRV11, author = {Dana Dachman{-}Soled and Tal Malkin and Mariana Raykova and Muthuramakrishnan Venkitasubramaniam}, title = {Adaptive and Concurrent Secure Computation from New Notions of Non-Malleability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {611}, year = {2011}, url = {http://eprint.iacr.org/2011/611}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledMRV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaemenDA11, author = {Joan Daemen and Tony Dusenge and Gilles Van Assche}, title = {Sufficient conditions for sound hashing using a truncated permutation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {459}, year = {2011}, url = {http://eprint.iacr.org/2011/459}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DaemenDA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaiL11, author = {Zhaopeng Dai and Zhuojun Liu}, title = {The Single Cycle T-functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {547}, year = {2011}, url = {http://eprint.iacr.org/2011/547}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DaiL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardFH11, author = {Ivan Damg{\aa}rd and Sebastian Faust and Carmit Hazay}, title = {Secure Two-Party Computation with Low Communication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {508}, year = {2011}, url = {http://eprint.iacr.org/2011/508}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardFH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardFNS11, author = {Ivan Damg{\aa}rd and Jakob Funder and Jesper Buus Nielsen and Louis Salvail}, title = {Superposition Attacks on Cryptographic Protocols\}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {421}, year = {2011}, url = {http://eprint.iacr.org/2011/421}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardFNS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardPSZ11, author = {Ivan Damg{\aa}rd and Valerio Pastro and Nigel P. Smart and Sarah Zakarias}, title = {Multiparty Computation from Somewhat Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {535}, year = {2011}, url = {http://eprint.iacr.org/2011/535}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardPSZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DanezisKR11, author = {George Danezis and Markulf Kohlweiss and Alfredo Rial}, title = {Differentially Private Billing with Rebates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {134}, year = {2011}, url = {http://eprint.iacr.org/2011/134}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DanezisKR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DavidNT11, author = {Bernardo Machado David and Anderson C. A. Nascimento and Rafael Tonicelli}, title = {A Framework for Secure Single Sign-On}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {246}, year = {2011}, url = {http://eprint.iacr.org/2011/246}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DavidNT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DegabrieleLPSS11, author = {Jean Paul Degabriele and Anja Lehmann and Kenneth G. Paterson and Nigel P. Smart and Mario Strefler}, title = {On the Joint Security of Encryption and Signature in {EMV}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {615}, year = {2011}, url = {http://eprint.iacr.org/2011/615}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DegabrieleLPSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DehbaouiTMSV11, author = {Amine Dehbaoui and S{\'{e}}bastien Tiran and Philippe Maurine and Fran{\c{c}}ois{-}Xavier Standaert and Nicolas Veyrat{-}Charvillon}, title = {Spectral Coherence Analysis - First Experimental Results -}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {56}, year = {2011}, url = {http://eprint.iacr.org/2011/056}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DehbaouiTMSV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DengFGLSY11, author = {Yi Deng and Dengguo Feng and Vipul Goyal and Dongdai Lin and Amit Sahai and Moti Yung}, title = {Resettable Cryptography in Constant Rounds - the Case of Zero Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {408}, year = {2011}, url = {http://eprint.iacr.org/2011/408}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DengFGLSY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ding11, author = {Jintai Ding}, title = {Inverting the Square systems is exponential}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {275}, year = {2011}, url = {http://eprint.iacr.org/2011/275}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ding11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DingK11, author = {Jintai Ding and Thorsten Kleinjung}, title = {Degree of regularity for {HFE-}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {570}, year = {2011}, url = {http://eprint.iacr.org/2011/570}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DingK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DinurDS11, author = {Itai Dinur and Orr Dunkelman and Adi Shamir}, title = {Improved Attacks on Full {GOST}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {558}, year = {2011}, url = {http://eprint.iacr.org/2011/558}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DinurDS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DinurDS11a, author = {Itai Dinur and Orr Dunkelman and Adi Shamir}, title = {New attacks on Keccak-224 and Keccak-256}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {624}, year = {2011}, url = {http://eprint.iacr.org/2011/624}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DinurDS11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DinurGPSZ11, author = {Itai Dinur and Tim G{\"{u}}neysu and Christof Paar and Adi Shamir and Ralf Zimmermann}, title = {An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {282}, year = {2011}, url = {http://eprint.iacr.org/2011/282}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DinurGPSZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisHT11, author = {Yevgeniy Dodis and Iftach Haitner and Aris Tentes}, title = {On the (In)Security of {RSA} Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {87}, year = {2011}, url = {http://eprint.iacr.org/2011/087}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisHT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisLWW11, author = {Yevgeniy Dodis and Allison B. Lewko and Brent Waters and Daniel Wichs}, title = {Storing Secrets on Continually Leaky Devices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {369}, year = {2011}, url = {http://eprint.iacr.org/2011/369}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisLWW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DogetDP11, author = {Julien Doget and Guillaume Dabosville and Emmanuel Prouff}, title = {Defeat Masking With a (Very) Few Knowledge About the Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {505}, year = {2011}, url = {http://eprint.iacr.org/2011/505}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DogetDP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DogetPRS11, author = {Julien Doget and Emmanuel Prouff and Matthieu Rivain and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Univariate Side Channel Attacks and Leakage Modeling}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {302}, year = {2011}, url = {http://eprint.iacr.org/2011/302}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DogetPRS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dorrendorf11, author = {Leo Dorrendorf}, title = {Protecting Drive Encryption Systems Against Memory Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {221}, year = {2011}, url = {http://eprint.iacr.org/2011/221}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dorrendorf11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingMMN11, author = {Nico D{\"{o}}ttling and Thilo Mie and J{\"{o}}rn M{\"{u}}ller{-}Quade and Tobias Nilges}, title = {Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {675}, year = {2011}, url = {http://eprint.iacr.org/2011/675}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingMMN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DoustiJ11, author = {Mohammad Sadeq Dousti and Rasool Jalili}, title = {Milder Definitions of Computational Approximability: The Case of Zero-Knowledge Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {514}, year = {2011}, url = {http://eprint.iacr.org/2011/514}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DoustiJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DreierK11, author = {Jannik Dreier and Florian Kerschbaum}, title = {Practical Secure and Efficient Multiparty Linear Programming Based on Problem Transformation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {108}, year = {2011}, url = {http://eprint.iacr.org/2011/108}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DreierK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DrelikhovMP11, author = {Vladimir O. Drelikhov and Grigory B. Marshalko and Alexey V. Pokrovskiy}, title = {On the security of MQ{\_}DRBG}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {548}, year = {2011}, url = {http://eprint.iacr.org/2011/548}, timestamp = {Thu, 29 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DrelikhovMP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuanL11, author = {Ming Duan and Xuejia Lai}, title = {Improved zero-sum distinguisher for full round Keccak-f permutation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {23}, year = {2011}, url = {http://eprint.iacr.org/2011/023}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuanL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dubrova11, author = {Elena Dubrova}, title = {A Scalable Method for Constructing Galois NLFSRs with Period 2\({}^{\mbox{n}}\)-1 using Cross-Join Pairs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {632}, year = {2011}, url = {http://eprint.iacr.org/2011/632}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dubrova11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DucGPW11, author = {Alexandre Duc and Jian Guo and Thomas Peyrin and Lei Wei}, title = {Unaligned Rebound Attack - Application to Keccak}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {420}, year = {2011}, url = {http://eprint.iacr.org/2011/420}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DucGPW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DucJ11, author = {Alexandre Duc and Dimitar Jetchev}, title = {Hardness of Computing Individual Bits for Pairing-based One-way Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {329}, year = {2011}, url = {http://eprint.iacr.org/2011/329}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DucJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DunkelmanKS11, author = {Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {{ALRED} Blues: New Attacks on AES-Based MAC's}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {95}, year = {2011}, url = {http://eprint.iacr.org/2011/095}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DunkelmanKS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DunkelmanKS11a, author = {Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {Minimalism in Cryptography: The Even-Mansour Scheme Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {541}, year = {2011}, url = {http://eprint.iacr.org/2011/541}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DunkelmanKS11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuquesneG11, author = {Sylvain Duquesne and Nicolas Guillermin}, title = {A {FPGA} pairing implementation using the Residue Number System}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {176}, year = {2011}, url = {http://eprint.iacr.org/2011/176}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuquesneG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DurholzFKO11, author = {Ulrich D{\"{u}}rholz and Marc Fischlin and Michael Kasper and Cristina Onete}, title = {A Formal Approach to Distance-Bounding {RFID} Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {321}, year = {2011}, url = {http://eprint.iacr.org/2011/321}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DurholzFKO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DurmuthF11, author = {Markus D{\"{u}}rmuth and David Mandell Freeman}, title = {Deniable Encryption with Negligible Detection Probability: An Interactive Construction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {66}, year = {2011}, url = {http://eprint.iacr.org/2011/066}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DurmuthF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DziembowskiF11, author = {Stefan Dziembowski and Sebastian Faust}, title = {Leakage-Resilient Cryptography From the Inner-Product Extractor}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {519}, year = {2011}, url = {http://eprint.iacr.org/2011/519}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DziembowskiF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DziembowskiKW11, author = {Stefan Dziembowski and Tomasz Kazana and Daniel Wichs}, title = {Key-Evolution Schemes Resilient to Space-Bounded Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {530}, year = {2011}, url = {http://eprint.iacr.org/2011/530}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DziembowskiKW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ElkhiyaouiBM11, author = {Kaoutar Elkhiyaoui and Erik{-}Oliver Blass and Refik Molva}, title = {{CHECKER:} On-site checking in RFID-based supply chains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {651}, year = {2011}, url = {http://eprint.iacr.org/2011/651}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ElkhiyaouiBM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EngelsSSS11, author = {Daniel W. Engels and Markku{-}Juhani O. Saarinen and Peter Schweitzer and Eric M. Smith}, title = {The Hummingbird-2 Lightweight Authenticated Encryption Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {126}, year = {2011}, url = {http://eprint.iacr.org/2011/126}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EngelsSSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EricksonJS11, author = {Stefan Erickson and Michael J. Jacobson Jr. and Andreas Stein}, title = {Explicit Formulas for Real Hyperelliptic Curves of Genus 2 in Affine Representation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {105}, year = {2011}, url = {http://eprint.iacr.org/2011/105}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EricksonJS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EscalaHM11, author = {Alex Escala and Javier Herranz and Paz Morillo}, title = {Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {52}, year = {2011}, url = {http://eprint.iacr.org/2011/052}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EscalaHM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EslamiP11, author = {Ziba Eslami and Nasrollah Pakniat}, title = {Certificateless Aggregate Signcryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {360}, year = {2011}, url = {http://eprint.iacr.org/2011/360}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EslamiP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EssexHH11, author = {Aleksander Essex and Christian Henrich and Urs Hengartner}, title = {Single Layer Optical-scan Voting with Fully Distributed Trust}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {568}, year = {2011}, url = {http://eprint.iacr.org/2011/568}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EssexHH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FarashAB11, author = {Mohammad Sabzinejad Farash and Mahmoud Ahmadian{-}Attari and Majid Bayat}, title = {Security of Multiple-Key Agreement Protocols and Propose an Enhanced Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {634}, year = {2011}, url = {http://eprint.iacr.org/2011/634}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FarashAB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FarashahiMW11, author = {Reza Rezaeian Farashahi and Dustin Moody and Hongfeng Wu}, title = {Isomorphism classes of Edwards curves over finite fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {206}, year = {2011}, url = {http://eprint.iacr.org/2011/206}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FarashahiMW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FarhatSS11, author = {Farshid Farhat and Somayeh Salimi and Ahmad Salahi}, title = {Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {45}, year = {2011}, url = {http://eprint.iacr.org/2011/045}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FarhatSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaugerePPR11, author = {Jean{-}Charles Faug{\`{e}}re and Ludovic Perret and Christophe Petit and Gu{\'{e}}na{\"{e}}l Renault}, title = {New Subexponential Algorithms for Factoring in SL(2, fq)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {598}, year = {2011}, url = {http://eprint.iacr.org/2011/598}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FaugerePPR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustPV11, author = {Sebastian Faust and Krzysztof Pietrzak and Daniele Venturi}, title = {Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {314}, year = {2011}, url = {http://eprint.iacr.org/2011/314}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaustPV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FazioINPS11, author = {Nelly Fazio and Kevin Iga and Antonio Nicolosi and Ludovic Perret and William E. Skeith III}, title = {Random Self-Reducibility Properties of Learning Problems over Burnside Groups of Exponent 3}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {398}, year = {2011}, url = {http://eprint.iacr.org/2011/398}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FazioINPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FilardoA11, author = {Nathaniel Wesley Filardo and Giuseppe Ateniese}, title = {High-Entropy Visual Identification for Touch Screen Devices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {359}, year = {2011}, url = {http://eprint.iacr.org/2011/359}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FilardoA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FischlinLS11, author = {Marc Fischlin and Anja Lehmann and Dominique Schr{\"{o}}der}, title = {History-Free Sequential Aggregate Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {231}, year = {2011}, url = {http://eprint.iacr.org/2011/231}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FischlinLS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FleischhackerGKMP11, author = {Nils Fleischhacker and Felix G{\"{u}}nther and Franziskus Kiefer and Mark Manulis and Bertram Poettering}, title = {Pseudorandom Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {673}, year = {2011}, url = {http://eprint.iacr.org/2011/673}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FleischhackerGKMP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FleischmannFL11, author = {Ewan Fleischmann and Christian Forler and Stefan Lucks and Jakob Wenzel}, title = {McOE: {A} Foolproof On-Line Authenticated Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {644}, year = {2011}, url = {http://eprint.iacr.org/2011/644}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FleischmannFL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FloriM11, author = {Jean{-}Pierre Flori and Sihem Mesnager}, title = {An efficient characterization of a family of hyperbent functions with multiple trace terms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {373}, year = {2011}, url = {http://eprint.iacr.org/2011/373}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FloriM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FloriMC11, author = {Jean{-}Pierre Flori and Sihem Mesnager and G{\'{e}}rard D. Cohen}, title = {The Value 4 of Binary Kloosterman Sums}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {364}, year = {2011}, url = {http://eprint.iacr.org/2011/364}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FloriMC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FloriR11, author = {Jean{-}Pierre Flori and Hugues Randriam}, title = {On the Number of Carries Occuring in an Addition mod 2\({}^{\mbox{k}}\)-1}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {245}, year = {2011}, url = {http://eprint.iacr.org/2011/245}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FloriR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FouqueT11, author = {Pierre{-}Alain Fouque and Mehdi Tibouchi}, title = {Close to Uniform Prime Number Generation With Fewer Random Bits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {481}, year = {2011}, url = {http://eprint.iacr.org/2011/481}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FouqueT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FrancisHMM11, author = {Lishoy Francis and Gerhard P. Hancke and Keith Mayes and Konstantinos Markantonakis}, title = {Practical Relay Attack on Contactless Transactions by Using {NFC} Mobile Phones}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {618}, year = {2011}, url = {http://eprint.iacr.org/2011/618}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FrancisHMM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargG11, author = {Manish Garg and Sugata Gangopadhyay}, title = {On lower bounds on second-order nonliearities of bent functions obtained by using Niho power functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {171}, year = {2011}, url = {http://eprint.iacr.org/2011/171}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargG11a, author = {Manish Garg and Sugata Gangopadhyay}, title = {The Good lower bound of Second-order nonlinearity of a class of Boolean function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {452}, year = {2011}, url = {http://eprint.iacr.org/2011/452}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargG11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargGJS11, author = {Sanjam Garg and Vipul Goyal and Abhishek Jain and Amit Sahai}, title = {Concurrently Secure Computation in Constant Rounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {251}, year = {2011}, url = {http://eprint.iacr.org/2011/251}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargGJS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargOVW11, author = {Sanjam Garg and Rafail Ostrovsky and Ivan Visconti and Akshay Wadia}, title = {Resettable Statistical Zero Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {457}, year = {2011}, url = {http://eprint.iacr.org/2011/457}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargOVW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaudryKS11, author = {Pierrick Gaudry and David R. Kohel and Benjamin A. Smith}, title = {Counting Points on Genus 2 Curves with Real Multiplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {295}, year = {2011}, url = {http://eprint.iacr.org/2011/295}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaudryKS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GenellePQ11, author = {Laurie Genelle and Emmanuel Prouff and Micha{\"{e}}l Quisquater}, title = {Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {425}, year = {2011}, url = {http://eprint.iacr.org/2011/425}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GenellePQ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryH11, author = {Craig Gentry and Shai Halevi}, title = {Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {279}, year = {2011}, url = {http://eprint.iacr.org/2011/279}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryHS11, author = {Craig Gentry and Shai Halevi and Nigel P. Smart}, title = {Fully Homomorphic Encryption with Polylog Overhead}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {566}, year = {2011}, url = {http://eprint.iacr.org/2011/566}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryHS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryHS11a, author = {Craig Gentry and Shai Halevi and Nigel P. Smart}, title = {Better Bootstrapping in Fully Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {680}, year = {2011}, url = {http://eprint.iacr.org/2011/680}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryHS11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ghadafi11a, author = {Essam Ghadafi}, title = {Formalizing Group Blind Signatures and Practical Constructions without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {402}, year = {2011}, url = {http://eprint.iacr.org/2011/402}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ghadafi11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhoshMC11, author = {Santosh Ghosh and Debdeep Mukhopadhyay and Dipanwita Roy Chowdhury}, title = {Security of Prime Field Pairing Cryptoprocessor Against Differential Power Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {181}, year = {2011}, url = {http://eprint.iacr.org/2011/181}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GhoshMC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gittins11, author = {Benjamin Gittins}, title = {Outline of a proposal responding to {E.U.} and {U.S.} calls for trustworthy global-scale IdM and {CKM} designs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {29}, year = {2011}, url = {http://eprint.iacr.org/2011/029}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gittins11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GligoroskiOJ11, author = {Danilo Gligoroski and Rune Steinsmo {\O}deg{\aa}rd and Rune Erlend Jensen}, title = {{OBSERVATION:} An explicit form for a class of second preimages for any message {M} for the {SHA-3} candidate Keccak}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {261}, year = {2011}, url = {http://eprint.iacr.org/2011/261}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GligoroskiOJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldwasserLR11, author = {Shafi Goldwasser and Huijia Lin and Aviad Rubinstein}, title = {Delegation of Computation without Rejection Problem from Designated Verifier CS-Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {456}, year = {2011}, url = {http://eprint.iacr.org/2011/456}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoldwasserLR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GordonKKMRV11, author = {S. Dov Gordon and Jonathan Katz and Vladimir Kolesnikov and Tal Malkin and Mariana Raykova and Yevgeniy Vahlis}, title = {Secure Computation with Sublinear Amortized Work}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {482}, year = {2011}, url = {http://eprint.iacr.org/2011/482}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GordonKKMRV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GordonKV11, author = {S. Dov Gordon and Jonathan Katz and Vinod Vaikuntanathan}, title = {A Group Signature Scheme from Lattice Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {60}, year = {2011}, url = {http://eprint.iacr.org/2011/060}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GordonKV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GorenL11, author = {Eyal Z. Goren and Kristin E. Lauter}, title = {A Gross-Zagier formula for quaternion algebras over totally real fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {666}, year = {2011}, url = {http://eprint.iacr.org/2011/666}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GorenL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GotaishiT11, author = {Masahito Gotaishi and Shigeo Tsujii}, title = {Hidden Pair of Bijection Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {353}, year = {2011}, url = {http://eprint.iacr.org/2011/353}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GotaishiT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoubinM11, author = {Louis Goubin and Ange Martinelli}, title = {Protecting {AES} with Shamir's Secret Sharing Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {516}, year = {2011}, url = {http://eprint.iacr.org/2011/516}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoubinM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Goyal11, author = {Vipul Goyal}, title = {Positive Results for Concurrently Secure Computation in the Plain Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {602}, year = {2011}, url = {http://eprint.iacr.org/2011/602}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Goyal11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalOR11, author = {Vipul Goyal and Adam O'Neill and Vanishree Rao}, title = {Correlated-Input Secure Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {233}, year = {2011}, url = {http://eprint.iacr.org/2011/233}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalOR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrangerM11, author = {Robert Granger and Andrew Moss}, title = {Generalised Mersenne Numbers Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {444}, year = {2011}, url = {http://eprint.iacr.org/2011/444}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrangerM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrechnikovA11, author = {Evgeny A. Grechnikov and Andrew V. Adinetz}, title = {Collision for 75-step {SHA-1:} Intensive Parallelization with {GPU}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {641}, year = {2011}, url = {http://eprint.iacr.org/2011/641}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrechnikovA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Green11, author = {Matthew Green}, title = {Secure Blind Decryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {109}, year = {2011}, url = {http://eprint.iacr.org/2011/109}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Green11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GroceK11, author = {Adam Groce and Jonathan Katz}, title = {Fair Computation with Rational Players}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {396}, year = {2011}, url = {http://eprint.iacr.org/2011/396}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GroceK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrossschadlP11, author = {Johann Gro{\ss}sch{\"{a}}dl and Dan Page}, title = {Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {712}, year = {2011}, url = {http://eprint.iacr.org/2011/712}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrossschadlP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Groth11, author = {Jens Groth}, title = {Minimizing Non-interactive Zero-Knowledge Proofs Using Fully Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {12}, year = {2011}, url = {http://eprint.iacr.org/2011/012}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Groth11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gu11, author = {Chunsheng Gu}, title = {New Fully Homomorphic Encryption over the Integers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {118}, year = {2011}, url = {http://eprint.iacr.org/2011/118}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gu11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gu11b, author = {Chunsheng Gu}, title = {More Practical Fully Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {121}, year = {2011}, url = {http://eprint.iacr.org/2011/121}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gu11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gu11c, author = {Chunsheng Gu}, title = {New Fully Homomorphic Encryption without Bootstrapping}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {645}, year = {2011}, url = {http://eprint.iacr.org/2011/645}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gu11c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gueron11, author = {Shay Gueron}, title = {Efficient Software Implementations of Modular Exponentiation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {239}, year = {2011}, url = {http://eprint.iacr.org/2011/239}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gueron11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GueronK11, author = {Shay Gueron and Michael E. Kounavis}, title = {Security Enhancement of the Vortex Family of Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {652}, year = {2011}, url = {http://eprint.iacr.org/2011/652}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GueronK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Guillermin11, author = {Nicolas Guillermin}, title = {A coprocessor for secure and high speed modular arithmetic}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {354}, year = {2011}, url = {http://eprint.iacr.org/2011/354}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Guillermin11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuillevicV11, author = {Aurore Guillevic and Damien Vergnaud}, title = {Genus 2 Hyperelliptic Curve Families with Explicit Jacobian Order Evaluation and Pairing-Friendly Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {604}, year = {2011}, url = {http://eprint.iacr.org/2011/604}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuillevicV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuntherMS11, author = {Felix G{\"{u}}nther and Mark Manulis and Thorsten Strufe}, title = {Cryptographic Treatment of Private User Profiles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {64}, year = {2011}, url = {http://eprint.iacr.org/2011/064}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuntherMS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoPP11, author = {Jian Guo and Thomas Peyrin and Axel Poschmann}, title = {The {PHOTON} Family of Lightweight Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {609}, year = {2011}, url = {http://eprint.iacr.org/2011/609}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoPP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Haider11, author = {Raja Zeshan Haider}, title = {Birthday Forgery Attack on 128-EIA3 Version 1.5}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {268}, year = {2011}, url = {http://eprint.iacr.org/2011/268}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Haider11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaitnerB11, author = {Iftach Haitner and Itay Berman}, title = {From Non-Adaptive to Adaptive Pseudorandom Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {504}, year = {2011}, url = {http://eprint.iacr.org/2011/504}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaitnerB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleviHPS11, author = {Shai Halevi and Danny Harnik and Benny Pinkas and Alexandra Shulman{-}Peleg}, title = {Proofs of Ownership in Remote Storage Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {207}, year = {2011}, url = {http://eprint.iacr.org/2011/207}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleviHPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleviL11, author = {Shai Halevi and Huijia Lin}, title = {After-the-Fact Leakage in Public-Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {11}, year = {2011}, url = {http://eprint.iacr.org/2011/011}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleviL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleviLP11, author = {Shai Halevi and Yehuda Lindell and Benny Pinkas}, title = {Secure Computation on the Web: Computing without Simultaneous Interaction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {157}, year = {2011}, url = {http://eprint.iacr.org/2011/157}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleviLP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hamburg11, author = {Mike Hamburg}, title = {Spatial Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {389}, year = {2011}, url = {http://eprint.iacr.org/2011/389}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hamburg11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HanleyTM11, author = {Neil Hanley and Michael Tunstall and William P. Marnane}, title = {Using Templates to Distinguish Multiplications from Squaring Operations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {236}, year = {2011}, url = {http://eprint.iacr.org/2011/236}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HanleyTM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HanrotPS11, author = {Guillaume Hanrot and Xavier Pujol and Damien Stehl{\'{e}}}, title = {Terminating {BKZ}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {198}, year = {2011}, url = {http://eprint.iacr.org/2011/198}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HanrotPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hars11, author = {Laszlo Hars}, title = {Random Number Generation Based on Oscillatory Metastability in Ring Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {637}, year = {2011}, url = {http://eprint.iacr.org/2011/637}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hars11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaustenneNP11, author = {Laurie Haustenne and Quentin De Neyer and Olivier Pereira}, title = {Elliptic Curve Cryptography in JavaScript}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {654}, year = {2011}, url = {http://eprint.iacr.org/2011/654}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaustenneNP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HazayMRT11, author = {Carmit Hazay and Gert L{\ae}ss{\o}e Mikkelsen and Tal Rabin and Tomas Toft}, title = {Efficient {RSA} Key Generation and Threshold Paillier in the Two-Party Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {494}, year = {2011}, url = {http://eprint.iacr.org/2011/494}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HazayMRT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/He11, author = {Debiao He}, title = {Comments on a secure dynamic ID-based remote user authentication scheme for multi-server environment using smart cards}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {234}, year = {2011}, url = {http://eprint.iacr.org/2011/234}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/He11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/He11a, author = {Debiao He}, title = {Cryptanalysis of a key agreement protocol based on chaotic Hash}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {333}, year = {2011}, url = {http://eprint.iacr.org/2011/333}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/He11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/He11d, author = {Debiao He}, title = {Security flaws in a biometrics-based multi-server authentication with key agreement scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {365}, year = {2011}, url = {http://eprint.iacr.org/2011/365}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/He11d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/He11e, author = {Debiao He}, title = {Comments on a password authentication and update scheme based on elliptic curve cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {411}, year = {2011}, url = {http://eprint.iacr.org/2011/411}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/He11e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeCH11, author = {Debiao He and Jianhua Chen and Jin Hu}, title = {Identity-based Digital Signature Scheme Without Bilinear Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {79}, year = {2011}, url = {http://eprint.iacr.org/2011/079}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeCH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeH11, author = {Debiao He and Jin Hu}, title = {An efficient certificateless two-party authenticated key agreement scheme from pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {112}, year = {2011}, url = {http://eprint.iacr.org/2011/112}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeP11, author = {Debiao He and Sahadeo Padhye}, title = {A Pairing-free Certificateless Authenticated Key Agreement Protocol in the eCK Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {478}, year = {2011}, url = {http://eprint.iacr.org/2011/478}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Heilman11, author = {Ethan Heilman}, title = {Restoring the Differential Resistance of {MD6}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {374}, year = {2011}, url = {http://eprint.iacr.org/2011/374}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Heilman11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HermelinN11, author = {Miia Hermelin and Kaisa Nyberg}, title = {Linear Cryptanalysis Using Multiple Linear Approximations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {93}, year = {2011}, url = {http://eprint.iacr.org/2011/093}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HermelinN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HirtLMR11, author = {Martin Hirt and Christoph Lucas and Ueli Maurer and Dominik Raub}, title = {Graceful Degradation in Multi-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {94}, year = {2011}, url = {http://eprint.iacr.org/2011/094}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HirtLMR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hofheinz11, author = {Dennis Hofheinz}, title = {All-But-Many Lossy Trapdoor Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {230}, year = {2011}, url = {http://eprint.iacr.org/2011/230}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hofheinz11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HofheinzJ11, author = {Dennis Hofheinz and Tibor Jager}, title = {Waters Signatures with Optimal Security Reduction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {703}, year = {2011}, url = {http://eprint.iacr.org/2011/703}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HofheinzJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HofheinzJK11, author = {Dennis Hofheinz and Tibor Jager and Eike Kiltz}, title = {Short Signatures From Weaker Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {296}, year = {2011}, url = {http://eprint.iacr.org/2011/296}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HofheinzJK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HofheinzK11, author = {Dennis Hofheinz and Eike Kiltz}, title = {Programmable Hash Functions and Their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {270}, year = {2011}, url = {http://eprint.iacr.org/2011/270}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HofheinzK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HofheinzS11, author = {Dennis Hofheinz and Victor Shoup}, title = {{GNUC:} {A} New Universal Composability Framework}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {303}, year = {2011}, url = {http://eprint.iacr.org/2011/303}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HofheinzS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HongKKPC11, author = {Jeongdae Hong and Jung Woo Kim and Jihye Kim and Kunsoo Park and Jung Hee Cheon}, title = {Constant-Round Privacy Preserving Multiset Union}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {138}, year = {2011}, url = {http://eprint.iacr.org/2011/138}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HongKKPC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HongLLP11, author = {Hoon Hong and Eunjeong Lee and Hyang{-}Sook Lee and Cheol{-}Min Park}, title = {Simple and Exact Formula for Minimum Loop Length in Ate\({}_{\mbox{i}}\) Pairing based on Brezing-Weng Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {40}, year = {2011}, url = {http://eprint.iacr.org/2011/040}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HongLLP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HongLM11, author = {Jin Hong and Ga Won Lee and Daegun Ma}, title = {Analysis of the Parallel Distinguished Point Tradeoff}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {387}, year = {2011}, url = {http://eprint.iacr.org/2011/387}, timestamp = {Wed, 18 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HongLM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuLX11, author = {Zhi Hu and Patrick Longa and Maozhi Xu}, title = {Implementing 4-Dimensional {GLV} Method on {GLS} Elliptic Curves with j-Invariant 0}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {315}, year = {2011}, url = {http://eprint.iacr.org/2011/315}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuLX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Huang11, author = {Hai Huang}, title = {Strongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {346}, year = {2011}, url = {http://eprint.iacr.org/2011/346}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Huang11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IonRC11, author = {Mihaela Ion and Giovanni Russello and Bruno Crispo}, title = {Supporting Publication and Subscription Confidentiality in Pub/Sub Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {25}, year = {2011}, url = {http://eprint.iacr.org/2011/025}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IonRC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JagerKSS11, author = {Tibor Jager and Florian Kohlar and Sven Sch{\"{a}}ge and J{\"{o}}rg Schwenk}, title = {A Standard-Model Security Analysis of {TLS-DHE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {219}, year = {2011}, url = {http://eprint.iacr.org/2011/219}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JagerKSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JainP11, author = {Abhishek Jain and Omkant Pandey}, title = {Non-Malleable Zero Knowledge: Black-Box Constructions and Definitional Relationships}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {513}, year = {2011}, url = {http://eprint.iacr.org/2011/513}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JainP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JaoF11, author = {David Jao and Luca De Feo}, title = {Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {506}, year = {2011}, url = {http://eprint.iacr.org/2011/506}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JaoF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JeanNS11, author = {J{\'{e}}r{\'{e}}my Jean and Mar{\'{\i}}a Naya{-}Plasencia and Martin Schl{\"{a}}ffer}, title = {Improved Analysis of {ECHO-256}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {422}, year = {2011}, url = {http://eprint.iacr.org/2011/422}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JeanNS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JiaYW11, author = {Keting Jia and Hongbo Yu and Xiaoyun Wang}, title = {A Meet-in-the-Middle Attack on the Full {KASUMI}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {466}, year = {2011}, url = {http://eprint.iacr.org/2011/466}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JiaYW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JinLW11, author = {Qingfang Jin and Zhuojun Liu and Baofeng Wu}, title = {1-Resilient Boolean Function with Optimal Algebraic Immunity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {549}, year = {2011}, url = {http://eprint.iacr.org/2011/549}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JinLW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JinLWZ11, author = {Qingfang Jin and Zhuojun Liu and Baofeng Wu and Xiaoming Zhang}, title = {A general conjecture similar to {T-D} conjecture and its applications in constructing Boolean functions with optimal algebraic immunity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {515}, year = {2011}, url = {http://eprint.iacr.org/2011/515}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JinLWZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JivanyanK11, author = {Aram Jivanyan and Gurgen Khachatryan}, title = {New Receipt-Free E-Voting Scheme and Self-Proving Mix Net as New Paradigm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {325}, year = {2011}, url = {http://eprint.iacr.org/2011/325}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JivanyanK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JonssonKU11, author = {Kristj{\'{a}}n Valur J{\'{o}}nsson and Gunnar Kreitz and Misbah Uddin}, title = {Secure Multi-Party Sorting and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {122}, year = {2011}, url = {http://eprint.iacr.org/2011/122}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JonssonKU11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JouxV11, author = {Antoine Joux and Vanessa Vitse}, title = {Cover and Decomposition Index Calculus on Elliptic Curves made practical. Application to a seemingly secure curve over F\({}_{\mbox{p\({}^{\mbox{6}}\)}}\)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {20}, year = {2011}, url = {http://eprint.iacr.org/2011/020}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JouxV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JutlaR11, author = {Charanjit S. Jutla and Arnab Roy}, title = {Relatively-Sound NIZKs and Password-Based Key-Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {507}, year = {2011}, url = {http://eprint.iacr.org/2011/507}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JutlaR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KamaraMR11, author = {Seny Kamara and Payman Mohassel and Mariana Raykova}, title = {Outsourcing Multi-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {272}, year = {2011}, url = {http://eprint.iacr.org/2011/272}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KamaraMR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KamaraR11, author = {Seny Kamara and Mariana Raykova}, title = {Parallel Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {596}, year = {2011}, url = {http://eprint.iacr.org/2011/596}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KamaraR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kaosar11, author = {Md. Golam Kaosar}, title = {Routing Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {229}, year = {2011}, url = {http://eprint.iacr.org/2011/229}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kaosar11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kar11, author = {Jayaprakash Kar}, title = {Proxy Blind Multi-signature Scheme using {ECC} for handheld devices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {43}, year = {2011}, url = {http://eprint.iacr.org/2011/043}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kar11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kasahara11, author = {Masao Kasahara}, title = {A New Class of Biometrics on the Basis of Forgotten Secret Recovering Scheme, {KSS(I)}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {124}, year = {2011}, url = {http://eprint.iacr.org/2011/124}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kasahara11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kasahara11a, author = {Masao Kasahara}, title = {A Construction of {A} New Class of Knapsack-Type Public Key Cryptosystem, K(III)Sigma {PKC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {125}, year = {2011}, url = {http://eprint.iacr.org/2011/125}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kasahara11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kasahara11b, author = {Masao Kasahara}, title = {Public Key Cryptosystems Constructed Based on Random Pseudo Cyclic Codes, K(IX)SE(1)PKC, Realizing Coding Rate of Exactly 1.0}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {545}, year = {2011}, url = {http://eprint.iacr.org/2011/545}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kasahara11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kasahara11c, author = {Masao Kasahara}, title = {A New Class of Multivariate Public Key Cryptosystems Constructed Based on Random Pseudo Cyclic Codes, K(XIII)SE(2)PKC, Realizing Coding Rate of Exactly 1.0}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {573}, year = {2011}, url = {http://eprint.iacr.org/2011/573}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kasahara11c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kasahara11d, author = {Masao Kasahara}, title = {A New Class of Multivariate Public Key Cryptosystem Constructed on the Basis of Message-Dependent Transformation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {690}, year = {2011}, url = {http://eprint.iacr.org/2011/690}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kasahara11d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KatohHCT11, author = {Yosuke Katoh and Yun{-}Ju Huang and Chen{-}Mou Cheng and Tsuyoshi Takagi}, title = {Efficient Implementation of the eta\({}_{\mbox{T}}\) Pairing on {GPU}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {540}, year = {2011}, url = {http://eprint.iacr.org/2011/540}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KatohHCT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KatzMTZ11, author = {Jonathan Katz and Ueli Maurer and Bj{\"{o}}rn Tackmann and Vassilis Zikas}, title = {Universally Composable Synchronous Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {310}, year = {2011}, url = {http://eprint.iacr.org/2011/310}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KatzMTZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KatzenbeisserKLSSSW11, author = {Stefan Katzenbeisser and {\"{U}}nal Ko{\c{c}}abas and Vincent van der Leest and Ahmad{-}Reza Sadeghi and Geert Jan Schrijen and Heike Schr{\"{o}}der and Christian Wachsmann}, title = {Recyclable PUFs: Logically Reconfigurable PUFs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {552}, year = {2011}, url = {http://eprint.iacr.org/2011/552}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KatzenbeisserKLSSSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KawachiPT11, author = {Akinori Kawachi and Christopher Portmann and Keisuke Tanaka}, title = {Characterization of the relations between information-theoretic non-malleability, secrecy, and authenticity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {92}, year = {2011}, url = {http://eprint.iacr.org/2011/092}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KawachiPT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KendallM11, author = {Michelle Kendall and Keith M. Martin}, title = {On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {555}, year = {2011}, url = {http://eprint.iacr.org/2011/555}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KendallM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhaderR11, author = {Dalia Khader and Peter Y. A. Ryan}, title = {Receipt Freeness of Pr{\^{e}}t {\`{a}} Voter Provably Secure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {594}, year = {2011}, url = {http://eprint.iacr.org/2011/594}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhaderR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhanM11, author = {Azhar Ali Khan and Ghulam Murtaza}, title = {Efficient Implementation of Grand Cru with {TI} C6x+ Processor}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {385}, year = {2011}, url = {http://eprint.iacr.org/2011/385}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhanM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhovratovichRS11, author = {Dmitry Khovratovich and Christian Rechberger and Alexandra Savelieva}, title = {Bicliques for Preimages: Attacks on Skein-512 and the {SHA-2} family}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {286}, year = {2011}, url = {http://eprint.iacr.org/2011/286}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhovratovichRS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiltzOS11, author = {Eike Kiltz and Adam O'Neill and Adam D. Smith}, title = {Instantiability of {RSA-OAEP} under Chosen-Plaintext Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {559}, year = {2011}, url = {http://eprint.iacr.org/2011/559}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiltzOS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kim11, author = {Chong Hee Kim}, title = {Differential Fault Analysis of {AES:} Toward Reducing Number of Faults}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {178}, year = {2011}, url = {http://eprint.iacr.org/2011/178}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kim11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kim11a, author = {Chong Hee Kim}, title = {Efficient Methods for Exploiting Faults Induced at {AES} Middle Rounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {349}, year = {2011}, url = {http://eprint.iacr.org/2011/349}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kim11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimJLJH11, author = {ChangKyun Kim and Eun{-}Gu Jung and Dong Hoon Lee and Chang{-}Ho Jung and Daewan Han}, title = {Cryptanalysis of INCrypt32 in HID's iCLASS Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {469}, year = {2011}, url = {http://eprint.iacr.org/2011/469}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimJLJH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimJLW11, author = {Hakhyun Kim and Woongryul Jeon and Yunho Lee and Dongho Won}, title = {Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {451}, year = {2011}, url = {http://eprint.iacr.org/2011/451}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimJLW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimLC11, author = {Myungsun Kim and Hyung Tae Lee and Jung Hee Cheon}, title = {Mutual Private Set Intersection with Linear Complexity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {267}, year = {2011}, url = {http://eprint.iacr.org/2011/267}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimLC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kirchner11, author = {Paul Kirchner}, title = {Improved Generalized Birthday Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {377}, year = {2011}, url = {http://eprint.iacr.org/2011/377}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kirchner11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KleinjungLPS11, author = {Thorsten Kleinjung and Arjen K. Lenstra and Dan Page and Nigel P. Smart}, title = {Using the Cloud to Determine Key Strengths}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {254}, year = {2011}, url = {http://eprint.iacr.org/2011/254}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KleinjungLPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Koblitz11, author = {Neal Koblitz}, title = {Another Look at Automated Theorem-Proving. {II}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {485}, year = {2011}, url = {http://eprint.iacr.org/2011/485}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Koblitz11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KoblitzM11, author = {Neal Koblitz and Alfred Menezes}, title = {Another Look at Security Definitions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {343}, year = {2011}, url = {http://eprint.iacr.org/2011/343}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KoblitzM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KolesnikovS11, author = {Vladimir Kolesnikov and Ganapathy S. Sundaram}, title = {{IBAKE:} Identity-Based Authenticated Key Exchange Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {612}, year = {2011}, url = {http://eprint.iacr.org/2011/612}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KolesnikovS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KolokotronisL11, author = {Nicholas Kolokotronis and Konstantinos Limniotis}, title = {Maiorana-McFarland Functions with High Second-Order Nonlinearity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {212}, year = {2011}, url = {http://eprint.iacr.org/2011/212}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KolokotronisL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KongWHG11, author = {Jiejun Kong and Dapeng Wu and Xiaoyan Hong and Mario Gerla}, title = {Towards a Probabilistic Complexity-theoretic Modeling of Biological Cyanide Poisoning as Service Attack in Self-organizing Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {639}, year = {2011}, url = {http://eprint.iacr.org/2011/639}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KongWHG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KooJK11, author = {Namhun Koo and Gooc Hwa Jo and Soonhak Kwon}, title = {On Nonlinear Polynomial Selection and Geometric Progression (mod {N)} for Number Field Sieve}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {292}, year = {2011}, url = {http://eprint.iacr.org/2011/292}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KooJK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KramerGO11, author = {Simon Kramer and Rajeev Gor{\'{e}} and Eiji Okamoto}, title = {Computer-Aided Decision-Making for Formal Relations and Domains of Trust, Distrust, and Mistrust with Cryptographic Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {235}, year = {2011}, url = {http://eprint.iacr.org/2011/235}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KramerGO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KrauseH11, author = {Matthias Krause and Matthias Hamann}, title = {The Cryptographic Power of Random Selection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {511}, year = {2011}, url = {http://eprint.iacr.org/2011/511}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KrauseH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kreitz11, author = {Gunnar Kreitz}, title = {A Zero-One Law for Secure Multi-Party Computation with Ternary Outputs (full version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {2}, year = {2011}, url = {http://eprint.iacr.org/2011/002}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kreitz11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KunihiroSI11, author = {Noboru Kunihiro and Naoyuki Shinohara and Tetsuya Izu}, title = {A Unified Framework for Small Secret Exponent Attack on {RSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {591}, year = {2011}, url = {http://eprint.iacr.org/2011/591}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KunihiroSI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KurosawaNP11, author = {Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong}, title = {Generic Fully Simulatable Adaptive Oblivious Transfer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {382}, year = {2011}, url = {http://eprint.iacr.org/2011/382}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KurosawaNP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KurosawaP11, author = {Kaoru Kurosawa and Le Trieu Phong}, title = {Maximum Leakage Resilient {IBE} and {IPE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {628}, year = {2011}, url = {http://eprint.iacr.org/2011/628}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KurosawaP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KushilevitzLO11, author = {Eyal Kushilevitz and Steve Lu and Rafail Ostrovsky}, title = {On the (In)security of Hash-based Oblivious {RAM} and a New Balancing Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {327}, year = {2011}, url = {http://eprint.iacr.org/2011/327}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KushilevitzLO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KushwahL11, author = {Prashant Kushwah and Sunder Lal}, title = {Identity based signcryption schemes without random oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {372}, year = {2011}, url = {http://eprint.iacr.org/2011/372}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KushwahL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KustersT11, author = {Ralf K{\"{u}}sters and Max Tuengerthal}, title = {Composition Theorems Without Pre-Established Session Identifiers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {406}, year = {2011}, url = {http://eprint.iacr.org/2011/406}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KustersT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KustersTV11, author = {Ralf K{\"{u}}sters and Tomasz Truderung and Andreas Vogt}, title = {Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {517}, year = {2011}, url = {http://eprint.iacr.org/2011/517}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KustersTV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LambergerM11, author = {Mario Lamberger and Florian Mendel}, title = {Higher-Order Differential Attack on Reduced {SHA-256}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {37}, year = {2011}, url = {http://eprint.iacr.org/2011/037}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LambergerM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LampeP11, author = {Rodolphe Lampe and Jacques Patarin}, title = {Analysis of some natural variants of the {PKP} Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {686}, year = {2011}, url = {http://eprint.iacr.org/2011/686}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LampeP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LaptyevaFK11, author = {T. V. Laptyeva and Sergej Flach and K. Kladko}, title = {The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {172}, year = {2011}, url = {http://eprint.iacr.org/2011/172}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LaptyevaFK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LaurWZ11, author = {Sven Laur and Jan Willemson and Bingsheng Zhang}, title = {Round-efficient Oblivious Database Manipulation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {429}, year = {2011}, url = {http://eprint.iacr.org/2011/429}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LaurWZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LauterNV11, author = {Kristin E. Lauter and Michael Naehrig and Vinod Vaikuntanathan}, title = {Can Homomorphic Encryption be Practical?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {405}, year = {2011}, url = {http://eprint.iacr.org/2011/405}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LauterNV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Le11, author = {Duc{-}Phong Le}, title = {Fast Quadrupling of a Point in Elliptic Curve Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {39}, year = {2011}, url = {http://eprint.iacr.org/2011/039}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Le11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lee11, author = {Moon Sung Lee}, title = {On the sparse subset sum problem from Gentry-Halevi's implementation of fully homomorphic encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {567}, year = {2011}, url = {http://eprint.iacr.org/2011/567}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lee11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeCH11, author = {Hyung Tae Lee and Jung Hee Cheon and Jin Hong}, title = {Analysis of Discrete Logarithm Algorithm using Pre-computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {187}, year = {2011}, url = {http://eprint.iacr.org/2011/187}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeCH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeH11, author = {Jooyoung Lee and Deukjo Hong}, title = {Collision Resistance of the {JH} Hash Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {19}, year = {2011}, url = {http://eprint.iacr.org/2011/019}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeSS11, author = {Jooyoung Lee and Martijn Stam and John P. Steinberger}, title = {The preimage security of double-block-length compression functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {210}, year = {2011}, url = {http://eprint.iacr.org/2011/210}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lewko11, author = {Allison B. Lewko}, title = {Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {490}, year = {2011}, url = {http://eprint.iacr.org/2011/490}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lewko11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LewkoW11, author = {Allison B. Lewko and Brent Waters}, title = {Unbounded {HIBE} and Attribute-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {49}, year = {2011}, url = {http://eprint.iacr.org/2011/049}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LewkoW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiCW11, author = {Leibo Li and Jiazhe Chen and Xiaoyun Wang}, title = {Multiplied Conditional Impossible Differential Attack on Reduced-Round Camellia}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {524}, year = {2011}, url = {http://eprint.iacr.org/2011/524}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiCW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiDY11, author = {Hongwei Li and Yuanshun Dai and Bo Yang}, title = {Identity-Based Cryptography for Cloud Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {169}, year = {2011}, url = {http://eprint.iacr.org/2011/169}, timestamp = {Mon, 17 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiDY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiMZ11, author = {Ming Li and Ali Miri and Daming Zhu}, title = {Analysis of the Hamming Weight of the Extended wmbNAF}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {569}, year = {2011}, url = {http://eprint.iacr.org/2011/569}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiMZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiNLOS11, author = {Yang Li and Daisuke Nakatsu and Qi Li and Kazuo Ohta and Kazuo Sakiyama}, title = {Clockwise Collision Analysis - Overlooked Side-Channel Leakage Inside Your Measurements}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {579}, year = {2011}, url = {http://eprint.iacr.org/2011/579}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiNLOS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiPLZ11, author = {Jianwei Li and Yanbin Pan and Mingjie Liu and Guizhen Zhu}, title = {An Efficient Broadcast Attack against {NTRU}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {590}, year = {2011}, url = {http://eprint.iacr.org/2011/590}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiPLZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiW11, author = {Yongqiang Li and Mingsheng Wang}, title = {Constructing differentially 4-uniform permutations over 2\({}^{\mbox{2m}}\) from quadratic {APN} permutations over 2\({}^{\mbox{2m+1}}\)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {642}, year = {2011}, url = {http://eprint.iacr.org/2011/642}, timestamp = {Mon, 31 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiY11, author = {Lei Li and Siman Yang}, title = {On the Access Structures of Hyperelliptic Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {415}, year = {2011}, url = {http://eprint.iacr.org/2011/415}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertPQ11, author = {Beno{\^{\i}}t Libert and Kenneth G. Paterson and Elizabeth A. Quaglia}, title = {Anonymous Broadcast Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {476}, year = {2011}, url = {http://eprint.iacr.org/2011/476}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LibertPQ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinFPW11, author = {Dongdai Lin and Jean{-}Charles Faug{\`{e}}re and Ludovic Perret and Tianze Wang}, title = {On Enumeration of Polynomial Equivalence Classes and Their Application to {MPKC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {55}, year = {2011}, url = {http://eprint.iacr.org/2011/055}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinFPW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinP11, author = {Zhiqiang Lin and Dingyi Pei}, title = {Constructing a Diversified {FCSR} with a Given Connection Integer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {358}, year = {2011}, url = {http://eprint.iacr.org/2011/358}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinSY11, author = {Dongdai Lin and Tao Shi and Zifeng Yang}, title = {Ergodic Theory Over F\({}_{\mbox{2[[T]]}}\)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {130}, year = {2011}, url = {http://eprint.iacr.org/2011/130}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinSY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lindell11, author = {Yehuda Lindell}, title = {Highly-Efficient Universally-Composable Commitments based on the {DDH} Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {180}, year = {2011}, url = {http://eprint.iacr.org/2011/180}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lindell11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LindellO11, author = {Yehuda Lindell and Eran Omri}, title = {A Practical Application of Differential Privacy to Personalized Online Advertising}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {152}, year = {2011}, url = {http://eprint.iacr.org/2011/152}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LindellO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LindellPO11, author = {Yehuda Lindell and Benny Pinkas and Eli Oxman}, title = {The {IPS} Compiler: Optimizations, Variants and Concrete Efficiency}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {435}, year = {2011}, url = {http://eprint.iacr.org/2011/435}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LindellPO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lipmaa11, author = {Helger Lipmaa}, title = {Progression-Free Sets and Sublinear Pairing-Based Non-Interactive Zero-Knowledge Arguments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {9}, year = {2011}, url = {http://eprint.iacr.org/2011/009}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lipmaa11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lipmaa11a, author = {Helger Lipmaa}, title = {Two Simple Code-Verification Voting Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {317}, year = {2011}, url = {http://eprint.iacr.org/2011/317}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lipmaa11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LipmaaZ11, author = {Helger Lipmaa and Bingsheng Zhang}, title = {A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle Argument}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {394}, year = {2011}, url = {http://eprint.iacr.org/2011/394}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LipmaaZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuBZ11, author = {Joseph K. Liu and Feng Bao and Jianying Zhou}, title = {Short and Efficient Certificate-Based Signature}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {192}, year = {2011}, url = {http://eprint.iacr.org/2011/192}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuBZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuGLLM11, author = {Ya Liu and Dawu Gu and Zhiqiang Liu and Wei Li and Ying Man}, title = {Improved Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-192/256}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {671}, year = {2011}, url = {http://eprint.iacr.org/2011/671}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuGLLM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuHY11, author = {Jing Liu and Qiong Huang and Bo Yang}, title = {Efficient Multicast Key Distribution Using HOWF-based Access Control Structures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {576}, year = {2011}, url = {http://eprint.iacr.org/2011/576}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuHY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuLW11, author = {Feng Liu and Peng Li and Chuan Kun Wu}, title = {Encrypting More Information in Visual Cryptography Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {340}, year = {2011}, url = {http://eprint.iacr.org/2011/340}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuLW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuLXF11, author = {Fanbao Liu and Yi Liu and Tao Xie and Yumeng Feng}, title = {Fast Password Recovery Attack: Application to {APOP}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {248}, year = {2011}, url = {http://eprint.iacr.org/2011/248}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuLXF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuSXF11, author = {Fanbao Liu and Changxiang Shen and Tao Xie and Dengguo Feng}, title = {On the Security of {NMAC} and Its Variants}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {649}, year = {2011}, url = {http://eprint.iacr.org/2011/649}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuSXF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuW11, author = {Jing Liu and Changji Wang}, title = {Exclusive Key-Based Group Rekeying}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {575}, year = {2011}, url = {http://eprint.iacr.org/2011/575}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuWG11, author = {Shusheng Liu and Libin Wang and Zheng Gong}, title = {Improved Related-Key Boomerang Distinguishing Attack of Threefish-256}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {323}, year = {2011}, url = {http://eprint.iacr.org/2011/323}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuWG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuWXZ11, author = {Mingjie Liu and Xiaoyun Wang and Guangwu Xu and Xuexin Zheng}, title = {Shortest Lattice Vectors in the Presence of Gaps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {139}, year = {2011}, url = {http://eprint.iacr.org/2011/139}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuWXZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuXS11, author = {Fanbao Liu and Tao Xie and Changxiang Shen}, title = {Breaking H\({}^{\mbox{2}}\)-MAC Using Birthday Paradox}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {647}, year = {2011}, url = {http://eprint.iacr.org/2011/647}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuXS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuYZ11, author = {Joseph K. Liu and Tsz Hon Yuen and Jianying Zhou}, title = {Forward Secure Ring Signature without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {472}, year = {2011}, url = {http://eprint.iacr.org/2011/472}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuYZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuZYF11, author = {Jiye Liu and Yongbin Zhou and Shuguo Yang and Dengguo Feng}, title = {Generic Side-channel Distinguisher Based on Kolmogorov-Smirnov Test: Explicit Construction and Practical Evaluation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {694}, year = {2011}, url = {http://eprint.iacr.org/2011/694}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuZYF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lopez-AltTV11, author = {Adriana L{\'{o}}pez{-}Alt and Eran Tromer and Vinod Vaikuntanathan}, title = {Cloud-Assisted Multiparty Computation from Fully Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {663}, year = {2011}, url = {http://eprint.iacr.org/2011/663}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lopez-AltTV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Loubet-MoundiVO11, author = {Philippe Loubet{-}Moundi and David Vigilant and Francis Olivier}, title = {Static Fault Attacks on Hardware {DES} Registers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {531}, year = {2011}, url = {http://eprint.iacr.org/2011/531}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Loubet-MoundiVO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuL11, author = {Yang Lu and Jiguo Li}, title = {Certificate-Based Signcryption: Security Model and Efficient Construction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {542}, year = {2011}, url = {http://eprint.iacr.org/2011/542}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuO11, author = {Steve Lu and Rafail Ostrovsky}, title = {Multi-Server Oblivious {RAM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {384}, year = {2011}, url = {http://eprint.iacr.org/2011/384}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LuO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuRZ11, author = {Jian{-}Zhu Lu and Hong{-}Qing Ren and Jipeng Zhou}, title = {Efficient Delegation-Based Authentication Protocol with Strong Mobile Privacy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {528}, year = {2011}, url = {http://eprint.iacr.org/2011/528}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuRZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuT11, author = {Yanbin Lu and Gene Tsudik}, title = {Enhancing Data Privacy in the Cloud}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {158}, year = {2011}, url = {http://eprint.iacr.org/2011/158}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuZQ11, author = {Jian{-}Zhu Lu and Shaoyuan Zhang and Shijie Qie}, title = {Enhanced Biometrics-based Remote User Authentication Scheme Using Smart Cards}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {676}, year = {2011}, url = {http://eprint.iacr.org/2011/676}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuZQ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LunemannN11, author = {Carolin Lunemann and Jesper Buus Nielsen}, title = {Fully Simulatable Quantum-Secure Coin-Flipping and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {65}, year = {2011}, url = {http://eprint.iacr.org/2011/065}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LunemannN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuoL11, author = {Yiyuan Luo and Xuejia Lai}, title = {Attacks On a Double Length Blockcipher-based Hash Proposal}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {238}, year = {2011}, url = {http://eprint.iacr.org/2011/238}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuoL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lyubashevsky11, author = {Vadim Lyubashevsky}, title = {Lattice Signatures Without Trapdoors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {537}, year = {2011}, url = {http://eprint.iacr.org/2011/537}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lyubashevsky11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ma11, author = {Xiao Ma}, title = {Turbo Codes Can Be Asymptotically Information-Theoretically Secure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {80}, year = {2011}, url = {http://eprint.iacr.org/2011/080}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ma11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaA11, author = {Chunbo Ma and Jun Ao}, title = {Group-oriented ring signature}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {205}, year = {2011}, url = {http://eprint.iacr.org/2011/205}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaghebiGCD11, author = {Houssem Maghrebi and Sylvain Guilley and Claude Carlet and Jean{-}Luc Danger}, title = {Classification of High-Order Boolean Masking Schemes and Improvements of their Efficiency}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {520}, year = {2011}, url = {http://eprint.iacr.org/2011/520}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaghebiGCD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Mahalanobis11, author = {Ayan Mahalanobis}, title = {The ElGamal cryptosystem over circulant matrices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {572}, year = {2011}, url = {http://eprint.iacr.org/2011/572}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Mahalanobis11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MahmoodyMV11, author = {Mohammad Mahmoody and Tal Moran and Salil P. Vadhan}, title = {Non-Interactive Time-Stamping and Proofs of Work in the Random Oracle Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {553}, year = {2011}, url = {http://eprint.iacr.org/2011/553}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MahmoodyMV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaitiGS11, author = {Abhranil Maiti and Vikash Gunreddy and Patrick Schaumont}, title = {A Systematic Method to Evaluate and Compare the Performance of Physical Unclonable Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {657}, year = {2011}, url = {http://eprint.iacr.org/2011/657}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/MaitiGS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaitraP11, author = {Arpita Maitra and Goutam Paul}, title = {A Note on Four-State {BB84} Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {588}, year = {2011}, url = {http://eprint.iacr.org/2011/588}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaitraP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MajiOPR11, author = {Hemanta K. Maji and Pichayoot Ouppaphan and Manoj Prabhakaran and Mike Rosulek}, title = {Exploring the Limits of Common Coins Using Frontier Analysis of Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {6}, year = {2011}, url = {http://eprint.iacr.org/2011/006}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MajiOPR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Mala11, author = {Hamid Mala}, title = {Biclique Cryptanalysis of the Block Cipher {SQUARE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {500}, year = {2011}, url = {http://eprint.iacr.org/2011/500}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Mala11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MalikN11, author = {Muhammad Yasir Malik and Jong{-}Seon No}, title = {Dynamic {MDS} Matrices for Substantial Cryptographic Strength}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {177}, year = {2011}, url = {http://eprint.iacr.org/2011/177}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MalikN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MandalPS11, author = {Avradip Mandal and Jacques Patarin and Yannick Seurin}, title = {On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {496}, year = {2011}, url = {http://eprint.iacr.org/2011/496}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MandalPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Maubach11, author = {Stefan Maubach}, title = {A representation of the p-sylow subgroup of Perm(F\({}_{\mbox{p}}\)\({}^{\mbox{n}}\)) and a cryptographic application}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {383}, year = {2011}, url = {http://eprint.iacr.org/2011/383}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Maubach11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MedwedS11, author = {Marcel Medwed and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Extractors Against Side-Channel Attacks: Weak or Strong?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {348}, year = {2011}, url = {http://eprint.iacr.org/2011/348}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MedwedS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MelchorBGH11, author = {Carlos Aguilar Melchor and Slim Bettaieb and Philippe Gaborit and Javier Herranz}, title = {Improving Additive and Multiplicative Homomorphic Encryption Schemes Based on Worst-Case Hardness Assumptions\}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {607}, year = {2011}, url = {http://eprint.iacr.org/2011/607}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MelchorBGH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MenninkP11, author = {Bart Mennink and Bart Preneel}, title = {Hash Functions Based on Three Permutations: {A} Generic Security Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {532}, year = {2011}, url = {http://eprint.iacr.org/2011/532}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MenninkP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Mesnager11, author = {Sihem Mesnager}, title = {A note on semi-bent functions with multiple trace terms and hyperelliptic curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {627}, year = {2011}, url = {http://eprint.iacr.org/2011/627}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Mesnager11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MicciancioM11, author = {Daniele Micciancio and Petros Mol}, title = {Pseudorandom Knapsacks and the Sample Complexity of {LWE} Search-to-Decision Reductions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {521}, year = {2011}, url = {http://eprint.iacr.org/2011/521}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MicciancioM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MicciancioP11, author = {Daniele Micciancio and Chris Peikert}, title = {Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {501}, year = {2011}, url = {http://eprint.iacr.org/2011/501}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MicciancioP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MilesV11, author = {Eric Miles and Emanuele Viola}, title = {The Advanced Encryption Standard, Candidate Pseudorandom Functions, and Natural Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {226}, year = {2011}, url = {http://eprint.iacr.org/2011/226}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MilesV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MinierNP11, author = {Marine Minier and Mar{\'{\i}}a Naya{-}Plasencia and Thomas Peyrin}, title = {Analysis of reduced-SHAvite-3-256 v2}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {175}, year = {2011}, url = {http://eprint.iacr.org/2011/175}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MinierNP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Mohassel11, author = {Payman Mohassel}, title = {Efficient and Secure Delegation of Linear Algebra}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {605}, year = {2011}, url = {http://eprint.iacr.org/2011/605}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Mohassel11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MohasselNSS11, author = {Payman Mohassel and Salman Niksefat and Seyed Saeed Sadeghian and Babak Sadeghiyan}, title = {A New Protocol for Oblivious {DFA} Evaluation and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {434}, year = {2011}, url = {http://eprint.iacr.org/2011/434}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MohasselNSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Molina-MarkhamDFSI11, author = {Andres Molina{-}Markham and George Danezis and Kevin Fu and Prashant J. Shenoy and David E. Irwin}, title = {Designing Privacy-preserving Smart Meters with Low-cost Microcontrollers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {544}, year = {2011}, url = {http://eprint.iacr.org/2011/544}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Molina-MarkhamDFSI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MondalCDM11, author = {Mainack Mondal and Avik Chakraborti and Nilanjan Datta and Debdeep Mukhopadhyay}, title = {TweLEX: {A} Tweaked Version of the {LEX} Stream Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {586}, year = {2011}, url = {http://eprint.iacr.org/2011/586}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MondalCDM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoodyPS11, author = {Dustin Moody and Souradyuti Paul and Daniel Smith{-}Tone}, title = {Indifferentiability Security of the Fast Widepipe Hash: Breaking the Birthday Barrier}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {630}, year = {2011}, url = {http://eprint.iacr.org/2011/630}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoodyPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoodyS11, author = {Dustin Moody and Daniel Shumow}, title = {Analogues of Velu's formulas for Isogenies on Alternate Models of Elliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {430}, year = {2011}, url = {http://eprint.iacr.org/2011/430}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoodyS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoradiBKP11, author = {Amir Moradi and Alessandro Barenghi and Timo Kasper and Christof Paar}, title = {On the Vulnerability of {FPGA} Bitstream Encryption against Power Analysis Attacks - Extracting Keys from Xilinx Virtex-II FPGAs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {390}, year = {2011}, url = {http://eprint.iacr.org/2011/390}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoradiBKP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoradiKP11, author = {Amir Moradi and Markus Kasper and Christof Paar}, title = {On the Portability of Side-Channel Attacks - An Analysis of the Xilinx Virtex 4 and Virtex 5 Bitstream Encryption Mechanism}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {391}, year = {2011}, url = {http://eprint.iacr.org/2011/391}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoradiKP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoradiMP11, author = {Amir Moradi and Oliver Mischke and Christof Paar}, title = {Collision Timing Attack when Breaking 42 {AES} {ASIC} Cores}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {162}, year = {2011}, url = {http://eprint.iacr.org/2011/162}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoradiMP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Mortazavi11, author = {Seyyed Amir Mortazavi}, title = {A new attack on Jakobsson Hybrid Mix-Net}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {305}, year = {2011}, url = {http://eprint.iacr.org/2011/305}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Mortazavi11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MosesR11, author = {William K. Moses Jr. and C. Pandu Rangan}, title = {Rational Secret Sharing with Honest Players over an Asynchronous Channel}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {68}, year = {2011}, url = {http://eprint.iacr.org/2011/068}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MosesR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MossOPT11, author = {Andrew Moss and Elisabeth Oswald and Dan Page and Michael Tunstall}, title = {Automatic Insertion of {DPA} Countermeasures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {412}, year = {2011}, url = {http://eprint.iacr.org/2011/412}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MossOPT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Mrabet11, author = {Nadia El Mrabet}, title = {Fault Attack against Miller's algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {709}, year = {2011}, url = {http://eprint.iacr.org/2011/709}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Mrabet11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MroczkowskiS11, author = {Piotr Mroczkowski and Janusz Szmidt}, title = {Corrigendum to: The Cube Attack on Stream Cipher Trivium and Quadraticity Tests}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {32}, year = {2011}, url = {http://eprint.iacr.org/2011/032}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MroczkowskiS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MullerK11, author = {Sascha M{\"{u}}ller and Stefan Katzenbeisser}, title = {Hiding the Policy in Cryptographic Access Control}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {255}, year = {2011}, url = {http://eprint.iacr.org/2011/255}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MullerK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MunizL11, author = {Madeline Gonz{\'{a}}lez Mu{\~{n}}iz and Peeter Laud}, title = {Strong Forward Security in Identity-Based Signcryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {156}, year = {2011}, url = {http://eprint.iacr.org/2011/156}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MunizL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MurtazaI11, author = {Ghulam Murtaza and Nassar Ikram}, title = {Direct Exponent and Scalar Multiplication Classes of an {MDS} Matrix}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {151}, year = {2011}, url = {http://eprint.iacr.org/2011/151}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MurtazaI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MurtazaKAF11, author = {Ghulam Murtaza and Azhar Ali Khan and Syed Wasi Alam and Aqeel Farooqi}, title = {Fortification of {AES} with Dynamic Mix-Column Transformation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {184}, year = {2011}, url = {http://eprint.iacr.org/2011/184}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MurtazaKAF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MyersSS11, author = {Steven A. Myers and Mona Sergi and Abhi Shelat}, title = {Threshold Fully Homomorphic Encryption and Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {454}, year = {2011}, url = {http://eprint.iacr.org/2011/454}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MyersSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NachefVP11, author = {Val{\'{e}}rie Nachef and Emmanuel Volte and Jacques Patarin}, title = {Differential Attacks on Generalized Feistel Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {705}, year = {2011}, url = {http://eprint.iacr.org/2011/705}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NachefVP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NassarGD11, author = {Maxime Nassar and Sylvain Guilley and Jean{-}Luc Danger}, title = {Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {534}, year = {2011}, url = {http://eprint.iacr.org/2011/534}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NassarGD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NayakAS11, author = {Manan Nayak and Shashank Agrawal and Kannan Srinathan}, title = {Minimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {320}, year = {2011}, url = {http://eprint.iacr.org/2011/320}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NayakAS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NeugebauerMW11, author = {Georg Neugebauer and Ulrike Meyer and Susanne Wetzel}, title = {Fair and Privacy-Preserving Multi-Party Protocols for Reconciling Ordered Input Sets (Extended version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {200}, year = {2011}, url = {http://eprint.iacr.org/2011/200}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NeugebauerMW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nguyen11, author = {Long Hoang Nguyen}, title = {Rational authentication protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {70}, year = {2011}, url = {http://eprint.iacr.org/2011/070}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nguyen11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nguyen11a, author = {Long Hoang Nguyen}, title = {Rational distance-bounding protocols over noisy channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {492}, year = {2011}, url = {http://eprint.iacr.org/2011/492}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nguyen11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NguyenR11, author = {Long Hoang Nguyen and Andrew William Roscoe}, title = {On the construction of digest functions for manual authentication protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {116}, year = {2011}, url = {http://eprint.iacr.org/2011/116}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NguyenR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nguyenova-StepanikovaD11, author = {Alice Nguyenova{-}Stepanikova and Tran Ngoc Duong}, title = {The block cipher {NSABC} (public domain)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {237}, year = {2011}, url = {http://eprint.iacr.org/2011/237}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nguyenova-StepanikovaD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NielsenNOB11, author = {Jesper Buus Nielsen and Peter Sebastian Nordholt and Claudio Orlandi and Sai Sheshank Burra}, title = {A New Approach to Practical Active-Secure Two-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {91}, year = {2011}, url = {http://eprint.iacr.org/2011/091}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NielsenNOB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NingX11, author = {Chao Ning and Qiuliang Xu}, title = {Constant-Rounds, Linear Multi-party Computation for Exponentiation and Modulo Reduction with Perfect Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {69}, year = {2011}, url = {http://eprint.iacr.org/2011/069}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NingX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nitaj11, author = {Abderrahmane Nitaj}, title = {A new attack on the KMOVcryptosystem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {427}, year = {2011}, url = {http://eprint.iacr.org/2011/427}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nitaj11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nitaj11a, author = {Abderrahmane Nitaj}, title = {Cryptanalysis of {NTRU} with two public keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {477}, year = {2011}, url = {http://eprint.iacr.org/2011/477}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nitaj11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nojoumian11, author = {Mehrdad Nojoumian}, title = {Socio-Rational Secret Sharing as a New Direction in Both Rational Cryptography and Game Theory}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {370}, year = {2011}, url = {http://eprint.iacr.org/2011/370}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nojoumian11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ONeillPW11, author = {Adam O'Neill and Chris Peikert and Brent Waters}, title = {Bi-Deniable Public-Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {352}, year = {2011}, url = {http://eprint.iacr.org/2011/352}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ONeillPW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OkamotoT11, author = {Tatsuaki Okamoto and Katsuyuki Takashima}, title = {Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {543}, year = {2011}, url = {http://eprint.iacr.org/2011/543}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OkamotoT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OkamotoT11a, author = {Tatsuaki Okamoto and Katsuyuki Takashima}, title = {Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {648}, year = {2011}, url = {http://eprint.iacr.org/2011/648}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OkamotoT11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OkamotoT11b, author = {Tatsuaki Okamoto and Katsuyuki Takashima}, title = {Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {700}, year = {2011}, url = {http://eprint.iacr.org/2011/700}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OkamotoT11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OkamotoT11c, author = {Tatsuaki Okamoto and Katsuyuki Takashima}, title = {Decentralized Attribute-Based Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {701}, year = {2011}, url = {http://eprint.iacr.org/2011/701}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OkamotoT11c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Oliynykov11, author = {Roman Oliynykov}, title = {Cryptanalysis of Symmetric Block Ciphers Based on the Feistel Network with Non-bijective S-boxes in the Round Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {685}, year = {2011}, url = {http://eprint.iacr.org/2011/685}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Oliynykov11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OneteV11, author = {Cristina Onete and Daniele Venturi}, title = {Security {\&} Indistinguishability in the Presence of Traffic Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {260}, year = {2011}, url = {http://eprint.iacr.org/2011/260}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OneteV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OrumiehchihaPS11, author = {Mohammad Ali Orumiehchiha and Josef Pieprzyk and Ron Steinfeld}, title = {Cryptanalysis of {WG-7} {(A} Lightweight Stream Cipher for {RFID} Encryption)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {687}, year = {2011}, url = {http://eprint.iacr.org/2011/687}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OrumiehchihaPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OstrovskyRSV11, author = {Rafail Ostrovsky and Vanishree Rao and Alessandra Scafuro and Ivan Visconti}, title = {Revisiting Lower and Upper Bounds for Selective Decommitments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {536}, year = {2011}, url = {http://eprint.iacr.org/2011/536}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OstrovskyRSV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OtmaniT11, author = {Ayoub Otmani and Jean{-}Pierre Tillich}, title = {An Efficient Attack on All Concrete {KKS} Proposals}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {356}, year = {2011}, url = {http://eprint.iacr.org/2011/356}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OtmaniT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PanZ11, author = {Yanbin Pan and Feng Zhang}, title = {A Note on the Density of the Multiple Subset Sum Problems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {525}, year = {2011}, url = {http://eprint.iacr.org/2011/525}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PanZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PapamanthouST11, author = {Charalampos Papamanthou and Elaine Shi and Roberto Tamassia}, title = {Publicly Verifiable Delegation of Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {587}, year = {2011}, url = {http://eprint.iacr.org/2011/587}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PapamanthouST11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PapamanthouT11, author = {Charalampos Papamanthou and Roberto Tamassia}, title = {Cryptography for Efficiency: Authenticated Data Structures Based on Lattices and Parallel Online Memory Checking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {102}, year = {2011}, url = {http://eprint.iacr.org/2011/102}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PapamanthouT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ParnoRV11, author = {Bryan Parno and Mariana Raykova and Vinod Vaikuntanathan}, title = {How to Delegate and Verify in Public: Verifiable Computation from Attribute-based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {597}, year = {2011}, url = {http://eprint.iacr.org/2011/597}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ParnoRV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Partala11, author = {Juha Partala}, title = {Key agreement based on homomorphisms of algebraic structures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {203}, year = {2011}, url = {http://eprint.iacr.org/2011/203}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Partala11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatersonS11, author = {Maura B. Paterson and Douglas R. Stinson}, title = {A Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {76}, year = {2011}, url = {http://eprint.iacr.org/2011/076}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatersonS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatersonSST11, author = {Kenneth G. Paterson and Jacob C. N. Schuldt and Martijn Stam and Susan Thomson}, title = {On the Joint Security of Encryption and Signature, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {486}, year = {2011}, url = {http://eprint.iacr.org/2011/486}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatersonSST11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Patra11, author = {Arpita Patra}, title = {Error-free Multi-valued Broadcast and Byzantine Agreement with Optimal Communication Complexity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {313}, year = {2011}, url = {http://eprint.iacr.org/2011/313}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Patra11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Persichetti11, author = {Edoardo Persichetti}, title = {Compact McEliece keys based on Quasi-Dyadic Srivastava codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {179}, year = {2011}, url = {http://eprint.iacr.org/2011/179}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Persichetti11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PetitQ11, author = {Christophe Petit and Jean{-}Jacques Quisquater}, title = {Rubik's for cryptographers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {638}, year = {2011}, url = {http://eprint.iacr.org/2011/638}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/PetitQ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PetzoldtTBW11, author = {Albrecht Petzoldt and Enrico Thomae and Stanislav Bulygin and Christopher Wolf}, title = {Small Public Keys and Fast Verification for Multivariate Quadratic Public Key Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {294}, year = {2011}, url = {http://eprint.iacr.org/2011/294}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PetzoldtTBW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PhanPS11, author = {Duong Hieu Phan and David Pointcheval and Mario Strefler}, title = {Adaptively Secure Broadcast Encryption with Forward Secrecy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {463}, year = {2011}, url = {http://eprint.iacr.org/2011/463}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PhanPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Popovyan11, author = {Ilya Popovyan}, title = {Efficient Parallelization of Lanczos Type Algorithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {416}, year = {2011}, url = {http://eprint.iacr.org/2011/416}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Popovyan11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ProuffR11, author = {Emmanuel Prouff and Thomas Roche}, title = {Higher-Order Glitches Free Implementation of the {AES} using Secure Multi-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {413}, year = {2011}, url = {http://eprint.iacr.org/2011/413}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ProuffR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PuDL11, author = {Shi Pu and Pu Duan and Jyh{-}Charn Liu}, title = {Fastplay-A Parallelization Model and Implementation of {SMC} on {CUDA} based {GPU} Cluster Architecture}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {97}, year = {2011}, url = {http://eprint.iacr.org/2011/097}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PuDL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PurohitR11, author = {G. N. Purohit and Asmita Singh Rawat}, title = {Fast Scalar Multiplication in {ECC} using The Multi base Number System}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {44}, year = {2011}, url = {http://eprint.iacr.org/2011/044}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PurohitR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Rackoff11, author = {Charles Rackoff}, title = {On "identities", "names", "NAMES", "ROLES" and Security: {A} Manifesto}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {214}, year = {2011}, url = {http://eprint.iacr.org/2011/214}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Rackoff11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RanellucciTWW11, author = {Samuel Ranellucci and Alain Tapp and Severin Winkler and J{\"{u}}rg Wullschleger}, title = {On the Efficiency of Bit Commitment Reductions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {324}, year = {2011}, url = {http://eprint.iacr.org/2011/324}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RanellucciTWW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RangasamySKBN11, author = {Jothi Rangasamy and Douglas Stebila and Lakshmi Kuppusamy and Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Efficient Modular Exponentiation-based Puzzles for Denial-of-Service Protection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {665}, year = {2011}, url = {http://eprint.iacr.org/2011/665}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RangasamySKBN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Rhrmair11, author = {Ulrich R{\"{u}}hrmair}, title = {Physical Turing Machines and the Formalization of Physical Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {188}, year = {2011}, url = {http://eprint.iacr.org/2011/188}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Rhrmair11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Rhrmair11a, author = {Ulrich R{\"{u}}hrmair}, title = {{SIMPL} Systems as a Keyless Cryptographic and Security Primitive}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {189}, year = {2011}, url = {http://eprint.iacr.org/2011/189}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Rhrmair11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RistenpartSS11, author = {Thomas Ristenpart and Hovav Shacham and Thomas Shrimpton}, title = {Careful with Composition: Limitations of Indifferentiability and Universal Composability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {339}, year = {2011}, url = {http://eprint.iacr.org/2011/339}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RistenpartSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Rivain11, author = {Matthieu Rivain}, title = {Fast and Regular Algorithms for Scalar Multiplication over Elliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {338}, year = {2011}, url = {http://eprint.iacr.org/2011/338}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Rivain11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RockN11, author = {Andrea R{\"{o}}ck and Kaisa Nyberg}, title = {Exploiting Linear Hull in Matsui's Algorithm 1 (extended version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {285}, year = {2011}, url = {http://eprint.iacr.org/2011/285}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RockN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RogawskiG11, author = {Marcin Rogawski and Kris Gaj}, title = {Groestl Tweaks and their Effect on {FPGA} Results}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {635}, year = {2011}, url = {http://eprint.iacr.org/2011/635}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RogawskiG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Romsy11, author = {Mario Romsy}, title = {Adaption of Pollard's kangaroo algorithm to the {FACTOR} problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {483}, year = {2011}, url = {http://eprint.iacr.org/2011/483}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Romsy11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Rose11, author = {Greg Rose}, title = {{KISS:} {A} Bit Too Simple}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {7}, year = {2011}, url = {http://eprint.iacr.org/2011/007}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Rose11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RostovtsevBM11, author = {Alexander Rostovtsev and Alexey Bogdanov and Mikhail Mikhaylov}, title = {Secure evaluation of polynomial using privacy ring homomorphisms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {24}, year = {2011}, url = {http://eprint.iacr.org/2011/024}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RostovtsevBM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Rosulek11, author = {Mike Rosulek}, title = {Universal Composability from Essentially Any Trusted Setup}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {240}, year = {2011}, url = {http://eprint.iacr.org/2011/240}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Rosulek11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RoyDL11, author = {Swapnoneel Roy and Amlan K. Das and Yu Li}, title = {Cryptanalysis and Security Enhancement of an Advanced Authentication Scheme using Smart Cards, and a Key Agreement Scheme for Two-Party Communication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {62}, year = {2011}, url = {http://eprint.iacr.org/2011/062}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RoyDL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RoyRMTF11, author = {Sujoy Sinha Roy and Chester Rebeiro and Debdeep Mukhopadhyay and Junko Takahashi and Toshinori Fukunaga}, title = {Scalar Multiplication on Koblitz Curves using tau\({}^{\mbox{2}}\)-NAF}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {318}, year = {2011}, url = {http://eprint.iacr.org/2011/318}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RoyRMTF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RuanFC11, author = {Ou Ruan and Cai Fu and Guohua Cui}, title = {An Efficient Protocol for the Commit-Prove-Fair-Open functionality}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {577}, year = {2011}, url = {http://eprint.iacr.org/2011/577}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RuanFC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Saarinen11, author = {Markku{-}Juhani O. Saarinen}, title = {GCM, {GHASH} and Weak Keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {202}, year = {2011}, url = {http://eprint.iacr.org/2011/202}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Saarinen11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Saarinen11a, author = {Markku{-}Juhani O. Saarinen}, title = {Cryptographic Analysis of All 4 x 4 - Bit S-Boxes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {218}, year = {2011}, url = {http://eprint.iacr.org/2011/218}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Saarinen11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Saarinen11b, author = {Markku{-}Juhani O. Saarinen}, title = {{SGCM:} The Sophie Germain Counter Mode}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {326}, year = {2011}, url = {http://eprint.iacr.org/2011/326}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Saarinen11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SafkhaniBN11, author = {Masoumeh Safkhani and Nasour Bagheri and Majid Naderi}, title = {Cryptanalysis of Chen \emph{et al.}'s {RFID} Access Control Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {194}, year = {2011}, url = {http://eprint.iacr.org/2011/194}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SafkhaniBN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SafkhaniBN11a, author = {Masoumeh Safkhani and Nasour Bagheri and Majid Naderi}, title = {Cryptanalysis of {AZUMI:} an {EPC} Class-1 Generation-2 Standard Compliant {RFID} Authentication Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {424}, year = {2011}, url = {http://eprint.iacr.org/2011/424}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SafkhaniBN11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SafkhaniBN11b, author = {Masoumeh Safkhani and Nasour Bagheri and Majid Naderi}, title = {On the Security of {RFID} Anti Cloning Security Protocol(ACSP)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {563}, year = {2011}, url = {http://eprint.iacr.org/2011/563}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SafkhaniBN11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SafkhaniBN11c, author = {Masoumeh Safkhani and Nasour Bagheri and Majid Naderi}, title = {Security Analysis of a {PUF} based {RFID} Authentication Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {704}, year = {2011}, url = {http://eprint.iacr.org/2011/704}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SafkhaniBN11c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SafkhaniBSN11, author = {Masoumeh Safkhani and Nasour Bagheri and Somitra Kumar Sanadhya and Majid Naderi}, title = {Cryptanalysis of improved Yeh \emph{et al.}'s authentication Protocol: An {EPC} Class-1 Generation-2 standard compliant protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {426}, year = {2011}, url = {http://eprint.iacr.org/2011/426}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SafkhaniBSN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SafkhaniNBS11, author = {Masoumeh Safkhani and Majid Naderi and Nasour Bagheri and Somitra Kumar Sanadhya}, title = {Cryptanalysis of Some Protocols for {RFID} Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {61}, year = {2011}, url = {http://eprint.iacr.org/2011/061}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SafkhaniNBS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SafkhaniPCBN11, author = {Masoumeh Safkhani and Pedro Peris{-}Lopez and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Nasour Bagheri and Majid Naderi}, title = {Cryptanalysis of Cho \emph{et al.}'s Protocol, {A} Hash-Based Mutual Authentication Protocol for {RFID} Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {331}, year = {2011}, url = {http://eprint.iacr.org/2011/331}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SafkhaniPCBN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Saito11, author = {Teruo Saito}, title = {A Single-Key Attack on 6-Round {KASUMI}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {584}, year = {2011}, url = {http://eprint.iacr.org/2011/584}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Saito11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Samid11, author = {Gideon Samid}, title = {Integer Arithmetic without Arithmetic Addition}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {127}, year = {2011}, url = {http://eprint.iacr.org/2011/127}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Samid11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Sarkar11, author = {Palash Sarkar}, title = {On Authenticated Encryption Using Stream Ciphers Supporting an Initialisation Vector}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {299}, year = {2011}, url = {http://eprint.iacr.org/2011/299}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Sarkar11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Schneider11, author = {Michael Schneider}, title = {Sieving for Shortest Vectors in Ideal Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {458}, year = {2011}, url = {http://eprint.iacr.org/2011/458}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Schneider11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SchollS11, author = {Peter Scholl and Nigel P. Smart}, title = {Improved Key Generation For Gentry's Fully Homomorphic Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {471}, year = {2011}, url = {http://eprint.iacr.org/2011/471}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SchollS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SchroderU11, author = {Dominique Schr{\"{o}}der and Dominique Unruh}, title = {Round Optimal Blind Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {264}, year = {2011}, url = {http://eprint.iacr.org/2011/264}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SchroderU11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SchroderU11a, author = {Dominique Schr{\"{o}}der and Dominique Unruh}, title = {Security of Blind Signatures Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {316}, year = {2011}, url = {http://eprint.iacr.org/2011/316}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SchroderU11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SchwabeYY11, author = {Peter Schwabe and Bo{-}Yin Yang and Shang{-}Yi Yang}, title = {{SHA-3} on {ARM11} processors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {670}, year = {2011}, url = {http://eprint.iacr.org/2011/670}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SchwabeYY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Scott11, author = {Michael Scott}, title = {On the Efficient Implementation of Pairing-Based Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {334}, year = {2011}, url = {http://eprint.iacr.org/2011/334}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Scott11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviVR11, author = {S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan}, title = {Identity Based Deterministic Signature Scheme Without Forking-Lemma}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {217}, year = {2011}, url = {http://eprint.iacr.org/2011/217}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviVR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviVR11a, author = {S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan}, title = {Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {695}, year = {2011}, url = {http://eprint.iacr.org/2011/695}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviVR11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviVVR11, author = {S. Sharmila Deva Selvi and S. Sree Vivek and Dhinakaran Vinayagamurthy and C. Pandu Rangan}, title = {On the Security of {ID} Based Signcryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {664}, year = {2011}, url = {http://eprint.iacr.org/2011/664}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviVVR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Semaev11, author = {Igor A. Semaev}, title = {Local limit theorem for large deviations and statistical box-tests}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {298}, year = {2011}, url = {http://eprint.iacr.org/2011/298}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Semaev11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SemaevH11, author = {Igor A. Semaev and Mehdi M. Hassanzadeh}, title = {New Statistical Box-Test and its Power}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {297}, year = {2011}, url = {http://eprint.iacr.org/2011/297}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SemaevH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Sendrier11, author = {Nicolas Sendrier}, title = {Decoding One Out of Many}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {367}, year = {2011}, url = {http://eprint.iacr.org/2011/367}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Sendrier11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SenguptaMPS11, author = {Sourav Sen Gupta and Subhamoy Maitra and Goutam Paul and Santanu Sarkar}, title = {{RC4:} (Non-)Random Words from (Non-)Random Permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {448}, year = {2011}, url = {http://eprint.iacr.org/2011/448}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SenguptaMPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SeoC11, author = {Jae Hong Seo and Jung Hee Cheon}, title = {Fully Secure Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {21}, year = {2011}, url = {http://eprint.iacr.org/2011/021}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SeoC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SheetritW11, author = {Idan Sheetrit and Avishai Wool}, title = {Cryptanalysis of KeeLoq code-hopping using a Single {FPGA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {242}, year = {2011}, url = {http://eprint.iacr.org/2011/242}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SheetritW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShelatS11, author = {Abhi Shelat and Chih{-}Hao Shen}, title = {Two-Output Secure Computation with Malicious Adversaries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {533}, year = {2011}, url = {http://eprint.iacr.org/2011/533}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShelatS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShiCSL11, author = {Elaine Shi and T.{-}H. Hubert Chan and Emil Stefanov and Mingfei Li}, title = {Oblivious {RAM} with O((log N)\({}^{\mbox{3}}\)) Worst-Case Cost}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {407}, year = {2011}, url = {http://eprint.iacr.org/2011/407}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShiCSL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SmartV11, author = {Nigel P. Smart and Frederik Vercauteren}, title = {Fully Homomorphic {SIMD} Operations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {133}, year = {2011}, url = {http://eprint.iacr.org/2011/133}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SmartV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Stanek11, author = {Martin Stanek}, title = {Extending Baby-step Giant-step algorithm for {FACTOR} problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {59}, year = {2011}, url = {http://eprint.iacr.org/2011/059}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Stanek11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Stanek11a, author = {Martin Stanek}, title = {Threshold Encryption into Multiple Ciphertexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {107}, year = {2011}, url = {http://eprint.iacr.org/2011/107}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Stanek11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StanicaGS11, author = {Pantelimon Stanica and Sugata Gangopadhyay and Brajesh Kumar Singh}, title = {Some Results Concerning Generalized Bent Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {290}, year = {2011}, url = {http://eprint.iacr.org/2011/290}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StanicaGS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StanicaM11, author = {Pantelimon Stanica and Thor Martinsen}, title = {Octal Bent Generalized Boolean Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {89}, year = {2011}, url = {http://eprint.iacr.org/2011/089}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StanicaM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StefanovDOJ11, author = {Emil Stefanov and Marten van Dijk and Alina Oprea and Ari Juels}, title = {Iris: {A} Scalable Cloud File System with Efficient Integrity Checks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {585}, year = {2011}, url = {http://eprint.iacr.org/2011/585}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StefanovDOJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StefanovSS11, author = {Emil Stefanov and Elaine Shi and Dawn Song}, title = {Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {509}, year = {2011}, url = {http://eprint.iacr.org/2011/509}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StefanovSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Stinson11, author = {Douglas R. Stinson}, title = {Comments on a sensor network key redistribution technique of Cichon, Golebiewski and Kutylowski}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {259}, year = {2011}, url = {http://eprint.iacr.org/2011/259}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Stinson11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Strenzke11, author = {Falko Strenzke}, title = {Fast and Secure Root-Finding for Code-based Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {672}, year = {2011}, url = {http://eprint.iacr.org/2011/672}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Strenzke11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Strenzke11a, author = {Falko Strenzke}, title = {Timing Attacks against the Syndrome Inversionin Code-based Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {683}, year = {2011}, url = {http://eprint.iacr.org/2011/683}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Strenzke11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SuF11, author = {Chen Su and Haining Fan}, title = {Impact of Intel's New Instruction Sets on Software Implementation of GF(2)[x] Multiplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {589}, year = {2011}, url = {http://eprint.iacr.org/2011/589}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SuF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Sule11, author = {Virendra Sule}, title = {Trapdoor oneway functions associated with exponentiation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {131}, year = {2011}, url = {http://eprint.iacr.org/2011/131}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Sule11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SuppakitpaisarnEI11, author = {Vorapong Suppakitpaisarn and Masato Edahiro and Hiroshi Imai}, title = {Fast Elliptic Curve Cryptography Using Optimal Double-Base Chains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {30}, year = {2011}, url = {http://eprint.iacr.org/2011/030}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SuppakitpaisarnEI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SwansonS11, author = {Colleen Swanson and Douglas R. Stinson}, title = {Unconditionally Secure Signature Schemes Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {104}, year = {2011}, url = {http://eprint.iacr.org/2011/104}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SwansonS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SwansonS11a, author = {Colleen Swanson and Douglas R. Stinson}, title = {Extended Combinatorial Constructions for Peer-to-peer User-Private Information Retrieval}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {674}, year = {2011}, url = {http://eprint.iacr.org/2011/674}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SwansonS11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TakehisaNM11, author = {Tatsuya Takehisa and Hiroki Nogawa and Masakatu Morii}, title = {{AES} Flow Interception: Key Snooping Method on Virtual Machine - Exception Handling Attack for {AES-NI} -}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {428}, year = {2011}, url = {http://eprint.iacr.org/2011/428}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TakehisaNM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Tall11, author = {Amadou Tall}, title = {A generalization of the Lucas addition chains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {378}, year = {2011}, url = {http://eprint.iacr.org/2011/378}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Tall11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TangCT11, author = {Deng Tang and Claude Carlet and Xiaohu Tang}, title = {Highly Nonlinear Boolean Functions with Optimal Algebraic Immunity and Good Behavior Against Fast Algebraic Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {366}, year = {2011}, url = {http://eprint.iacr.org/2011/366}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TangCT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TangDL11, author = {Shaohua Tang and Jintai Ding and Yujun Liang}, title = {A Simple and Efficient New Group Key Management Approach Based on Linear Geometry}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {225}, year = {2011}, url = {http://eprint.iacr.org/2011/225}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TangDL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TangDY11, author = {Shaohua Tang and Jintai Ding and Zhiming Yang}, title = {Secure Group Key Management Approach Based upon N-dimensional Hyper-sphere}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {216}, year = {2011}, url = {http://eprint.iacr.org/2011/216}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TangDY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TangGZ11, author = {Chunming Tang and Shuhong Gao and Chengli Zhang}, title = {The Optimal Linear Secret Sharing Scheme for Any Given Access Structure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {147}, year = {2011}, url = {http://eprint.iacr.org/2011/147}, timestamp = {Mon, 25 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/TangGZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TangWQGZW11, author = {Ming Tang and Xiaorong Wang and Zhenlong Qiu and Si Gao and Huanguo Zhang and Qianhong Wu}, title = {{DPA} Leakage Evaluation and Countermeasure Plug-in}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {77}, year = {2011}, url = {http://eprint.iacr.org/2011/077}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TangWQGZW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TaverneFARHL11, author = {Jonathan Taverne and Armando Faz{-}Hern{\'{a}}ndez and Diego F. Aranha and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and Darrel Hankerson and Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez}, title = {Software implementation of binary elliptic curves: impact of the carry-less multiplier on scalar multiplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {170}, year = {2011}, url = {http://eprint.iacr.org/2011/170}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TaverneFARHL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ThomaeW11, author = {Enrico Thomae and Christopher Wolf}, title = {Roots of Square: Cryptanalysis of Double-Layer Square and Square+}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {431}, year = {2011}, url = {http://eprint.iacr.org/2011/431}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ThomaeW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Toft11, author = {Tomas Toft}, title = {Secure Datastructures based on Multiparty Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {81}, year = {2011}, url = {http://eprint.iacr.org/2011/081}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Toft11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Tokareva11, author = {Natalia N. Tokareva}, title = {On the number of bent functions: lower bounds and hypotheses}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {83}, year = {2011}, url = {http://eprint.iacr.org/2011/083}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Tokareva11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Tokareva11a, author = {Natalia N. Tokareva}, title = {Generalizations of Bent Functions. {A} Survey}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {111}, year = {2011}, url = {http://eprint.iacr.org/2011/111}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Tokareva11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Tunstall11, author = {Michael Tunstall}, title = {Practical Complexity Differential Cryptanalysis and Fault Analysis of {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {453}, year = {2011}, url = {http://eprint.iacr.org/2011/453}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Tunstall11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Turan11, author = {Meltem S{\"{o}}nmez Turan}, title = {Evolutionary Construction of de Bruijn Sequences}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {711}, year = {2011}, url = {http://eprint.iacr.org/2011/711}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Turan11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TysowskiH11, author = {Piotr K. Tysowski and M. Anwarul Hasan}, title = {Re-Encryption-Based Key Management Towards Secure and Scalable Mobile Applications in Clouds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {668}, year = {2011}, url = {http://eprint.iacr.org/2011/668}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TysowskiH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Vajda11, author = {Istv{\'{a}}n Vajda}, title = {Cryptographically Sound Security Proof for On-Demand Source Routing Protocol EndairA}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {103}, year = {2011}, url = {http://eprint.iacr.org/2011/103}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Vajda11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Vajda11a, author = {Istv{\'{a}}n Vajda}, title = {Framework for Security Proofs for On-demand Routing Protocols in Multi-Hop Wireless Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {220}, year = {2011}, url = {http://eprint.iacr.org/2011/220}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Vajda11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Vajda11b, author = {Istv{\'{a}}n Vajda}, title = {New look at impossibility result on Dolev-Yao models with hashes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {335}, year = {2011}, url = {http://eprint.iacr.org/2011/335}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Vajda11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Vajda11c, author = {Istv{\'{a}}n Vajda}, title = {Non-malleable public key encryption in {BRSIM/UC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {470}, year = {2011}, url = {http://eprint.iacr.org/2011/470}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Vajda11c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Vajda11d, author = {Istv{\'{a}}n Vajda}, title = {{UC} framework for anonymous communication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {682}, year = {2011}, url = {http://eprint.iacr.org/2011/682}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Vajda11d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/VelichkaJS11, author = {Mark Velichka and Michael J. Jacobson Jr. and Andreas Stein}, title = {Computing Discrete Logarithms in the Jacobian of High-Genus Hyperelliptic Curves over Even Characteristic Finite Fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {98}, year = {2011}, url = {http://eprint.iacr.org/2011/098}, timestamp = {Wed, 23 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/VelichkaJS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Veyrat-CharvillonGRS11, author = {Nicolas Veyrat{-}Charvillon and Beno{\^{\i}}t G{\'{e}}rard and Mathieu Renauld and Fran{\c{c}}ois{-}Xavier Standaert}, title = {An optimal Key Enumeration Algorithm and its Application to Side-Channel Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {610}, year = {2011}, url = {http://eprint.iacr.org/2011/610}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Veyrat-CharvillonGRS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Veyrat-CharvillonS11, author = {Nicolas Veyrat{-}Charvillon and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Generic Side-Channel Distinguishers: Improvements and Limitations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {149}, year = {2011}, url = {http://eprint.iacr.org/2011/149}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Veyrat-CharvillonS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/VivekSR11, author = {S. Sree Vivek and S. Sharmila Deva Selvi and C. Pandu Rangan}, title = {Compact CCA-Secure Encryption with Ciphertext Verifiability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {361}, year = {2011}, url = {http://eprint.iacr.org/2011/361}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/VivekSR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Wang11, author = {Xiuqun Wang}, title = {A Novel Adaptive Proactive Secret Sharing without a Trusted Party}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {241}, year = {2011}, url = {http://eprint.iacr.org/2011/241}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Wang11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangF11, author = {Yongjia Wang and Haining Fan}, title = {GF(2\({}^{\mbox{n}}\)) redundant representation using matrix embedding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {556}, year = {2011}, url = {http://eprint.iacr.org/2011/556}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangTQY11, author = {Baocheng Wang and Chunming Tang and Yanfeng Qi and Yixian Yang}, title = {A generalization of the class of hyper-bent Boolean functions in binomial forms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {698}, year = {2011}, url = {http://eprint.iacr.org/2011/698}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/WangTQY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangTQYX11, author = {Baocheng Wang and Chunming Tang and Yanfeng Qi and Yixian Yang and Maozhi Xu}, title = {A New Class of Hyper-bent Boolean Functions with Multiple Trace Terms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {600}, year = {2011}, url = {http://eprint.iacr.org/2011/600}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/WangTQYX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangWYW11, author = {Xu An Wang and Liqiang Wu and Xiaoyuan Yang and Huaqun Wang}, title = {Cryptanalysis and Improvement of an Efficient {CCA} Secure {PKE} Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {224}, year = {2011}, url = {http://eprint.iacr.org/2011/224}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangWYW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangWZ11, author = {Mingqiang Wang and Xiaoyun Wang and Tao Zhan}, title = {Attack Cryptosystems Based on {HCDLP}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {253}, year = {2011}, url = {http://eprint.iacr.org/2011/253}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangWZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangWZ11a, author = {Mingqiang Wang and Xiaoyun Wang and Tao Zhan}, title = {The Fault Attack {ECDLP} Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {283}, year = {2011}, url = {http://eprint.iacr.org/2011/283}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangWZ11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangXZ11, author = {Guilin Wang and Fubiao Xia and Yunlei Zhao}, title = {Designated Confirmer Signatures With Unified Verification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {182}, year = {2011}, url = {http://eprint.iacr.org/2011/182}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangXZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangZ11, author = {Ping Wang and Fangguo Zhang}, title = {Computing Elliptic Curve Discrete Logarithms with the Negation Map}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {8}, year = {2011}, url = {http://eprint.iacr.org/2011/008}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangZ11a, author = {Bin Wang and Qing Zhao}, title = {A server-aided verification signature scheme without random oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {713}, year = {2011}, url = {http://eprint.iacr.org/2011/713}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangZ11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangZD11, author = {Bin Wang and Qing Zhao and Ke Dai}, title = {A non-interactive deniable authentication scheme in the standard model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {693}, year = {2011}, url = {http://eprint.iacr.org/2011/693}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangZD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WeiCR11, author = {Lei Wei and Scott E. Coull and Michael K. Reiter}, title = {Bounded Vector Signatures and their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {117}, year = {2011}, url = {http://eprint.iacr.org/2011/117}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WeiCR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WeiRGWWL11, author = {Lei Wei and Christian Rechberger and Jian Guo and Hongjun Wu and Huaxiong Wang and San Ling}, title = {Improved Meet-in-the-Middle Cryptanalysis of {KTANTAN}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {201}, year = {2011}, url = {http://eprint.iacr.org/2011/201}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/WeiRGWWL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WeiZW11, author = {Puwen Wei and Yuliang Zheng and Xiaoyun Wang}, title = {Public Key Encryption for the Forgetful}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {197}, year = {2011}, url = {http://eprint.iacr.org/2011/197}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/WeiZW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WengZ11, author = {Jian Weng and Yunlei Zhao}, title = {Direct Constructions of Bidirectional Proxy Re-Encryption with Alleviated Trust in Proxy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {208}, year = {2011}, url = {http://eprint.iacr.org/2011/208}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WengZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WhitnallO11, author = {Carolyn Whitnall and Elisabeth Oswald}, title = {A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {322}, year = {2011}, url = {http://eprint.iacr.org/2011/322}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WhitnallO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WhitnallO11a, author = {Carolyn Whitnall and Elisabeth Oswald}, title = {A Fair Evaluation Framework for Comparing Side-Channel Distinguishers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {403}, year = {2011}, url = {http://eprint.iacr.org/2011/403}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WhitnallO11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WhitnallOM11, author = {Carolyn Whitnall and Elisabeth Oswald and Luke Mather}, title = {An Exploration of the Kolmogorov-Smirnov Test as Competitor to Mutual Information Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {380}, year = {2011}, url = {http://eprint.iacr.org/2011/380}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WhitnallOM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Wikstrom11, author = {Douglas Wikstr{\"{o}}m}, title = {A Commitment-Consistent Proof of a Shuffle}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {168}, year = {2011}, url = {http://eprint.iacr.org/2011/168}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Wikstrom11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Williams11, author = {Stephen C. Williams}, title = {Analysis of the {SSH} Key Exchange Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {276}, year = {2011}, url = {http://eprint.iacr.org/2011/276}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Williams11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WolfT11, author = {Christopher Wolf and Enrico Thomae}, title = {Small Linearization: Memory Friendly Solving of Non-Linear Equations over Finite Fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {669}, year = {2011}, url = {http://eprint.iacr.org/2011/669}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WolfT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Wu011, author = {Wenling Wu and Lei Zhang}, title = {LBlock: {A} Lightweight Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {345}, year = {2011}, url = {http://eprint.iacr.org/2011/345}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Wu011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WuW11, author = {Shengbao Wu and Mingsheng Wang}, title = {Security Evaluation against Differential Cryptanalysis for Block Cipher Structures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {551}, year = {2011}, url = {http://eprint.iacr.org/2011/551}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WuW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WuZ11, author = {Hongfeng Wu and Changan Zhao}, title = {Faster Scalar Multiplication on Ordinary Weierstrass Elliptic Curves over Fields of Characteristic Three}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {468}, year = {2011}, url = {http://eprint.iacr.org/2011/468}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WuZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Xiao11, author = {David Xiao}, title = {Is privacy compatible with truthfulness?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {5}, year = {2011}, url = {http://eprint.iacr.org/2011/005}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Xiao11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Xu11, author = {Jia Xu}, title = {Auditing the Auditor: Secure Delegation of Auditing Operation over Cloud Storage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {304}, year = {2011}, url = {http://eprint.iacr.org/2011/304}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Xu11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Xu11a, author = {Jia Xu}, title = {Practically Efficient Verifiable Delegation of Polynomial and its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {473}, year = {2011}, url = {http://eprint.iacr.org/2011/473}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Xu11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Xu11b, author = {Jia Xu}, title = {Secure Cloud Storage with Encrypted Data using File-Based Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {538}, year = {2011}, url = {http://eprint.iacr.org/2011/538}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Xu11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XuC11, author = {Jia Xu and Ee{-}Chien Chang}, title = {Practically Efficient Proof of Retrievability in Cloud Storage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {362}, year = {2011}, url = {http://eprint.iacr.org/2011/362}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XuC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XuC11a, author = {Jia Xu and Ee{-}Chien Chang}, title = {Towards Efficient Provable Data Possession}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {574}, year = {2011}, url = {http://eprint.iacr.org/2011/574}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XuC11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XuJ11, author = {Peng Xu and Hai Jin}, title = {{SHS:} Secure Hybrid Search by Combining Dynamic and Static Indexes in {PEKS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {190}, year = {2011}, url = {http://eprint.iacr.org/2011/190}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XuJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XuLZ11, author = {Lei Xu and Dongdai Lin and Jing Zou}, title = {{ECDLP} on {GPU}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {146}, year = {2011}, url = {http://eprint.iacr.org/2011/146}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XuLZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XuX11, author = {ZiJie Xu and Ke Xu}, title = {Ways to restrict the differential path}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {307}, year = {2011}, url = {http://eprint.iacr.org/2011/307}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XuX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XuX11a, author = {ZiJie Xu and Ke Xu}, title = {Use Data-depend Function Build Message Expansion Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {656}, year = {2011}, url = {http://eprint.iacr.org/2011/656}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XuX11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangD11, author = {Qiushi Yang and Yvo Desmedt}, title = {Efficient 2-Round General Perfectly Secure Message Transmission: {A} Minor Correction to Yang and Desmedt's Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {265}, year = {2011}, url = {http://eprint.iacr.org/2011/265}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangDWTW11, author = {Guomin Yang and Shanshan Duan and Duncan S. Wong and Chik How Tan and Huaxiong Wang}, title = {Authenticated Key Exchange under Bad Randomness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {688}, year = {2011}, url = {http://eprint.iacr.org/2011/688}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangDWTW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangTY11, author = {Guangdong Yang and Shaohua Tang and Li Yang}, title = {A Novel Group Signature Scheme Based on {MPKC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {100}, year = {2011}, url = {http://eprint.iacr.org/2011/100}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangTY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YaoFCV11, author = {Gavin Xiaoxu Yao and Junfeng Fan and Ray C. C. Cheung and Ingrid Verbauwhede}, title = {A High Speed Pairing Coprocessor Using {RNS} and Lazy Reduction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {258}, year = {2011}, url = {http://eprint.iacr.org/2011/258}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YaoFCV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YaoZ11, author = {Andrew C. Yao and Yunlei Zhao}, title = {A New Family of Practical Non-Malleable Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {35}, year = {2011}, url = {http://eprint.iacr.org/2011/035}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YaoZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Yu11, author = {Ching{-}Hua Yu}, title = {Sign Modules in Secure Arithmetic Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {539}, year = {2011}, url = {http://eprint.iacr.org/2011/539}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Yu11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YuCJW11, author = {Hongbo Yu and Jiazhe Chen and Keting Jia and Xiaoyun Wang}, title = {Near-Collision Attack on the Step-Reduced Compression Function of Skein-256}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {148}, year = {2011}, url = {http://eprint.iacr.org/2011/148}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YuCJW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YuWL11, author = {Yuyin Yu and Mingsheng Wang and Yongqiang Li}, title = {Constructing differential 4-uniform permutations from know ones}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {47}, year = {2011}, url = {http://eprint.iacr.org/2011/047}, timestamp = {Mon, 31 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YuWL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YuY11, author = {Ching{-}Hua Yu and Bo{-}Yin Yang}, title = {Randomized Secure Two-Party Computation for Modular Conversion, Zero Test, Comparison, {MOD} and Exponentiation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {560}, year = {2011}, url = {http://eprint.iacr.org/2011/560}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YuY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZengCT11, author = {Bing Zeng and Liang Chen and Xueming Tang}, title = {A Perfectly Binding Commitment Scheme Against Quantum Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {223}, year = {2011}, url = {http://eprint.iacr.org/2011/223}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZengCT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZengTXJ11, author = {Bing Zeng and Xueming Tang and Peng Xu and Jiandu Jing}, title = {Practical Frameworks For h-Out-Of-n Oblivious Transfer With Security Against Covert and Malicious Adversaries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1}, year = {2011}, url = {http://eprint.iacr.org/2011/001}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZengTXJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Zhang11, author = {Fangguo Zhang}, title = {The Computational Square-Root Exponent Problem- Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {263}, year = {2011}, url = {http://eprint.iacr.org/2011/263}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Zhang11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Zhang11a, author = {Can Zhang}, title = {Comparing Different Definitions of Secure Session}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {278}, year = {2011}, url = {http://eprint.iacr.org/2011/278}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Zhang11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangTW11, author = {Yun Zhang and Christophe Tartary and Huaxiong Wang}, title = {An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem (Revised Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {392}, year = {2011}, url = {http://eprint.iacr.org/2011/392}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangTW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangW11, author = {Fangguo Zhang and Ping Wang}, title = {Speeding Up Elliptic Curve Discrete Logarithm Computations with Point Halving}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {461}, year = {2011}, url = {http://eprint.iacr.org/2011/461}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangXWMY11, author = {Ye Zhang and Chun Jason Xue and Duncan S. Wong and Nikos Mamoulis and Siu{-}Ming Yiu}, title = {Acceleration of Composite Order Bilinear Pairing on Graphics Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {196}, year = {2011}, url = {http://eprint.iacr.org/2011/196}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangXWMY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangZC11, author = {Huajun Zhang and Zongyang Zhang and Zhenfu Cao}, title = {Position-Verification in Multi-Channel Models}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {714}, year = {2011}, url = {http://eprint.iacr.org/2011/714}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangZC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangZL11, author = {Zijian Zhang and Liehuang Zhu and Lejian Liao}, title = {Computationally Sound Symbolic Security Reduction Analysis of Group Key Exchange Protocol using Bilinear Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {460}, year = {2011}, url = {http://eprint.iacr.org/2011/460}, timestamp = {Wed, 19 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangZL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoWG11, author = {Xin{-}jie Zhao and Tao Wang and Shize Guo}, title = {Fault-propagation Pattern Based {DFA} on {SPN} Structure Block Ciphers using Bitwise Permutation, with Application to {PRESENT} and PRINTcipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {86}, year = {2011}, url = {http://eprint.iacr.org/2011/086}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoWG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoWG11a, author = {Xin{-}jie Zhao and Tao Wang and Shize Guo}, title = {Improved Side Channel Cube Attacks on {PRESENT}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {165}, year = {2011}, url = {http://eprint.iacr.org/2011/165}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoWG11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoZ11, author = {Xingwen Zhao and Fangguo Zhang}, title = {Traitor Tracing against Public Collaboration (Full Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {84}, year = {2011}, url = {http://eprint.iacr.org/2011/084}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhengX11, author = {Qingji Zheng and Shouhuai Xu}, title = {Secure and Efficient Proof of Storage with Deduplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {529}, year = {2011}, url = {http://eprint.iacr.org/2011/529}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhengX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Zhou11, author = {Caixue Zhou}, title = {A Multi-Receiver ID-Based Generalized Signcryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {601}, year = {2011}, url = {http://eprint.iacr.org/2011/601}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Zhou11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhouH11, author = {Zhibin Zhou and Dijiang Huang}, title = {Efficient and Secure Data Storage Operations for Mobile Cloud Computing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {185}, year = {2011}, url = {http://eprint.iacr.org/2011/185}, timestamp = {Thu, 05 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhouH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhuG11, author = {Bo Zhu and Guang Gong}, title = {Guess-then-Meet-in-the-Middle Attacks on the {KTANTAN} Family of Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {619}, year = {2011}, url = {http://eprint.iacr.org/2011/619}, timestamp = {Thu, 15 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhuG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AriffinA11, title = {Linear Diophantine Equation Discrete Log Problem, Matrix Decomposition Problem and the AA-beta-cryptosystem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {145}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/145}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AriffinA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Aumasson11, title = {Exponential attacks on 6-round Luby-Rackoff and on 5-round Lai-Massey}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {15}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/015}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Aumasson11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoiKSYZ11, title = {(Efficient) Universally Composable Two-Party Computation Using a Minimal Number of Stateless Tokens}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {689}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/689}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoiKSYZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoudhuryKP11a, title = {Non-Applicability of Pseudobasis for Designing Perfectly Secure Message Transmission Protocols Against Non-Threshold Adversary}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {54}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/054}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoudhuryKP11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoudhuryKP11b, title = {Does Pseudo-basis Extend to General Adversary?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {82}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/082}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoudhuryKP11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chunsheng11, title = {Fully Homomorphic Encryption over the Binary Polynomials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {110}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/110}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Chunsheng11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoiselM11, title = {Untangling {RFID} Privacy Models}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {636}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/636}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoiselM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardHP11, title = {Leakage Resilient Secure Two-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {256}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/256}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardHP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DavidN11, title = {Deniable Encryption from the McEliece Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {144}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/144}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DavidN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DeySG11, title = {R-hash : Hash Function Using Random Quadratic Polynomials Over {GF(2)}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {450}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/450}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DeySG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DingF11, title = {Efficient Password-Based Authenticated Key Exchange from Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {599}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/599}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DingF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DongWWZ11, title = {Advanced Zero-Sum Distinguishers for the Permutations of the {PHOTON} Family}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {603}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/603}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DongWWZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ghadafi11, title = {Dynamic Group Blind Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {363}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/363}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ghadafi11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gu11a, title = {Multiplicative Learning with Errors and Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {119}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/119}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gu11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HabibiA11, title = {Two {RFID} Privacy Models in Front of a Court}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {625}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/625}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HabibiA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HajiabadiK11, title = {Co-induction and Computational Semantics for Public-key Encryption with Key Cycles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {85}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/085}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HajiabadiK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Han11, title = {Breaking a certificateless key agreement protocol withour bilinear pairing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {249}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/249}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Han11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Han11a, title = {Weakness of a Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {293}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/293}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Han11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/He11b, title = {Weakness in an ECC-based {AKA} Protocol for Wireless Mobile Communications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {336}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/336}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/He11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/He11c, title = {An efficient certificateless authenticated key agreement protocol without bilinear pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {347}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/347}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/He11c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeC11, title = {An efficient certificateless short signature scheme from pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {173}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/173}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeC11a, title = {An ID-based three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {195}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/195}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeC11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JiangMLL11, title = {Cryptanalysis of a Privacy-Preserving Communication Architecture for {V2G} Networks in Smart Grid}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {491}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/491}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JiangMLL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KardasACL11, title = {An Efficient and Private {RFID} Authentication Protocol Supporting Ownership Transfer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {667}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/667}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KardasACL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KardasKBD11, title = {A Novel {RFID} Distance Bounding Protocol Based on Physically Unclonable Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {75}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/075}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KardasKBD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhovratovichR11, title = {A Splice-and-Cut Cryptanalysis of the {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {274}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/274}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhovratovichR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KirazKBB11, title = {An Improved Internet Voting Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {341}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/341}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KirazKBB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiLW11, title = {Analysis and Improvement of Thing's Time-Memory Trade-Off Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {393}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/393}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiLW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiWZZ11, title = {Improved Integral Attacks on Reduced Round Camellia}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {163}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/163}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiWZZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinCXFC11, title = {Privacy-Preserving Friend Search over Online Social Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {445}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/445}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinCXFC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinFC11, title = {Private Information Extraction over Online Social Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {446}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/446}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinFC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lipmaa11b, title = {Efficient Multi-Query {CPIR} from Ring-LWE}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {595}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/595}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lipmaa11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuFC11, title = {On the Security of PPPoE Network}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {284}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/284}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuFC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Makwakwa11, title = {The Ligo Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {128}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/128}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Makwakwa11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Makwakwa11a, title = {The Block Cipher Vuna}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {154}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/154}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Makwakwa11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Makwakwa11b, title = {The Block Cipher Thuca}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {159}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/159}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Makwakwa11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MohamedDB11, title = {The Complexity Analysis of the MutantXL Family}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {36}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/036}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MohamedDB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PanD11, title = {Cryptanalysis of the AA\({}_{\mbox{beta}}\) Cryptosystem based on Linear Diophantine Equation Discrete Log Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {351}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/351}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PanD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PurohitR11a, title = {Elliptic Curve Point Multiplication Using {MBNR} and Point Halving}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {183}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/183}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PurohitR11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SinghG11, title = {Lower Bound on Covering Radius of Reed-Muller Codes in Set of Balanced Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {571}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/571}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SinghG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TangYCCD11, title = {High-speed Hardware Implementation of Rainbow Signatures on FPGAs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {155}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/155}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TangYCCD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TianHY11, title = {On the security of a certificateless short signature scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {419}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/419}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TianHY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TianHY11a, title = {Security analysis of a fuzzy identity-based encryption scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {523}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/523}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TianHY11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TianYH11, title = {Cryptanalysis and improvement of a certificateless multi-proxy signature scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {379}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/379}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TianYH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TooraniS11, title = {Security Weaknesses of password-only authenticated key establishment protocol without public key cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {527}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/527}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TooraniS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/UmadeviP11, title = {Some aspects of multi-variable secret sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {186}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/186}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/UmadeviP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XiongF11, title = {GF(2\({}^{\mbox{n}}\)) Subquadratic Polynomial Basis Multipliers for Some Irreducible Trinomials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {606}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/606}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XiongF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XuJWZ11, title = {Public-Key Encryption with Cluster-Chain-based Keyword Search}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {699}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/699}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XuJWZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Yang11, title = {Authenticated Key Exchange with Synchronized States}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {50}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/050}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Yang11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Yang11a, title = {Towards Strong Adaptive Corruption Security of Authenticated Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {51}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/051}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Yang11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangCW11, title = {Efficient Predicate Encryption Supporting Construction of Fine-Grained Searchable Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {409}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/409}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangCW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangZZ11, title = {An Improved Certificateless Authenticated Key Agreement Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {653}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/653}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangZZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YiTCC11, title = {A Parallel Hardware Architecture for the Solution of Linear Equation Systems Implemented over GF(2\({}^{\mbox{n}}\))}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {142}, year = {2011}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2011/142}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YiTCC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.