Search dblp for Publications

export results for "toc:db/journals/iacr/iacr2018.bht:"

more than 1000 matches, exporting first 1000 hits only!

 download as .bib file

@article{DBLP:journals/iacr/000118,
  author       = {Martin Strand},
  title        = {A verifiable shuffle for the {GSW} cryptosystem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {27},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/027},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/000118.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001C18,
  author       = {Yongjun Zhao and
                  Sherman S. M. Chow},
  title        = {Can you find the one for me? Privacy-Preserving Matchmaking via Threshold
                  {PSI}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {184},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/184},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001C18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001HKS18,
  author       = {Michael Backes and
                  Lucjan Hanzlik and
                  Kamil Kluczniak and
                  Jonas Schneider},
  title        = {Signatures with Flexible Public Key: {A} Unified Approach to Privacy-Preserving
                  Signatures (Full Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {191},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/191},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001HKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001MO18,
  author       = {Daniel P. Martin and
                  Luke Mather and
                  Elisabeth Oswald},
  title        = {Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel
                  Attacks Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {19},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/019},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001MO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001R18,
  author       = {Lorenzo Grassi and
                  Christian Rechberger},
  title        = {New Rigorous Analysis of Truncated Differentials for 5-round {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {182},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/182},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001R18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0002S18,
  author       = {Takahiro Matsuda and
                  Jacob C. N. Schuldt},
  title        = {Related Randomness Security for Public Key Encryption, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {41},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/041},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0002S18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0003QX18,
  author       = {Yu Chen and
                  Baodong Qin and
                  Haiyang Xue},
  title        = {Regularly Lossy Functions and Their Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {21},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/021},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0003QX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0012GK18,
  author       = {Xiao Wang and
                  S. Dov Gordon and
                  Jonathan Katz},
  title        = {Simple and Efficient Two-Server {ORAM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {5},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/005},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0012GK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0021GKW18,
  author       = {Jie Chen and
                  Junqing Gong and
                  Lucas Kowalczyk and
                  Hoeteck Wee},
  title        = {Unbounded {ABE} via Bilinear Entropy Expansion, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {116},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/116},
  timestamp    = {Thu, 07 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0021GKW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbadiTMD18,
  author       = {Aydin Abadi and
                  Sotirios Terzis and
                  Roberto Metere and
                  Changyu Dong},
  title        = {Efficient Delegated Private Set Intersection on Outsourced Private
                  Datasets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {496},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/496},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbadiTMD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdelraheemAGG18,
  author       = {Mohamed Ahmed Abdelraheem and
                  Tobias Andersson and
                  Christian Gehrmann and
                  Cornelius Glackin},
  title        = {Practical Attacks on Relational Databases Protected via Searchable
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {715},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/715},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdelraheemAGG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdolmalekiLSZ18,
  author       = {Behzad Abdolmaleki and
                  Helger Lipmaa and
                  Janno Siim and
                  Michal Zajac},
  title        = {On {QA-NIZK} in the {BPK} Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {877},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/877},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdolmalekiLSZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdouliABCHMM18,
  author       = {Ameera Salem Al Abdouli and
                  Mohamed Al Ali and
                  Emanuele Bellini and
                  Florian Caullery and
                  Alexandros Hasikos and
                  Marc Manzano and
                  V{\'{\i}}ctor Mateu},
  title        = {{DRANKULA:} a McEliece-like rank metric based cryptosystem implementation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {768},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/768},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdouliABCHMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbeAOT18,
  author       = {Masayuki Abe and
                  Miguel Ambrona and
                  Miyako Ohkubo and
                  Mehdi Tibouchi},
  title        = {Lower Bounds on Structure-Preserving Signatures for Bilateral Messages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {640},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/640},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbeAOT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbeJOR18,
  author       = {Masayuki Abe and
                  Charanjit S. Jutla and
                  Miyako Ohkubo and
                  Arnab Roy},
  title        = {Improved (Almost) Tightly-Secure Simulation-Sound {QA-NIZK} with Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {849},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/849},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbeJOR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Abraham18,
  author       = {Endre Abraham},
  title        = {Post-quantum verifiable random functions from ring signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1231},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1231},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Abraham18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbrahamDDNR18,
  author       = {Ittai Abraham and
                  Srinivas Devadas and
                  Danny Dolev and
                  Kartik Nayak and
                  Ling Ren},
  title        = {Synchronous Byzantine Agreement with Expected {O(1)} Rounds, Expected
                  O(n\({}^{\mbox{2)}}\) Communication, and Optimal Resilience},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1028},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1028},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbrahamDDNR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbrahamMNR18,
  author       = {Ittai Abraham and
                  Dahlia Malkhi and
                  Kartik Nayak and
                  Ling Ren},
  title        = {Dfinity Consensus, Explored},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1153},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1153},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbrahamMNR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbspoelBSV18,
  author       = {Mark Abspoel and
                  Niek J. Bouman and
                  Berry Schoenmakers and
                  Niels de Vreede},
  title        = {Fast Secure Comparison for Medium-Sized Integers and Its Application
                  in Binarized Neural Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1236},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1236},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbspoelBSV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AdjAM18,
  author       = {Gora Adj and
                  Omran Ahmadi and
                  Alfred Menezes},
  title        = {On Isogeny Graphs of Supersingular Elliptic Curves over Finite Fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {132},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/132},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AdjAM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AdjCCMR18,
  author       = {Gora Adj and
                  Daniel Cervantes{-}V{\'{a}}zquez and
                  Jes{\'{u}}s{-}Javier Chi{-}Dom{\'{\i}}nguez and
                  Alfred Menezes and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {On the cost of computing isogenies between supersingular elliptic
                  curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {313},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/313},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AdjCCMR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AdomnicaiFM18,
  author       = {Alexandre Adomnicai and
                  Jacques J. A. Fournier and
                  Laurent Masson},
  title        = {Masking the Lightweight Authenticated Ciphers {ACORN} and Ascon in
                  Software},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {708},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/708},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AdomnicaiFM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgarwalHKM18,
  author       = {Archita Agarwal and
                  Maurice Herlihy and
                  Seny Kamara and
                  Tarik Moataz},
  title        = {Encrypted Databases for Differential Privacy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {860},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/860},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgarwalHKM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AggarwalDNOPRS18,
  author       = {Divesh Aggarwal and
                  Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen and
                  Maciej Obremski and
                  Erick Purwanto and
                  Jo{\~{a}}o Ribeiro and
                  Mark Simkin},
  title        = {Stronger Leakage-Resilient and Non-Malleable Secret-Sharing Schemes
                  for General Access Structures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1147},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1147},
  timestamp    = {Sat, 18 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AggarwalDNOPRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AggarwalG18,
  author       = {Abhinav Aggarwal and
                  Yue Guo},
  title        = {A Simple Reduction from State Machine Replication to Binary Agreement
                  in Partially Synchronous or Asynchronous Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {60},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/060},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AggarwalG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AggarwalKO18,
  author       = {Divesh Aggarwal and
                  Tomasz Kazana and
                  Maciej Obremski},
  title        = {Leakage-resilient Algebraic Manipulation Detection Codes with Optimal
                  Parameters},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {58},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/058},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AggarwalKO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Aghaie0RS018,
  author       = {Anita Aghaie and
                  Amir Moradi and
                  Shahram Rasoolzadeh and
                  Falk Schellenberg and
                  Tobias Schneider},
  title        = {Impeccable Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {203},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/203},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Aghaie0RS018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AghiliM18,
  author       = {Seyed Farhad Aghili and
                  Hamid Mala},
  title        = {Security Analysis of Fan et al. Lightweight {RFID} Authentication
                  Protocol for Privacy Protection in IoT},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {388},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/388},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AghiliM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AghiliM18a,
  author       = {Seyed Farhad Aghili and
                  Hamid Mala},
  title        = {Breaking a Lightweight {M2M} Authentication Protocol for Communications
                  in IIoT Environment},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {891},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/891},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AghiliM18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Agievich18,
  author       = {Sergey Agievich},
  title        = {XS-circuits in Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {592},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/592},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Agievich18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Agrawal18,
  author       = {Shweta Agrawal},
  title        = {New Methods for Indistinguishability Obfuscation: Bootstrapping and
                  Instantiation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {633},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/633},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Agrawal18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalGM18,
  author       = {Shashank Agrawal and
                  Chaya Ganesh and
                  Payman Mohassel},
  title        = {Non-Interactive Zero-Knowledge Proofs for Composite Statements},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {557},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/557},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalGM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalM18,
  author       = {Shweta Agrawal and
                  Monosij Maitra},
  title        = {{FE} and iO for Turing Machines from Minimal Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {908},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/908},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalMMM18,
  author       = {Shashank Agrawal and
                  Peihan Miao and
                  Payman Mohassel and
                  Pratyay Mukherjee},
  title        = {{PASTA:} PASsword-based Threshold Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {885},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/885},
  timestamp    = {Wed, 02 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalMMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalMMR18,
  author       = {Shashank Agrawal and
                  Payman Mohassel and
                  Pratyay Mukherjee and
                  Peter Rindal},
  title        = {DiSE: Distributed Symmetric-key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {727},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/727},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalMMR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrikolaCH18,
  author       = {Thomas Agrikola and
                  Geoffroy Couteau and
                  Dennis Hofheinz},
  title        = {The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential
                  iO},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {470},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/470},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrikolaCH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrikolaH18,
  author       = {Thomas Agrikola and
                  Dennis Hofheinz},
  title        = {Interactively Secure Groups from Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {10},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/010},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrikolaH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AhmadiS18,
  author       = {Ahmad Ahmadi and
                  Reihaneh Safavi{-}Naini},
  title        = {Directional Distance-Bounding Identification Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {366},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/366},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AhmadiS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AhmadiSA18,
  author       = {Ahmad Ahmadi and
                  Reihaneh Safavi{-}Naini and
                  Md. Mamunur Rashid Akand},
  title        = {Anonymous Distance-Bounding Identification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {365},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/365},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AhmadiSA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ahn018,
  author       = {Na{-}Young Ahn and
                  Dong Hoon Lee},
  title        = {Countermeasures against a side-channel attack in a kernel memory},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {62},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/062},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ahn018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AkandS18,
  author       = {Md. Mamunur Rashid Akand and
                  Reihaneh Safavi{-}Naini},
  title        = {In-region Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {345},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/345},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AkandS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AkaviaFS18,
  author       = {Adi Akavia and
                  Dan Feldman and
                  Hayim Shaul},
  title        = {Secure Search via Multi-Ring Fully Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {245},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/245},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AkaviaFS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AkaviaFS18a,
  author       = {Adi Akavia and
                  Dan Feldman and
                  Hayim Shaul},
  title        = {Secure Data Retrieval On The Cloud Homomorphic Encryption Meets Coresets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1003},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1003},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AkaviaFS18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AkaviaGHL18,
  author       = {Adi Akavia and
                  Craig Gentry and
                  Shai Halevi and
                  Max Leibovich},
  title        = {Setup-Free Secure Search on Encrypted Data: Faster and Post-Processing
                  Free},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1235},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1235},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AkaviaGHL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AkhmetzyanovaAS18,
  author       = {Liliya R. Akhmetzyanova and
                  Evgeny K. Alekseev and
                  Stanislav V. Smyshlyaev},
  title        = {Security bound for {CTR-ACPKM} internally re-keyed encryption mode},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {950},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/950},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AkhmetzyanovaAS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AkhmetzyanovaCG18,
  author       = {Liliya R. Akhmetzyanova and
                  Cas Cremers and
                  Luke Garratt and
                  Stanislav V. Smyshlyaev},
  title        = {Security Analysis for Randomness Improvements for Security Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1057},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1057},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AkhmetzyanovaCG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlSabahOR18,
  author       = {Mashael AlSabah and
                  Gabriele Oligeri and
                  Ryan Riley},
  title        = {Your Culture is in Your Password: An Analysis of a Demographically-diverse
                  Password Dataset},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1063},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1063},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlSabahOR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlagicGM18,
  author       = {Gorjan Alagic and
                  Tommaso Gagliardoni and
                  Christian Majenz},
  title        = {Can you sign a quantum state},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1164},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1164},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlagicGM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlagicJOP18,
  author       = {Gorjan Alagic and
                  Stacey Jeffery and
                  Maris Ozols and
                  Alexander Poremba},
  title        = {On Quantum Chosen-Ciphertext Attacks and Learning with Errors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1185},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1185},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlagicJOP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlagicMRS18,
  author       = {Gorjan Alagic and
                  Christian Majenz and
                  Alexander Russell and
                  Fang Song},
  title        = {Quantum-secure message authentication via blind-unforgeability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1150},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1150},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlagicMRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtCDDPPVW18,
  author       = {Martin R. Albrecht and
                  Benjamin R. Curtis and
                  Amit Deo and
                  Alex Davidson and
                  Rachel Player and
                  Eamonn W. Postlethwaite and
                  Fernando Virdia and
                  Thomas Wunderer},
  title        = {Estimate all the \{LWE, NTRU\} schemes!},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {331},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/331},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbrechtCDDPPVW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtDP18,
  author       = {Martin R. Albrecht and
                  Amit Deo and
                  Kenneth G. Paterson},
  title        = {Cold Boot Attacks on Ring and Module {LWE} Keys Under the {NTT}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {672},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/672},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbrechtDP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtHHPVW18,
  author       = {Martin R. Albrecht and
                  Christian Hanser and
                  Andrea H{\"{o}}ller and
                  Thomas P{\"{o}}ppelmann and
                  Fernando Virdia and
                  Andreas Wallner},
  title        = {Learning with Errors on {RSA} Co-Processors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {425},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/425},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbrechtHHPVW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtMPS18,
  author       = {Martin R. Albrecht and
                  Jake Massimo and
                  Kenneth G. Paterson and
                  Juraj Somorovsky},
  title        = {Prime and Prejudice: Primality Testing Under Adversarial Conditions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {749},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/749},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbrechtMPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AldayaBHGT18,
  author       = {Alejandro Cabrera Aldaya and
                  Billy Bob Brumley and
                  Sohaib ul Hassan and
                  Cesar Pereida Garc{\'{\i}}a and
                  Nicola Tuveri},
  title        = {Port Contention for Fun and Profit},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1060},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1060},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AldayaBHGT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AldayaGTB18,
  author       = {Alejandro Cabrera Aldaya and
                  Cesar Pereida Garc{\'{\i}}a and
                  Luis Manuel Alvarez Tapia and
                  Billy Bob Brumley},
  title        = {Cache-Timing Attacks on {RSA} Key Generation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {367},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/367},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AldayaGTB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AliMS18,
  author       = {Mohammad Ali and
                  Javad Mohajeri and
                  Mohammad{-}Reza (Rafsanjani) Sadeghi},
  title        = {A fully distributed revocable ciphertext-policy hierarchical attribute-based
                  encryption without pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1102},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1102},
  timestamp    = {Fri, 19 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AliMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlmeidaBBPPP18,
  author       = {Jos{\'{e}} Bacelar Almeida and
                  Manuel Barbosa and
                  Gilles Barthe and
                  Hugo Pacheco and
                  Vitor Pereira and
                  Bernardo Portela},
  title        = {Enforcing ideal-world leakage bounds in real-world secret sharing
                  {MPC} frameworks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {404},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/404},
  timestamp    = {Fri, 29 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlmeidaBBPPP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlonsoH18,
  author       = {Kurt M. Alonso and
                  Jordi Herrera{-}Joancomart{\'{\i}}},
  title        = {Monero - Privacy in the Blockchain},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {535},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/535},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlonsoH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlsalamiZ18,
  author       = {Nasser Alsalami and
                  Bingsheng Zhang},
  title        = {Uncontrolled Randomness in Blockchains: Covert Bulletin Board for
                  Illicit Activities},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1184},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1184},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlsalamiZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AltugC18,
  author       = {Salim Ali Altug and
                  Yilei Chen},
  title        = {A Candidate Group with Infeasible Inversion},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {926},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/926},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AltugC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlwenBP18,
  author       = {Jo{\"{e}}l Alwen and
                  Jeremiah Blocki and
                  Krzysztof Pietrzak},
  title        = {Sustained Space Complexity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {147},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/147},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlwenBP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlwenCD18,
  author       = {Jo{\"{e}}l Alwen and
                  Sandro Coretti and
                  Yevgeniy Dodis},
  title        = {The Double Ratchet: Security Notions, Proofs, and Modularization for
                  the Signal Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1037},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1037},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlwenCD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AmbainisHU18,
  author       = {Andris Ambainis and
                  Mike Hamburg and
                  Dominique Unruh},
  title        = {Quantum security proofs using semi-classical oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {904},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/904},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AmbainisHU18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AmjadKM18,
  author       = {Ghous Amjad and
                  Seny Kamara and
                  Tarik Moataz},
  title        = {Breach-Resistant Structured Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {195},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/195},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AmjadKM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Amoussou-Guenou18,
  author       = {Yackolley Amoussou{-}Guenou and
                  Antonella Del Pozzo and
                  Maria Potop{-}Butucaru and
                  Sara {Tucci Piergiovanni}},
  title        = {Correctness and Fairness of Tendermint-core Blockchains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {574},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/574},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Amoussou-Guenou18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnadaA18,
  author       = {Hiroaki Anada and
                  Seiko Arita},
  title        = {Witness-Indistinguishable Arguments with {\(\Sigma\)}-Protocols for
                  Bundled Witness Spaces and its Application to Global Identities},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {742},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/742},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnadaA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnanthBJMS18,
  author       = {Prabhanjan Ananth and
                  Saikrishna Badrinarayanan and
                  Aayush Jain and
                  Nathan Manohar and
                  Amit Sahai},
  title        = {From {FE} Combiners to Secure {MPC} and Back},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {457},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/457},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnanthBJMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnanthCGJ18,
  author       = {Prabhanjan Ananth and
                  Arka Rai Choudhuri and
                  Aarushi Goel and
                  Abhishek Jain},
  title        = {Round-Optimal Secure Multiparty Computation with Honest Majority},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {572},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/572},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnanthCGJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnanthCGJ18a,
  author       = {Prabhanjan Ananth and
                  Arka Rai Choudhuri and
                  Aarushi Goel and
                  Abhishek Jain},
  title        = {Two Round Information-Theoretic {MPC} with Malicious Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1078},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1078},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnanthCGJ18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnanthF18,
  author       = {Prabhanjan Ananth and
                  Xiong Fan},
  title        = {Attribute Based Encryption for RAMs from {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {273},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/273},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnanthF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnanthIS18,
  author       = {Prabhanjan Ananth and
                  Yuval Ishai and
                  Amit Sahai},
  title        = {Private Circuits: {A} Modular Approach},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {566},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/566},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnanthIS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnanthJKS18,
  author       = {Prabhanjan Ananth and
                  Aayush Jain and
                  Dakshita Khurana and
                  Amit Sahai},
  title        = {Indistinguishability Obfuscation Without Multilinear Maps: iO from
                  LWE, Bilinear Maps, and Weak Pseudorandomness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {615},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/615},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnanthJKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnanthL18,
  author       = {Prabhanjan Ananth and
                  Alex Lombardi},
  title        = {Succinct Garbling Schemes from Functional Encryption through a Local
                  Simulation Paradigm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {759},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/759},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnanthL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnceaumePLPP18,
  author       = {Emmanuelle Anceaume and
                  Antonella Del Pozzo and
                  Romaric Ludinard and
                  Maria Potop{-}Butucaru and
                  Sara {Tucci Piergiovanni}},
  title        = {Blockchain Abstract Data Type},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {561},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/561},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnceaumePLPP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndoniMN18,
  author       = {Alexandr Andoni and
                  Tal Malkin and
                  Negev Shekel Nosatzki},
  title        = {Two Party Distribution Testing: Communication and Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1086},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1086},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AndoniMN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndreevaRVV18,
  author       = {Elena Andreeva and
                  Reza Reyhanitabar and
                  Kerem Varici and
                  Damian Viz{\'{a}}r},
  title        = {Forking a Blockcipher for Authenticated Encryption of Very Short Messages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {916},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/916},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AndreevaRVV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndreinaBKLM18,
  author       = {S{\'{e}}bastien Andreina and
                  Jens{-}Matthias Bohli and
                  Ghassan O. Karame and
                  Wenting Li and
                  Giorgia Azzurra Marson},
  title        = {PoTS - {A} Secure Proof of TEE-Stake for Permissionless Blockchains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1135},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1135},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AndreinaBKLM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnhC18,
  author       = {Nguyen Tuan Anh and
                  Nguyen Bui Cuong},
  title        = {Evaluating the indistinguishability of the {XTS} mode in the proposed
                  security model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {124},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/124},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnhC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnkeleBF18,
  author       = {Ralph Ankele and
                  Florian B{\"{o}}hl and
                  Simon Friedberger},
  title        = {MergeMAC: {A} {MAC} for Authentication with Strict Time Constraints
                  and Limited Bandwidth},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {342},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/342},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnkeleBF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnkeleK18,
  author       = {Ralph Ankele and
                  Stefan K{\"{o}}lbl},
  title        = {Mind the Gap - {A} Closer Look at the Security of Block Ciphers against
                  Differential Cryptanalysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {689},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/689},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnkeleK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnkeleL18,
  author       = {Ralph Ankele and
                  Eik List},
  title        = {Differential Cryptanalysis of Round-Reduced Sparx-64/128},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {332},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/332},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnkeleL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Anokhin18,
  author       = {Mikhail Anokhin},
  title        = {Pseudo-Free Families of Computational Universal Algebras},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1178},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1178},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Anokhin18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AonoNS18,
  author       = {Yoshinori Aono and
                  Phong Q. Nguyen and
                  Yixin Shen},
  title        = {Quantum Lattice Enumeration and Tweaking Discrete Pruning},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {546},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/546},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AonoNS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AonoNSS18,
  author       = {Yoshinori Aono and
                  Phong Q. Nguyen and
                  Takenobu Seito and
                  Junji Shikata},
  title        = {Lower Bounds on Lattice Enumeration with Extreme Pruning},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {586},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/586},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AonoNSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ApplebaumA18,
  author       = {Benny Applebaum and
                  Barak Arkis},
  title        = {Conditional Disclosure of Secrets and d-Uniform Secret Sharing with
                  Constant Information Rate},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/001},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ApplebaumA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ApplebaumBT18,
  author       = {Benny Applebaum and
                  Zvika Brakerski and
                  Rotem Tsabary},
  title        = {Perfect Secure Computation in Two Rounds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {894},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/894},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ApplebaumBT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ApplebaumHMS18,
  author       = {Benny Applebaum and
                  Thomas Holenstein and
                  Manoj Mishra and
                  Ofer Shayevitz},
  title        = {The Communication Complexity of Private Simultaneous Messages, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {144},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/144},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ApplebaumHMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ApplebaumV18,
  author       = {Benny Applebaum and
                  Prashant Nalini Vasudevan},
  title        = {Placing Conditional Disclosure of Secrets in the Communication Complexity
                  Universe},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1169},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1169},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ApplebaumV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AragonBGHZ18,
  author       = {Nicolas Aragon and
                  Olivier Blazy and
                  Philippe Gaborit and
                  Adrien Hauteville and
                  Gilles Z{\'{e}}mor},
  title        = {Durandal: a rank metric based signature scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1192},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1192},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AragonBGHZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArakiBFKLOT18,
  author       = {Toshinori Araki and
                  Assi Barak and
                  Jun Furukawa and
                  Marcel Keller and
                  Yehuda Lindell and
                  Kazuma Ohara and
                  Hikaru Tsuchida},
  title        = {Generalizing the {SPDZ} Compiler For Other Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {762},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/762},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArakiBFKLOT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArcherBLKNPSW18,
  author       = {David W. Archer and
                  Dan Bogdanov and
                  Yehuda Lindell and
                  Liina Kamm and
                  Kurt Nielsen and
                  Jakob Illeborg Pagter and
                  Nigel P. Smart and
                  Rebecca N. Wright},
  title        = {From Keys to Databases - Real-World Applications of Secure Multi-Party
                  Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {450},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/450},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArcherBLKNPSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArribasNR18,
  author       = {Victor Arribas and
                  Svetla Nikova and
                  Vincent Rijmen},
  title        = {Guards in Action: First-Order {SCA} Secure Implementations of Ketje
                  without Additional Randomness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {806},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/806},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArribasNR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AsayagCGLRTY18,
  author       = {Avi Asayag and
                  Gad Cohen and
                  Ido Grayevsky and
                  Maya Leshkowitz and
                  Ori Rottenstreich and
                  Ronen Tamari and
                  David Yakira},
  title        = {Helix: {A} Scalable and Fair Consensus Algorithm Resistant to Ordering
                  Manipulation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {863},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/863},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AsayagCGLRTY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AsharovEKP18,
  author       = {Gilad Asharov and
                  Naomi Ephraim and
                  Ilan Komargodski and
                  Rafael Pass},
  title        = {On the Complexity of Compressing Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {552},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/552},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AsharovEKP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AsharovKLNS18,
  author       = {Gilad Asharov and
                  Ilan Komargodski and
                  Wei{-}Kai Lin and
                  Kartik Nayak and
                  Elaine Shi},
  title        = {OptORAMa: Optimal Oblivious {RAM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {892},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/892},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AsharovKLNS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AsharovSS18,
  author       = {Gilad Asharov and
                  Gil Segev and
                  Ido Shahaf},
  title        = {Tight Tradeoffs in Searchable Symmetric Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {507},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/507},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AsharovSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AshokkumarRVM18,
  author       = {C. Ashokkumar and
                  Bholanath Roy and
                  M. Bhargav Sri Venkatesh and
                  Bernard L. Menezes},
  title        = {"S-Box" Implementation of {AES} is {NOT} side-channel resistant},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1002},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1002},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AshokkumarRVM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AshurD18,
  author       = {Tomer Ashur and
                  Siemen Dhooghe},
  title        = {MARVELlous: a STARK-Friendly Family of Cryptographic Primitives},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1098},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1098},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AshurD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AshurELLMRSV18,
  author       = {Tomer Ashur and
                  Maria Eichlseder and
                  Martin M. Lauridsen and
                  Ga{\"{e}}tan Leurent and
                  Brice Minaud and
                  Yann Rotella and
                  Yu Sasaki and
                  Beno{\^{\i}}t Viguier},
  title        = {Cryptanalysis of {MORUS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {464},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/464},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AshurELLMRSV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AshurP18,
  author       = {Tomer Ashur and
                  Raluca Posteuca},
  title        = {On linear hulls in one round of {DES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {635},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/635},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AshurP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AshurP18a,
  author       = {Tomer Ashur and
                  Raluca Posteuca},
  title        = {Cryptanalysis of the Full {DES} and the Full 3DES Using a New Linear
                  Property},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1219},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1219},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AshurP18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseFNV18,
  author       = {Giuseppe Ateniese and
                  Danilo Francati and
                  David Nu{\~{n}}ez and
                  Daniele Venturi},
  title        = {Match Me if You Can: Matchmaking Encryption and its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1094},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1094},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseFNV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Attrapadung0N0Y18,
  author       = {Nuttapong Attrapadung and
                  Takahiro Matsuda and
                  Ryo Nishimaki and
                  Shota Yamada and
                  Takashi Yamakawa},
  title        = {Constrained PRFs for {NC1} in Traditional Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {154},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/154},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Attrapadung0N0Y18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AttrapadungMNYY18,
  author       = {Nuttapong Attrapadung and
                  Takahiro Matsuda and
                  Ryo Nishimaki and
                  Shota Yamada and
                  Takashi Yamakawa},
  title        = {Adaptively Single-Key Secure Constrained PRFs for {NC1}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1000},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1000},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AttrapadungMNYY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtzeiBCLZ18,
  author       = {Nicola Atzei and
                  Massimo Bartoletti and
                  Tiziana Cimoli and
                  Stefano Lande and
                  Roberto Zunino},
  title        = {SoK: unraveling Bitcoin smart contracts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {192},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/192},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtzeiBCLZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AuerbachBK18,
  author       = {Benedikt Auerbach and
                  Mihir Bellare and
                  Eike Kiltz},
  title        = {Public-Key Encryption Resistant to Parameter Subversion and its Realization
                  from Efficiently-Embeddable Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {23},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/023},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AuerbachBK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AuerbachKPS18,
  author       = {Benedikt Auerbach and
                  Eike Kiltz and
                  Bertram Poettering and
                  Stefan Schoenen},
  title        = {Lossy Trapdoor Permutations with Improved Lossiness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1183},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1183},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AuerbachKPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AuerbachP18,
  author       = {Benedikt Auerbach and
                  Bertram Poettering},
  title        = {Hashing solutions instead of generating problems: On the interactive
                  certification of {RSA} moduli},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {13},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/013},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AuerbachP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BabuT18,
  author       = {Arun Babu Puthuparambil and
                  Jithin Jose Thomas},
  title        = {Freestyle, a randomized version of ChaCha for resisting offline brute-force
                  and dictionary attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1127},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1127},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BabuT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackendalBSS18,
  author       = {Matilda Backendal and
                  Mihir Bellare and
                  Jessica Sorrell and
                  Jiahao Sun},
  title        = {The Fiat-Shamir Zoo: Relating the Security of Different Signature
                  Variants},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {775},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/775},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackendalBSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesHS18,
  author       = {Michael Backes and
                  Lucjan Hanzlik and
                  Jonas Schneider},
  title        = {Membership Privacy for Fully Dynamic Group Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {641},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/641},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesHS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadawiCLMJTNAC18,
  author       = {Ahmad Al Badawi and
                  Jin Chao and
                  Jie Lin and
                  Chan Fook Mun and
                  Sim Jun Jie and
                  Benjamin Hong Meng Tan and
                  Xiao Nan and
                  Khin Mi Mi Aung and
                  Vijay Ramaseshan Chandrasekhar},
  title        = {The AlexNet Moment for Homomorphic Encryption: HCNN, the First Homomorphic
                  {CNN} on Encrypted Data with GPUs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1056},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1056},
  timestamp    = {Sun, 30 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadawiCLMJTNAC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadawiPAVR18,
  author       = {Ahmad Al Badawi and
                  Yuriy Polyakov and
                  Khin Mi Mi Aung and
                  Bharadwaj Veeravalli and
                  Kurt Rohloff},
  title        = {Implementation and Performance Evaluation of {RNS} Variants of the
                  {BFV} Homomorphic Encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {589},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/589},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadawiPAVR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadertscherBM18,
  author       = {Christian Badertscher and
                  Fabio Banfi and
                  Ueli Maurer},
  title        = {A Constructive Perspective on Signcryption Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {50},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/050},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadertscherBM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadertscherGKRZ18,
  author       = {Christian Badertscher and
                  Peter Gazi and
                  Aggelos Kiayias and
                  Alexander Russell and
                  Vassilis Zikas},
  title        = {Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic
                  Availability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {378},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/378},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadertscherGKRZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadertscherGMTZ18,
  author       = {Christian Badertscher and
                  Juan A. Garay and
                  Ueli Maurer and
                  Daniel Tschudi and
                  Vassilis Zikas},
  title        = {But Why does it Work? {A} Rational Protocol Design Treatment of Bitcoin},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {138},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/138},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadertscherGMTZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadertscherMT18,
  author       = {Christian Badertscher and
                  Ueli Maurer and
                  Bj{\"{o}}rn Tackmann},
  title        = {On Composable Security for Digital Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {15},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/015},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadertscherMT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadrinarayananF18,
  author       = {Saikrishna Badrinarayanan and
                  Rex Fernando and
                  Venkata Koppula and
                  Amit Sahai and
                  Brent Waters},
  title        = {Output Compression, MPC, and iO for Turing Machines},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {866},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/866},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadrinarayananF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadrinarayananJ18,
  author       = {Saikrishna Badrinarayanan and
                  Aayush Jain and
                  Nathan Manohar and
                  Amit Sahai},
  title        = {Secure {MPC:} Laziness Leads to {GOD}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {580},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/580},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadrinarayananJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadrinarayananJ18a,
  author       = {Saikrishna Badrinarayanan and
                  Abhishek Jain and
                  Rafail Ostrovsky and
                  Ivan Visconti},
  title        = {Non-Interactive Secure Computation from One-Way Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1020},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1020},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadrinarayananJ18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadrinarayananK18,
  author       = {Saikrishna Badrinarayanan and
                  Dakshita Khurana and
                  Amit Sahai and
                  Brent Waters},
  title        = {Upgrading to Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {281},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/281},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadrinarayananK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadrinarayananS18,
  author       = {Saikrishna Badrinarayanan and
                  Akshayaram Srinivasan},
  title        = {Revisiting Non-Malleable Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1144},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1144},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadrinarayananS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaekSKC18,
  author       = {Joonsang Baek and
                  Willy Susilo and
                  Jongkil Kim and
                  Yang{-}Wai Chow},
  title        = {Subversion in Practice: How to Efficiently Undermine Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1201},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1201},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaekSKC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaenaCEKV18,
  author       = {John Baena and
                  Daniel Cabarcas and
                  Daniel E. Escudero and
                  Karan Khathuria and
                  Javier A. Verbel},
  title        = {Rank Analysis of Cubic Multivariate Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {110},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/110},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaenaCEKV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BagariaKTFV18,
  author       = {Vivek Kumar Bagaria and
                  Sreeram Kannan and
                  David Tse and
                  Giulia Fanti and
                  Pramod Viswanath},
  title        = {Deconstructing the Blockchain to Approach Physical Limits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {992},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/992},
  timestamp    = {Wed, 20 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BagariaKTFV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BagherzadehA18,
  author       = {Elnaz Bagherzadeh and
                  Zahra Ahmadian},
  title        = {MILP-Based Automatic Differential Searches for {LEA} and {HIGHT}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {948},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/948},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BagherzadehA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaiCFW18,
  author       = {Yanan Bai and
                  Jingwei Chen and
                  Yong Feng and
                  Wenyuan Wu},
  title        = {Integer Matrices Homomorphic Encryption and Its application},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1025},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1025},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaiCFW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaiSW18,
  author       = {Shi Bai and
                  Damien Stehl{\'{e}} and
                  Weiqiang Wen},
  title        = {Measuring, simulating and exploiting the head concavity phenomenon
                  in {BKZ}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {856},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/856},
  timestamp    = {Tue, 30 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaiSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaiZWXWK18,
  author       = {Qianlan Bai and
                  Xinyan Zhou and
                  Xing Wang and
                  Yuedong Xu and
                  Xin Wang and
                  Qingsheng Kong},
  title        = {A Deep Dive into Blockchain Selfish Mining},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1084},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1084},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaiZWXWK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BajpaiK18,
  author       = {Abhishek Bajpai and
                  S. V. Kulgod},
  title        = {{FPGA} Cluster based high performance Cryptanalysis framework},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {656},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/656},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BajpaiK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaksiBBKP18,
  author       = {Anubhab Baksi and
                  Shivam Bhasin and
                  Jakub Breier and
                  Mustafa Khairallah and
                  Thomas Peyrin},
  title        = {Protecting Block Ciphers against Differential Fault Attacks without
                  Re-keying (Extended Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {85},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/085},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaksiBBKP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaldimtsiCY18,
  author       = {Foteini Baldimtsi and
                  Ran Canetti and
                  Sophia Yakoubov},
  title        = {Universally Composable Accumulators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1241},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1241},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaldimtsiCY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaldimtsiGRS18,
  author       = {Foteini Baldimtsi and
                  Sharon Goldberg and
                  Leonid Reyzin and
                  Omar Sagga},
  title        = {Certifying {RSA} Public Keys with an Efficient {NIZK}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {57},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/057},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaldimtsiGRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BallDGMT18,
  author       = {Marshall Ball and
                  Dana Dachman{-}Soled and
                  Siyao Guo and
                  Tal Malkin and
                  Li{-}Yang Tan},
  title        = {Non-Malleable Codes for Small-Depth Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {207},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/207},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BallDGMT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BallDKLM18,
  author       = {Marshall Ball and
                  Dana Dachman{-}Soled and
                  Mukul Kulkarni and
                  Huijia Lin and
                  Tal Malkin},
  title        = {Non-Malleable Codes Against Bounded Polynomial Time Tampering},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1015},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1015},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BallDKLM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BallRSV18,
  author       = {Marshall Ball and
                  Alon Rosen and
                  Manuel Sabin and
                  Prashant Nalini Vasudevan},
  title        = {Proofs of Work from Worst-Case Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {559},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/559},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BallRSV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BanaCE18,
  author       = {Gergei Bana and
                  Rohit Chadha and
                  Ajay Kumar Eeralla},
  title        = {Formal Analysis of Vote Privacy using Computationally Complete Symbolic
                  Attacker},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {624},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/624},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BanaCE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BanegasBBCDGGHK18,
  author       = {Gustavo Banegas and
                  Paulo S. L. M. Barreto and
                  Brice Odilon Boidje and
                  Pierre{-}Louis Cayrel and
                  Gilbert Ndollane Dione and
                  Kris Gaj and
                  Cheikh Thiecoumba Gueye and
                  Richard Haeussler and
                  Jean Belo Klamti and
                  Ousmane Ndiaye and
                  Duc Tri Nguyen and
                  Edoardo Persichetti and
                  Jefferson E. Ricardini},
  title        = {{DAGS:} Reloaded Revisiting Dyadic Key Encapsulation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1203},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1203},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BanegasBBCDGGHK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BanegasBPS18,
  author       = {Gustavo Banegas and
                  Paulo S. L. M. Barreto and
                  Edoardo Persichetti and
                  Paolo Santini},
  title        = {Designing Efficient Dyadic Operations for Cryptographic Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {650},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/650},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BanegasBPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BanegasCP18,
  author       = {Gustavo Banegas and
                  Ricardo Felipe Cust{\'{o}}dio and
                  Daniel Panario},
  title        = {A new class of irreducible pentanomials for polynomial based multipliers
                  in binary fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {554},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/554},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BanegasCP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BangaloreCP18,
  author       = {Laasya Bangalore and
                  Ashish Choudhury and
                  Arpita Patra},
  title        = {Almost-Surely Terminating Asynchronous Byzantine Agreement Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {394},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/394},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BangaloreCP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BanikRV18,
  author       = {Subhadeep Banik and
                  Francesco Regazzoni and
                  Serge Vaudenay},
  title        = {Lightweight Circuits with Shift and Swap},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1114},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1114},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BanikRV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BansarkhaniM18,
  author       = {Rachid El Bansarkhani and
                  Rafael Misoczki},
  title        = {G-Merkle: {A} Hash-Based Group Signature Scheme From Standard Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {274},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/274},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BansarkhaniM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BansodPP18,
  author       = {Gaurav Bansod and
                  Abhijit Patil and
                  Narayan Pisharoty},
  title        = {{GRANULE:} An Ultra lightweight cipher design for embedded security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {600},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/600},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BansodPP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaoGW18,
  author       = {Zhenzhen Bao and
                  Jian Guo and
                  Lei Wang},
  title        = {Functional Graphs and Their Applications in Generic Attacks on Iterated
                  Hash Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {374},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/374},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaoGW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bar-OnDKRS18,
  author       = {Achiya Bar{-}On and
                  Orr Dunkelman and
                  Nathan Keller and
                  Eyal Ronen and
                  Adi Shamir},
  title        = {Improved Key Recovery Attacks on Reduced-Round {AES} with Practical
                  Data and Memory Complexities},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {527},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/527},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bar-OnDKRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarakHJKS18,
  author       = {Boaz Barak and
                  Samuel B. Hopkins and
                  Aayush Jain and
                  Pravesh Kothari and
                  Amit Sahai},
  title        = {Sum-of-Squares Meets Program Obfuscation, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1237},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1237},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarakHJKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarakHKL18,
  author       = {Assi Barak and
                  Martin Hirt and
                  Lior Koskas and
                  Yehuda Lindell},
  title        = {An End-to-End System for Large Scale {P2P} MPC-as-a-Service and Low-Bandwidth
                  {MPC} for Weak Participants},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {751},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/751},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarakHKL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarbosaF18,
  author       = {Manuel Barbosa and
                  Pooya Farshim},
  title        = {Indifferentiable Authenticated Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {547},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/547},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarbosaF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarcauP18,
  author       = {Mugurel Barcau and
                  Vicentiu Pasol},
  title        = {Ring Homomorphic Encryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {583},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/583},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarcauP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarcauP18a,
  author       = {Mugurel Barcau and
                  Vicentiu Pasol},
  title        = {Bounded Fully Homomorphic Encryption from Monoid Algebras},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {584},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/584},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarcauP18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarelliC18,
  author       = {Elise Barelli and
                  Alain Couvreur},
  title        = {An efficient structural attack on {NIST} submission {DAGS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {456},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/456},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarelliC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarretoOB18,
  author       = {Paulo Barreto and
                  Glaucio Oliveira and
                  Waldyr Benits},
  title        = {Supersingular Isogeny Oblivious Transfer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {459},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/459},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarretoOB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarretoRSP18,
  author       = {Paulo S. L. M. Barreto and
                  Jefferson E. Ricardini and
                  Marcos A. Simpl{\'{\i}}cio Jr. and
                  Harsh Kupwade Patil},
  title        = {qSCMS: Post-quantum certificate provisioning process for {V2X}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1247},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1247},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarretoRSP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BartheBDFGSS18,
  author       = {Gilles Barthe and
                  Sonia Bela{\"{\i}}d and
                  Fran{\c{c}}ois Dupressoir and
                  Pierre{-}Alain Fouque and
                  Benjamin Gr{\'{e}}goire and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Pierre{-}Yves Strub},
  title        = {Improved Parallel Mask Refreshing Algorithms: Generic Solutions with
                  Parametrized Non-Interference {\&} Automated Optimizations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {505},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/505},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BartheBDFGSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BartheBEFGRT18,
  author       = {Gilles Barthe and
                  Sonia Bela{\"{\i}}d and
                  Thomas Espitau and
                  Pierre{-}Alain Fouque and
                  Benjamin Gr{\'{e}}goire and
                  M{\'{e}}lissa Rossi and
                  Mehdi Tibouchi},
  title        = {Masking the {GLP} Lattice-Based Signature Scheme at Any Order},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {381},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/381},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BartheBEFGRT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BartheBFG18,
  author       = {Gilles Barthe and
                  Sonia Bela{\"{\i}}d and
                  Pierre{-}Alain Fouque and
                  Benjamin Gr{\'{e}}goire},
  title        = {maskVerif: a formal tool for analyzing software and hardware masked
                  implementations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {562},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/562},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BartheBFG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BartheFGGJS18,
  author       = {Gilles Barthe and
                  Xiong Fan and
                  Joshua Gancher and
                  Benjamin Gr{\'{e}}goire and
                  Charlie Jacomme and
                  Elaine Shi},
  title        = {Symbolic Proofs for Lattice-Based Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {765},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/765},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BartheFGGJS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BartolettiCZ18,
  author       = {Massimo Bartoletti and
                  Tiziana Cimoli and
                  Roberto Zunino},
  title        = {Fun with Bitcoin smart contracts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {398},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/398},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BartolettiCZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BartolettiZ18,
  author       = {Massimo Bartoletti and
                  Roberto Zunino},
  title        = {BitML: a calculus for Bitcoin smart contracts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {122},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/122},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BartolettiZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BartolettiZ18a,
  author       = {Massimo Bartoletti and
                  Roberto Zunino},
  title        = {Verifying liquidity of Bitcoin contracts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1125},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1125},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BartolettiZ18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BartusekGMZ18,
  author       = {James Bartusek and
                  Jiaxin Guan and
                  Fermi Ma and
                  Mark Zhandry},
  title        = {Preventing Zeroizing Attacks on {GGH15}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {511},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/511},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BartusekGMZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BartusekLMZ18,
  author       = {James Bartusek and
                  Tancr{\`{e}}de Lepoint and
                  Fermi Ma and
                  Mark Zhandry},
  title        = {New Techniques for Obfuscating Conjunctions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {936},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/936},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BartusekLMZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BasilakisJ18,
  author       = {Jim Basilakis and
                  Bahman Javadi},
  title        = {Efficient Parallel Binary Operations on Homomorphic Encrypted Real
                  Numbers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {201},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/201},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BasilakisJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BasuS18,
  author       = {Atanu Basu and
                  Indranil Sengupta},
  title        = {Secure Cloud Storage Scheme Based On Hybrid Cryptosystem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {287},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/287},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BasuS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BatinaBJP18,
  author       = {Lejla Batina and
                  Shivam Bhasin and
                  Dirmanto Jap and
                  Stjepan Picek},
  title        = {{CSI} Neural Network: Using Side-channels to Recover Your Artificial
                  Neural Network Information},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {477},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/477},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BatinaBJP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BauerFM18,
  author       = {Balthazar Bauer and
                  Pooya Farshim and
                  Sogol Mazaheri},
  title        = {Combiners for Backdoored Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {770},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/770},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BauerFM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BauerVW18,
  author       = {Balthazar Bauer and
                  Jevgenijs Vihrovs and
                  Hoeteck Wee},
  title        = {On the Inner Product Predicate and a Generalization of Matching Vector
                  Families},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {945},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/945},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BauerVW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaumBCPGL18,
  author       = {Carsten Baum and
                  Jonathan Bootle and
                  Andrea Cerulli and
                  Rafa{\"{e}}l Del Pino and
                  Jens Groth and
                  Vadim Lyubashevsky},
  title        = {Sub-Linear Lattice-Based Zero-Knowledge Arguments for Arithmetic Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {560},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/560},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaumBCPGL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaumDD18,
  author       = {Carsten Baum and
                  Bernardo David and
                  Rafael Dowsley},
  title        = {Insured {MPC:} Efficient Secure Multiparty Computation with Punishable
                  Abort},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {942},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/942},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaumDD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaumLO18,
  author       = {Carsten Baum and
                  Huang Lin and
                  Sabine Oechsner},
  title        = {Towards Practical Lattice-Based One-Time Linkable Ring Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {107},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/107},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaumLO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BehniaOYR18,
  author       = {Rouzbeh Behnia and
                  Muslum Ozgur Ozmen and
                  Attila A. Yavuz and
                  Mike Rosulek},
  title        = {{TACHYON:} Fast Signatures from Compact Knapsack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {873},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/873},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BehniaOYR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeierleBU18,
  author       = {Christof Beierle and
                  Alex Biryukov and
                  Aleksei Udovenko},
  title        = {On Degree-d Zero-Sum Sets of Full Rank},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1194},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1194},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeierleBU18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeimelKN18,
  author       = {Amos Beimel and
                  Eyal Kushilevitz and
                  Pnina Nissim},
  title        = {The Complexity of Multiparty {PSM} Protocols and Related Models},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {148},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/148},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeimelKN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeimelP18,
  author       = {Amos Beimel and
                  Naty Peter},
  title        = {Optimal Linear Multiparty Conditional Disclosure of Secrets Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {441},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/441},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeimelP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BelaidGR18,
  author       = {Sonia Bela{\"{\i}}d and
                  Dahmun Goudarzi and
                  Matthieu Rivain},
  title        = {Tight Private Circuits: Achieving Probing Security with the Least
                  Refreshing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {439},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/439},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BelaidGR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareD18,
  author       = {Mihir Bellare and
                  Wei Dai},
  title        = {Defending Against Key Exfiltration: Efficiency Improvements for Big-Key
                  Cryptography via Large-Alphabet Subkey Prediction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {217},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/217},
  timestamp    = {Wed, 15 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareJL18,
  author       = {Mihir Bellare and
                  Joseph Jaeger and
                  Julia Len},
  title        = {Better Than Advertised: Improved Collision-Resistance Guarantees for
                  MD-Based Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {625},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/625},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareJL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellevilleCHC18,
  author       = {Nicolas Belleville and
                  Damien Courouss{\'{e}} and
                  Karine Heydemann and
                  Henri{-}Pierre Charles},
  title        = {Automated software protection for the masses against side-channel
                  attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1197},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1197},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellevilleCHC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BemmannBBBDEEHJ18,
  author       = {Kai Bemmann and
                  Johannes Bl{\"{o}}mer and
                  Jan Bobolz and
                  Henrik Br{\"{o}}cher and
                  Denis Diemert and
                  Fabian Eidens and
                  Lukas Eilers and
                  Jan Haltermann and
                  Jakob Juhnke and
                  Burhan Otour and
                  Laurens Porzenheim and
                  Simon Pukrop and
                  Erik Schilling and
                  Michael Schlichtig and
                  Marcel Stienemeier},
  title        = {Fully-Featured Anonymous Credentials with Reputation System},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {835},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/835},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BemmannBBBDEEHJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ben-SassonBHR18,
  author       = {Eli Ben{-}Sasson and
                  Iddo Bentov and
                  Yinon Horesh and
                  Michael Riabzev},
  title        = {Scalable, transparent, and post-quantum secure computational integrity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {46},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/046},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ben-SassonBHR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ben-SassonCRSVW18,
  author       = {Eli Ben{-}Sasson and
                  Alessandro Chiesa and
                  Michael Riabzev and
                  Nicholas Spooner and
                  Madars Virza and
                  Nicholas P. Ward},
  title        = {Aurora: Transparent Succinct Arguments for {R1CS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {828},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/828},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ben-SassonCRSVW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BergerB18,
  author       = {Ben Berger and
                  Zvika Brakerski},
  title        = {Zero-Knowledge Protocols for Search Problems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {437},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/437},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BergerB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BermanDRV18,
  author       = {Itay Berman and
                  Akshay Degwekar and
                  Ron D. Rothblum and
                  Prashant Nalini Vasudevan},
  title        = {From Laconic Zero-Knowledge to Public-Key Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {548},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/548},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BermanDRV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernardDM18,
  author       = {Olivier Bernard and
                  Renaud Dubois and
                  Simon Masson},
  title        = {Efficient four-dimensional {GLV} curve with high security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {305},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/305},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernardDM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BerndtL18,
  author       = {Sebastian Berndt and
                  Maciej Liskiewicz},
  title        = {On the Gold Standard for Security of Universal Steganography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {106},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/106},
  timestamp    = {Wed, 28 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BerndtL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernhardCGTW18,
  author       = {David Bernhard and
                  V{\'{e}}ronique Cortier and
                  Pierrick Gaudry and
                  Mathieu Turuani and
                  Bogdan Warinschi},
  title        = {Verifiability Analysis of CHVote},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1052},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1052},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernhardCGTW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinLMP18,
  author       = {Daniel J. Bernstein and
                  Tanja Lange and
                  Chloe Martindale and
                  Lorenz Panny},
  title        = {Quantum circuits for the {CSIDH:} optimizing quantum evaluation of
                  isogenies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1059},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1059},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinLMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinP18,
  author       = {Daniel J. Bernstein and
                  Edoardo Persichetti},
  title        = {Towards {KEM} Unification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {526},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/526},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BertiPP18,
  author       = {Francesco Berti and
                  Olivier Pereira and
                  Thomas Peters},
  title        = {Reconsidering Generic Composition: the Tag-then-Encrypt case},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {991},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/991},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BertiPP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bertoni0M18,
  author       = {Guido Marco Bertoni and
                  Lorenzo Grassi and
                  Filippo Melzani},
  title        = {Simulations of Optical Emissions for Attacking {AES} and Masked {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {291},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/291},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bertoni0M18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BertoniDHPAK18,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Seth Hoffert and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche and
                  Ronny Van Keer},
  title        = {The authenticated encryption schemes Kravatte-SANE and Kravatte-SANSE},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1012},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1012},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BertoniDHPAK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BettaleCZ18,
  author       = {Luk Bettale and
                  Jean{-}S{\'{e}}bastien Coron and
                  Rina Zeitoun},
  title        = {Improved High-Order Conversion From Boolean to Arithmetic Masking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {328},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/328},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BettaleCZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeullensB18,
  author       = {Ward Beullens and
                  Simon R. Blackburn},
  title        = {Practical attacks against the Walnut digital signature scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {318},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/318},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeullensB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeullensPS18,
  author       = {Ward Beullens and
                  Bart Preneel and
                  Alan Szepieniec},
  title        = {Public Key Compression for Constrained Linear Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {670},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/670},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeullensPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeunardeauCFGNV18,
  author       = {Marc Beunardeau and
                  Aisling Connolly and
                  Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache and
                  Damien Vergnaud},
  title        = {Reusing Nonces in Schnorr Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {69},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/069},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeunardeauCFGNV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Beyne18,
  author       = {Tim Beyne},
  title        = {Block Cipher Invariants as Eigenvectors of Correlation Matrices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {763},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/763},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Beyne18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhattacharyaGLR18,
  author       = {Sauvik Bhattacharya and
                  {\'{O}}scar Garc{\'{\i}}a{-}Morch{\'{o}}n and
                  Thijs Laarhoven and
                  Ronald Rietman and
                  Markku{-}Juhani O. Saarinen and
                  Ludo Tolhuizen and
                  Zhenfei Zhang},
  title        = {Round5: Compact and Fast Post-Quantum Public-Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {725},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/725},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BhattacharyaGLR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhattacharyaN18,
  author       = {Srimanta Bhattacharya and
                  Mridul Nandi},
  title        = {Full Indifferentiable Security of the Xor of Two or More Random Permutations
                  Using the {\(\chi\)}\({}^{\mbox{2}}\) Method},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {169},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/169},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BhattacharyaN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhaumikLN18,
  author       = {Ritam Bhaumik and
                  Eik List and
                  Mridul Nandi},
  title        = {{ZCZ} - Achieving n-bit {SPRP} Security with a Minimal Number of Tweakable-block-cipher
                  Calls},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {819},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/819},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BhaumikLN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BiDLZW18,
  author       = {Wenquan Bi and
                  Xiaoyang Dong and
                  Zheng Li and
                  Rui Zong and
                  Xiaoyun Wang},
  title        = {MILP-aided Cube-attack-like Cryptanalysis on Keccak Keyed Modes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {75},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/075},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BiDLZW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BicerBK18,
  author       = {Osman Bi{\c{c}}er and
                  Muhammed Ali Bing{\"{o}}l and
                  Mehmet Sabir Kiraz},
  title        = {Highly Efficient and Reusable Private Function Evaluation with Linear
                  Complexity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {515},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/515},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BicerBK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BindelBFGS18,
  author       = {Nina Bindel and
                  Jacqueline Brendel and
                  Marc Fischlin and
                  Brian Goncalves and
                  Douglas Stebila},
  title        = {Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {903},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/903},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BindelBFGS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BiryukovU18,
  author       = {Alex Biryukov and
                  Aleksei Udovenko},
  title        = {Attacks and Countermeasures for White-box Designs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {49},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/049},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BiryukovU18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BishopKMP0S18,
  author       = {Allison Bishop and
                  Lucas Kowalczyk and
                  Tal Malkin and
                  Valerio Pastro and
                  Mariana Raykova and
                  Kevin Shi},
  title        = {A Simple Obfuscation Scheme for Pattern-Matching with Wildcards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {210},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/210},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BishopKMP0S18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyL18,
  author       = {Nir Bitansky and
                  Huijia Lin},
  title        = {One-Message Zero Knowledge and Non-Malleable Commitments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {613},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/613},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BitanskyL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyP18,
  author       = {Nir Bitansky and
                  Omer Paneth},
  title        = {Weak Zero-Knowledge Beyond the Black-Box Barrier},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {895},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/895},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BitanskyP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlantonJ18,
  author       = {Marina Blanton and
                  Myoungin Jeong},
  title        = {Improved Signature Schemes for Secure Multi-Party Computation with
                  Certified Inputs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {736},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/736},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlantonJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlazyGP18,
  author       = {Olivier Blazy and
                  Paul Germouty and
                  Duong Hieu Phan},
  title        = {Downgradable Identity-based Encryption and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1176},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1176},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlazyGP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlockGMN18,
  author       = {Alexander R. Block and
                  Divya Gupta and
                  Hemanta K. Maji and
                  Hai H. Nguyen},
  title        = {Secure Computation using Leaky Correlations (Asymptotically Optimal
                  Constructions)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {372},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/372},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlockGMN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlockMN18,
  author       = {Alexander R. Block and
                  Hemanta K. Maji and
                  Hai H. Nguyen},
  title        = {Secure Computation with Constant Communication Overhead using Multiplication
                  Embeddings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {395},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/395},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlockMN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Blocki0Z18,
  author       = {Jeremiah Blocki and
                  Ling Ren and
                  Samson Zhou},
  title        = {Bandwidth-Hard Functions: Reductions and Lower Bounds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {221},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/221},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Blocki0Z18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlockiHKLXZ18,
  author       = {Jeremiah Blocki and
                  Benjamin Harsha and
                  Siteng Kang and
                  Seunghoon Lee and
                  Lu Xing and
                  Samson Zhou},
  title        = {Data-Independent Memory Hard Functions: New Attacks and Stronger Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {944},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/944},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlockiHKLXZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BloemGIKM18,
  author       = {Roderick Bloem and
                  Hannes Gro{\ss} and
                  Rinat Iusupov and
                  Martin Krenn and
                  Stefan Mangard},
  title        = {Sharing Independence {\&} Relabeling: Efficient Formal Verification
                  of Higher-Order Masking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1031},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1031},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BloemGIKM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlomerB18,
  author       = {Johannes Bl{\"{o}}mer and
                  Jan Bobolz},
  title        = {Delegatable Attribute-based Anonymous Credentials from Dynamically
                  Malleable Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {340},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/340},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlomerB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlomerEJ18,
  author       = {Johannes Bl{\"{o}}mer and
                  Fabian Eidens and
                  Jakob Juhnke},
  title        = {Practical, Anonymous, and Publicly Linkable Universally-Composable
                  Reputation Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {29},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/029},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlomerEJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlomerEJ18a,
  author       = {Johannes Bl{\"{o}}mer and
                  Fabian Eidens and
                  Jakob Juhnke},
  title        = {Enhanced Security of Attribute-Based Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {874},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/874},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlomerEJ18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BobowskiS18,
  author       = {Adam Bobowski and
                  Marcin Slowik},
  title        = {Reducing Complexity of Pairing Comparisons using Polynomial Evaluation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {523},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/523},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BobowskiS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BockBMT18,
  author       = {Estuardo Alpirez Bock and
                  Chris Brzuska and
                  Wil Michiels and
                  Alexander Treff},
  title        = {On the Ineffectiveness of Internal Encodings - Revisiting the {DCA}
                  Attack on White-Box Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {301},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/301},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BockBMT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogatovKR18,
  author       = {Dmytro Bogatov and
                  George Kollios and
                  Leonid Reyzin},
  title        = {A Comparative Evaluation of Order-Preserving and Order-Revealing Schemes
                  and Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {953},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/953},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BogatovKR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogdanovRVW18,
  author       = {Andrey Bogdanov and
                  Matthieu Rivain and
                  Philip S. Vejre and
                  Junwei Wang},
  title        = {Higher-Order {DCA} against Standard Side-Channel Countermeasures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {869},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/869},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BogdanovRVW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoilovKN18,
  author       = {Dusan Bozilov and
                  Miroslav Knezevic and
                  Ventzislav Nikov},
  title        = {Optimized Threshold Implementations: Securing Cryptographic Accelerators
                  for Low-Energy and Low-Latency Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {922},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/922},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoilovKN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bolboceanu18,
  author       = {Madalina Bolboceanu},
  title        = {Relating different Polynomial-LWE problems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1035},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1035},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bolboceanu18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehBBF18,
  author       = {Dan Boneh and
                  Joseph Bonneau and
                  Benedikt B{\"{u}}nz and
                  Ben Fisch},
  title        = {Verifiable Delay Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {601},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/601},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehBBF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehBF18,
  author       = {Dan Boneh and
                  Benedikt B{\"{u}}nz and
                  Ben Fisch},
  title        = {A Survey of Two Verifiable Delay Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {712},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/712},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehBF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehBF18a,
  author       = {Dan Boneh and
                  Benedikt B{\"{u}}nz and
                  Ben Fisch},
  title        = {Batching Techniques for Accumulators with Applications to IOPs and
                  Stateless Blockchains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1188},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1188},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehBF18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehDN18,
  author       = {Dan Boneh and
                  Manu Drijvers and
                  Gregory Neven},
  title        = {Compact Multi-Signatures for Smaller Blockchains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {483},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/483},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehDN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehEF18,
  author       = {Dan Boneh and
                  Saba Eskandarian and
                  Ben Fisch},
  title        = {Post-Quantum Group Signatures from Symmetric Primitives},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {261},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/261},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehEF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehGKLSSTZ18,
  author       = {Dan Boneh and
                  Darren B. Glass and
                  Daniel Krashen and
                  Kristin E. Lauter and
                  Shahed Sharif and
                  Alice Silverberg and
                  Mehdi Tibouchi and
                  Mark Zhandry},
  title        = {Multiparty Non-Interactive Key Exchange and More From Isogenies on
                  Elliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {665},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/665},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehGKLSSTZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehIPSW18,
  author       = {Dan Boneh and
                  Yuval Ishai and
                  Alain Passel{\`{e}}gue and
                  Amit Sahai and
                  David J. Wu},
  title        = {Exploring Crypto Dark Matter: New Simple {PRF} Candidates and Their
                  Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1218},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1218},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehIPSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehISW18,
  author       = {Dan Boneh and
                  Yuval Ishai and
                  Amit Sahai and
                  David J. Wu},
  title        = {Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {133},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/133},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehISW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonnetainN18,
  author       = {Xavier Bonnetain and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  title        = {Hidden Shift Quantum Cryptanalysis and Implications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {432},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/432},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonnetainN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonnetainNS18,
  author       = {Xavier Bonnetain and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Andr{\'{e}} Schrottenloher},
  title        = {On Quantum Slide Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1067},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1067},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonnetainNS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonnetainS18,
  author       = {Xavier Bonnetain and
                  Andr{\'{e}} Schrottenloher},
  title        = {Quantum Security Analysis of {CSIDH} and Ordinary Isogeny-based Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {537},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/537},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonnetainS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonteV18,
  author       = {Charlotte Bonte and
                  Frederik Vercauteren},
  title        = {Privacy-Preserving Logistic Regression Training},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {233},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/233},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonteV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BootlandCIV18,
  author       = {Carl Bootland and
                  Wouter Castryck and
                  Ilia Iliashenko and
                  Frederik Vercauteren},
  title        = {Efficiently Processing Complex-Valued Data in Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {785},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/785},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BootlandCIV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BootlandCV18,
  author       = {Carl Bootland and
                  Wouter Castryck and
                  Frederik Vercauteren},
  title        = {On the Security of the Multivariate Ring Learning with Errors Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {966},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/966},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BootlandCV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BootleCGJM18,
  author       = {Jonathan Bootle and
                  Andrea Cerulli and
                  Jens Groth and
                  Sune K. Jakobsen and
                  Mary Maller},
  title        = {Nearly Linear-Time Zero-Knowledge Proofs for Correct Program Execution},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {380},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/380},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BootleCGJM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BootleDEFT18,
  author       = {Jonathan Bootle and
                  Claire Delaplace and
                  Thomas Espitau and
                  Pierre{-}Alain Fouque and
                  Mehdi Tibouchi},
  title        = {{LWE} Without Modular Reduction and Improved Side-Channel Attacks
                  Against {BLISS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {822},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/822},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BootleDEFT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BootleG18,
  author       = {Jonathan Bootle and
                  Jens Groth},
  title        = {Efficient Batch Zero-Knowledge Arguments for Low Degree Polynomials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {45},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/045},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BootleG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BorgaonkarHPS18,
  author       = {Ravishankar Borgaonkar and
                  Lucca Hirschi and
                  Shinjo Park and
                  Altaf Shaik},
  title        = {New Privacy Threat on 3G, 4G, and Upcoming 5G {AKA} Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1175},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1175},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BorgaonkarHPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BorgesDFLOP18,
  author       = {Guilherme Borges and
                  Henrique Jo{\~{a}}o L. Domingos and
                  Bernardo Ferreira and
                  Jo{\~{a}}o Leit{\~{a}}o and
                  Tiago Oliveira and
                  Bernardo Portela},
  title        = {{BISEN:} Efficient Boolean Searchable Symmetric Encryption with Verifiability
                  and Minimal Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {588},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/588},
  timestamp    = {Fri, 24 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BorgesDFLOP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosF18,
  author       = {Joppe W. Bos and
                  Simon Friedberger},
  title        = {Arithmetic Considerations for Isogeny Based Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {376},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/376},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosF18a,
  author       = {Joppe W. Bos and
                  Simon Friedberger},
  title        = {Faster Modular Arithmetic For Isogeny Based Crypto on Embedded Devices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {792},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/792},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosF18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosFMOS18,
  author       = {Joppe W. Bos and
                  Simon Friedberger and
                  Marco Martinoli and
                  Elisabeth Oswald and
                  Martijn Stam},
  title        = {Assessing the Feasibility of Single Trace Power Analysis of Frodo},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {687},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/687},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosFMOS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosFMOS18a,
  author       = {Joppe W. Bos and
                  Simon Friedberger and
                  Marco Martinoli and
                  Elisabeth Oswald and
                  Martijn Stam},
  title        = {Fly, you fool! Faster Frodo for the {ARM} Cortex-M4},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1116},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1116},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosFMOS18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoschiniCN18,
  author       = {Cecilia Boschini and
                  Jan Camenisch and
                  Gregory Neven},
  title        = {Floppy-Sized Group Signatures from Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {453},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/453},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoschiniCN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoseHT18,
  author       = {Priyanka Bose and
                  Viet Tung Hoang and
                  Stefano Tessaro},
  title        = {Revisiting {AES-GCM-SIV:} Multi-user Security, Faster Key Derivation,
                  and Better Bounds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {136},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/136},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoseHT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoshrooyehKO18,
  author       = {Sanaz Taheri Boshrooyeh and
                  Alptekin K{\"{u}}p{\c{c}}{\"{u}} and
                  {\"{O}}znur {\"{O}}zkasap},
  title        = {{PPAD:} Privacy Preserving Group-Based ADvertising in Online Social
                  Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {323},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/323},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoshrooyehKO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoumanV18,
  author       = {Niek J. Bouman and
                  Niels de Vreede},
  title        = {New Protocols for Secure Linear Algebra: Pivoting-Free Elimination
                  and Fast Block-Recursive Matrix Decomposition},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {703},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/703},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoumanV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouraCJS18,
  author       = {Christina Boura and
                  Anne Canteaut and
                  J{\'{e}}r{\'{e}}my Jean and
                  Valentin Suder},
  title        = {Two Notions of Differential Equivalence on Sboxes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {617},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/617},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouraCJS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouraGG18,
  author       = {Christina Boura and
                  Nicolas Gama and
                  Mariya Georgieva},
  title        = {Chimera: a unified framework for B/FV, {TFHE} and {HEAAN} fully homomorphic
                  encryption and predictions for deep learning},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {758},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/758},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouraGG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoureanuA18,
  author       = {Ioana Boureanu and
                  Anda Anda},
  title        = {Another Look at Relay and Distance-based Attacks in Contactless Payments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {402},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/402},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoureanuA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouvierI18,
  author       = {Cyril Bouvier and
                  Laurent Imbert},
  title        = {Faster cofactorization with {ECM} using mixed representations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {669},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/669},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouvierI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoweCGMMW18,
  author       = {Sean Bowe and
                  Alessandro Chiesa and
                  Matthew Green and
                  Ian Miers and
                  Pratyush Mishra and
                  Howard Wu},
  title        = {Zexe: Enabling Decentralized Private Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {962},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/962},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoweCGMMW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoweG18,
  author       = {Sean Bowe and
                  Ariel Gabizon},
  title        = {Making Groth's zk-SNARK Simulation Extractable in the Random Oracle
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {187},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/187},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoweG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoydDGJ18,
  author       = {Colin Boyd and
                  Gareth T. Davies and
                  Kristian Gj{\o}steen and
                  Yao Jiang},
  title        = {Offline Assisted Group Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {114},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/114},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoydDGJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoydDGRT18,
  author       = {Colin Boyd and
                  Gareth T. Davies and
                  Kristian Gj{\o}steen and
                  H{\aa}vard Raddum and
                  Mohsen Toorani},
  title        = {Definitions for Plaintext-Existence Hiding in Cloud Storage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {748},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/748},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoydDGRT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleCDH18,
  author       = {Elette Boyle and
                  Ran Cohen and
                  Deepesh Data and
                  Pavel Hub{\'{a}}cek},
  title        = {Must the Communication Graph of {MPC} Protocols be an Expander?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {540},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/540},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyleCDH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleCGIO18,
  author       = {Elette Boyle and
                  Geoffroy Couteau and
                  Niv Gilboa and
                  Yuval Ishai and
                  Michele Orr{\`{u}}},
  title        = {Homomorphic Secret Sharing: Optimizations and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {419},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/419},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyleCGIO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleGI18,
  author       = {Elette Boyle and
                  Niv Gilboa and
                  Yuval Ishai},
  title        = {Function Secret Sharing: Improvements and Extensions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {707},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/707},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyleGI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleIP18,
  author       = {Elette Boyle and
                  Yuval Ishai and
                  Antigoni Polychroniadou},
  title        = {Limits of Practical Sublinear Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {571},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/571},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyleIP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleLV18,
  author       = {Elette Boyle and
                  Rio LaVigne and
                  Vinod Vaikuntanathan},
  title        = {Adversarially Robust Property Preserving Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1158},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1158},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyleLV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Boztas18,
  author       = {Serdar Boztas},
  title        = {On Renyi Entropies and their Applications to Guessing Attacks in Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {455},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/455},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Boztas18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Brakerski18,
  author       = {Zvika Brakerski},
  title        = {Quantum {FHE} (Almost) As Secure as Classical},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {338},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/338},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Brakerski18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiD18,
  author       = {Zvika Brakerski and
                  Nico D{\"{o}}ttling},
  title        = {Two-Message Statistical Sender-Private {OT} from {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {530},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/530},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiK18,
  author       = {Zvika Brakerski and
                  Yael Tauman Kalai},
  title        = {Monotone Batch NP-Delegation with Applications to Access Control},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {375},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/375},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiLVW18,
  author       = {Zvika Brakerski and
                  Vadim Lyubashevsky and
                  Vinod Vaikuntanathan and
                  Daniel Wichs},
  title        = {Worst-Case Hardness for {LPN} and Cryptographic Hashing via Code Smoothing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {279},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/279},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiLVW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiP18,
  author       = {Zvika Brakerski and
                  Renen Perlman},
  title        = {Order-LWE and the Hardness of Ring-LWE with Entropic Secrets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {494},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/494},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrancoDGM18,
  author       = {Pedro Branco and
                  Jintai Ding and
                  Manuel Goul{\~{a}}o and
                  Paulo Mateus},
  title        = {Universally Composable Oblivious Transfer Protocol based on the {RLWE}
                  Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1155},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1155},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrancoDGM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BreierHL18,
  author       = {Jakub Breier and
                  Xiaolu Hou and
                  Yang Liu},
  title        = {Fault Resilient Encoding Schemes in Software: How Far Can We Go?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {218},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/218},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BreierHL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BreierJHB18,
  author       = {Jakub Breier and
                  Dirmanto Jap and
                  Xiaolu Hou and
                  Shivam Bhasin},
  title        = {On Side-Channel Vulnerabilities of Bit Permutations: Key Recovery
                  and Reverse Engineering},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {219},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/219},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BreierJHB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Breitner18,
  author       = {Joachim Breitner},
  title        = {More on sliding right},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1163},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1163},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Breitner18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BreunesseKMS18,
  author       = {Cees{-}Bart Breunesse and
                  Ilya Kizhvatov and
                  Ruben Muijrers and
                  Albert Spruyt},
  title        = {Towards Fully Automated Analysis of Whiteboxes: Perfect Dimensionality
                  Reduction for Perfect Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {95},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/095},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BreunesseKMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BroadbentGZ18,
  author       = {Anne Broadbent and
                  Sevag Gharibian and
                  Hong{-}Sheng Zhou},
  title        = {Towards Quantum One-Time Memories from Stateless Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {960},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/960},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BroadbentGZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BroadnaxKMMMN18,
  author       = {Brandon Broadnax and
                  Alexander Koch and
                  Jeremias Mechler and
                  Tobias M{\"{u}}ller and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Matthias Nagel},
  title        = {Fortified Universal Composability: Taking Advantage of Simple Secure
                  Hardware Modules},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {519},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/519},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BroadnaxKMMMN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Brown18,
  author       = {Daniel R. L. Brown},
  title        = {{ECC} mod 891+5},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {121},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/121},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Brown18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Brown18a,
  author       = {Daniel R. L. Brown},
  title        = {{RKHD} ElGamal signing and 1-way sums},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {186},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/186},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Brown18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BruinderinkP18,
  author       = {Leon Groot Bruinderink and
                  Peter Pessl},
  title        = {Differential Fault Attacks on Deterministic Lattice Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {355},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/355},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BruinderinkP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrzuskaDKK18,
  author       = {Chris Brzuska and
                  Antoine Delignat{-}Lavaud and
                  Konrad Kohbrok and
                  Markulf Kohlweiss},
  title        = {State-Separating Proofs: {A} Reduction Methodology for Real-World
                  Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {306},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/306},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrzuskaDKK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BudaghyanCCCV18,
  author       = {Lilya Budaghyan and
                  Marco Calderini and
                  Claude Carlet and
                  Robert S. Coulter and
                  Irene Villa},
  title        = {Constructing {APN} functions through isotopic shifts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {769},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/769},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BudaghyanCCCV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BudaghyanCHK18,
  author       = {Lilya Budaghyan and
                  Claude Carlet and
                  Tor Helleseth and
                  Nikolay S. Kaleyski},
  title        = {Changing Points in {APN} Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1217},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1217},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BudaghyanCHK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BudaghyanCV18,
  author       = {Lilya Budaghyan and
                  Marco Calderini and
                  Irene Villa},
  title        = {On relations between {CCZ-} and EA-equivalences},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {796},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/796},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BudaghyanCV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BujaAA18,
  author       = {Alya Geogiana Buja and
                  Shekh Faisal Abdul{-}Latip and
                  Rabiah Ahmad},
  title        = {Fault Analysis of the {KTANTAN} Family of Block Ciphers: {A} Revisited
                  Work of Fault Analysis of the {KATAN} Family of Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {258},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/258},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BujaAA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BunnKKO18,
  author       = {Paul Bunn and
                  Jonathan Katz and
                  Eyal Kushilevitz and
                  Rafail Ostrovsky},
  title        = {Efficient 3-Party Distributed {ORAM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {706},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/706},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BunnKKO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ByaliJPR18,
  author       = {Megha Byali and
                  Arun Joseph and
                  Arpita Patra and
                  Divya Ravi},
  title        = {Fast Secure Computation for Small Population over the Internet},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {710},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/710},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ByaliJPR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CalikTP18,
  author       = {{\c{C}}agdas {\c{C}}alik and
                  Meltem S{\"{o}}nmez Turan and
                  Ren{\'{e}} Peralta},
  title        = {The Multiplicative Complexity of 6-variable Boolean Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {2},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/002},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CalikTP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischDGLN18,
  author       = {Jan Camenisch and
                  Manu Drijvers and
                  Tommaso Gagliardoni and
                  Anja Lehmann and
                  Gregory Neven},
  title        = {The Wonderful World of Global Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {165},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/165},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischDGLN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CampanelliG18,
  author       = {Matteo Campanelli and
                  Rosario Gennaro},
  title        = {Fine-Grained Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {297},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/297},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CampanelliG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanardPST18,
  author       = {S{\'{e}}bastien Canard and
                  David Pointcheval and
                  Quentin Santos and
                  Jacques Traor{\'{e}}},
  title        = {Practical Strategy-Resistant Privacy-Preserving Elections},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {827},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/827},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanardPST18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiCHLRR18,
  author       = {Ran Canetti and
                  Yilei Chen and
                  Justin Holmgren and
                  Alex Lombardi and
                  Guy N. Rothblum and
                  Ron D. Rothblum},
  title        = {Fiat-Shamir From Simpler Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1004},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1004},
  timestamp    = {Wed, 23 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiCHLRR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiCRR18,
  author       = {Ran Canetti and
                  Yilei Chen and
                  Leonid Reyzin and
                  Ron D. Rothblum},
  title        = {Fiat-Shamir and Correlation Intractability from Strong KDM-Secure
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {131},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/131},
  timestamp    = {Tue, 22 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiCRR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiLW18,
  author       = {Ran Canetti and
                  Alex Lombardi and
                  Daniel Wichs},
  title        = {Non-Interactive Zero Knowledge and Correlation Intractability from
                  Circular-Secure {FHE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1248},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1248},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiLW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiPP18,
  author       = {Ran Canetti and
                  Sunoo Park and
                  Oxana Poburinnaya},
  title        = {Fully Bideniable Interactive Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1244},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1244},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiPP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanteautLLNW18,
  author       = {Anne Canteaut and
                  Virginie Lallemand and
                  Gregor Leander and
                  Patrick Neumann and
                  Friedrich Wiemer},
  title        = {{BISON} - Instantiating the Whitened Swap-Or-Not Construction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1011},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1011},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CanteautLLNW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanteautP18,
  author       = {Anne Canteaut and
                  L{\'{e}}o Perrin},
  title        = {On CCZ-Equivalence, Extended-Affine Equivalence, and Function Twisting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {713},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/713},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanteautP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanteautPT18,
  author       = {Anne Canteaut and
                  L{\'{e}}o Perrin and
                  Shizhu Tian},
  title        = {If a Generalised Butterfly is {APN} then it Operates on 6 Bits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1036},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1036},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanteautPT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CaoL18,
  author       = {Zhengjun Cao and
                  Lihua Liu},
  title        = {Remarks on Bell's Inequality},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {231},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/231},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CaoL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CaoL18a,
  author       = {Zhengjun Cao and
                  Lihua Liu},
  title        = {A Note On Groth-Ostrovsky-Sahai Non-Interactive Zero-Knowledge Proof
                  System},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {327},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/327},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CaoL18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CaoL18b,
  author       = {Zhengjun Cao and
                  Lihua Liu},
  title        = {A Note On Clauser-Horne-Shimony-Holt Inequality},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {410},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/410},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CaoL18b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CaoOZ18,
  author       = {Nairen Cao and
                  Adam O'Neill and
                  Mohammad Zaheri},
  title        = {Towards {RSA-OAEP} without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1170},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1170},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CaoOZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CaoUL18,
  author       = {Zhengjun Cao and
                  Jeffrey Uhlmann and
                  Lihua Liu},
  title        = {Analysis of Deutsch-Jozsa Quantum Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {249},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/249},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CaoUL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletC18,
  author       = {Claude Carlet and
                  Xi Chen},
  title        = {Constructing low-weight dth-order correlation-immune Boolean functions
                  through the Fourier-Hadamard transform},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {86},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/086},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletCQ18,
  author       = {Claude Carlet and
                  Xi Chen and
                  Longjiang Qu},
  title        = {Constructing Infinite Families of Low Differential Uniformity (n,
                  m)-Functions with m{\textgreater}n/2},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1046},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1046},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletCQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletDGT18,
  author       = {Claude Carlet and
                  Abderrahman Daif and
                  Sylvain Guilley and
                  C{\'{e}}dric Tavernier},
  title        = {Polynomial direct sum masking to protect against both {SCA} and {FIA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {531},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/531},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletDGT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarltonEK18,
  author       = {Rhys Carlton and
                  Aleksander Essex and
                  Krzysztof Kapulkin},
  title        = {Threshold Properties of Prime Power Subgroups with Application to
                  Secure Integer Comparisons},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {224},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/224},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarltonEK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarpovFLS18,
  author       = {Sergiu Carpov and
                  Caroline Fontaine and
                  Damien Ligier and
                  Renaud Sirdey},
  title        = {Illuminating the Dark or how to recover what should not be seen},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1001},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1001},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarpovFLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarpovIM18,
  author       = {Sergiu Carpov and
                  Malika Izabach{\`{e}}ne and
                  Victor Mollimard},
  title        = {New techniques for multi-value homomorphic evaluation and applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {622},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/622},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarpovIM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarpovS18,
  author       = {Sergiu Carpov and
                  Oana Stan},
  title        = {Efficient Evaluation of Low Degree Multivariate Polynomials in Ring-LWE
                  Homomorphic Encryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {626},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/626},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarpovS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarpovT18,
  author       = {Sergiu Carpov and
                  Thibaud Tortech},
  title        = {Secure top most significant genome variants search: iDASH 2017 competition},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {314},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/314},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarpovT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarrCDG018,
  author       = {Christopher Carr and
                  Anamaria Costache and
                  Gareth T. Davies and
                  Kristian Gj{\o}steen and
                  Martin Strand},
  title        = {Zero-Knowledge Proof of Decryption for {FHE} Ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {26},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/026},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarrCDG018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarstensETU18,
  author       = {Tore Vincent Carstens and
                  Ehsan Ebrahimi and
                  Gelo Noel Tabia and
                  Dominique Unruh},
  title        = {On Quantum Indifferentiability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {257},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/257},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarstensETU18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CartlidgeSA18,
  author       = {John Cartlidge and
                  Nigel P. Smart and
                  Younes Talibi Alaoui},
  title        = {{MPC} Joins the Dark Side},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1045},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1045},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CartlidgeSA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CascudoCG18,
  author       = {Ignacio Cascudo and
                  Ren{\'{e}} B{\o}dker Christensen and
                  Jaron Skovsted Gundersen},
  title        = {Actively Secure OT-Extension from q-ary Linear Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {603},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/603},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CascudoCG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CascudoCXY18,
  author       = {Ignacio Cascudo and
                  Ronald Cramer and
                  Chaoping Xing and
                  Chen Yuan},
  title        = {Amortized Complexity of Information-Theoretically Secure {MPC} Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {429},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/429},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CascudoCXY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CascudoDDDDG18,
  author       = {Ignacio Cascudo and
                  Ivan Damg{\aa}rd and
                  Bernardo David and
                  Nico D{\"{o}}ttling and
                  Rafael Dowsley and
                  Irene Giacomelli},
  title        = {Efficient {UC} Commitment Extension with Homomorphism for Free (and
                  Applications)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {983},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/983},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CascudoDDDDG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CascudoGR18,
  author       = {Ignacio Cascudo and
                  Jaron Skovsted Gundersen and
                  Diego Ruano},
  title        = {Improved Bounds on the Threshold Gap in Ramp Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {99},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/099},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CascudoGR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CashLOZZ18,
  author       = {David Cash and
                  Feng{-}Hao Liu and
                  Adam O'Neill and
                  Mark Zhandry and
                  Cong Zhang},
  title        = {Parameter-Hiding Order Revealing Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {698},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/698},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CashLOZZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CassiersS18,
  author       = {Ga{\"{e}}tan Cassiers and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Improved Bitslice Masking: from Optimized Non-Interference to Probe
                  Isolation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {438},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/438},
  timestamp    = {Tue, 04 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CassiersS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CastagnosLT18,
  author       = {Guilhem Castagnos and
                  Fabien Laguillaumie and
                  Ida Tucker},
  title        = {Practical Fully Secure Unrestricted Inner Product Functional Encryption
                  modulo p},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {791},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/791},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CastagnosLT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CastelnoviMP18,
  author       = {Laurent Castelnovi and
                  Ange Martinelli and
                  Thomas Prest},
  title        = {Grafting Trees: a Fault Attack against the {SPHINCS} framework},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {102},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/102},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CastelnoviMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CastryckLMPR18,
  author       = {Wouter Castryck and
                  Tanja Lange and
                  Chloe Martindale and
                  Lorenz Panny and
                  Joost Renes},
  title        = {{CSIDH:} An Efficient Post-Quantum Commutative Group Action},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {383},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/383},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CastryckLMPR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CecchettiMJ18,
  author       = {Ethan Cecchetti and
                  Ian Miers and
                  Ari Juels},
  title        = {PIEs: Public Incompressible Encodings for Decentralized Storage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {684},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/684},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CecchettiMJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CerulliCS18,
  author       = {Andrea Cerulli and
                  Emiliano De Cristofaro and
                  Claudio Soriente},
  title        = {Nothing Refreshes Like a RePSI: Reactive Private Set Intersection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {344},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/344},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CerulliCS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CetinS18,
  author       = {Gizem S. {\c{C}}etin and
                  Berk Sunar},
  title        = {Homomorphic Rank Sort Using Surrogate Polynomials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {283},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/283},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CetinS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaidosFKZ18,
  author       = {Pyrros Chaidos and
                  Olga Fourtounelli and
                  Aggelos Kiayias and
                  Thomas Zacharias},
  title        = {A Universally Composable Framework for the Privacy of Email Ecosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {848},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/848},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaidosFKZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChakrabortiACMR18,
  author       = {Anrin Chakraborti and
                  Adam J. Aviv and
                  Seung Geol Choi and
                  Travis Mayberry and
                  Daniel S. Roche and
                  Radu Sion},
  title        = {Efficient Range {ORAM} with {\unicode{54598}}(log\({}^{\mbox{2}}\)N)
                  Locality},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {471},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/471},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChakrabortiACMR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChakrabortiDNY18,
  author       = {Avik Chakraborti and
                  Nilanjan Datta and
                  Mridul Nandi and
                  Kan Yasuda},
  title        = {Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {805},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/805},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChakrabortiDNY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChakrabortyR18,
  author       = {Suvradip Chakraborty and
                  C. Pandu Rangan},
  title        = {Public Key Encryption Resilient to Post-Challenge Leakage and Tampering
                  Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {883},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/883},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChakrabortyR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChalkiasBHLNS18,
  author       = {Konstantinos Chalkias and
                  James Brown and
                  Mike Hearn and
                  Tommy Lillehagen and
                  Igor Nitto and
                  Thomas Schroeter},
  title        = {Blockchained Post-Quantum Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {658},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/658},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChalkiasBHLNS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChanKNPS18,
  author       = {T.{-}H. Hubert Chan and
                  Jonathan Katz and
                  Kartik Nayak and
                  Antigoni Polychroniadou and
                  Elaine Shi},
  title        = {More is Less: Perfectly Secure Oblivious Algorithms in the Multi-Server
                  Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {851},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/851},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChanKNPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChanNS18,
  author       = {T.{-}H. Hubert Chan and
                  Kartik Nayak and
                  Elaine Shi},
  title        = {Perfectly Secure Oblivious Parallel {RAM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {364},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/364},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChanNS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChanPS18,
  author       = {T.{-}H. Hubert Chan and
                  Rafael Pass and
                  Elaine Shi},
  title        = {PiLi: An Extremely Simple Synchronous Blockchain},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {980},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/980},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChanPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChanPS18a,
  author       = {T.{-}H. Hubert Chan and
                  Rafael Pass and
                  Elaine Shi},
  title        = {PaLa: {A} Simple Partially Synchronous Blockchain},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {981},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/981},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChanPS18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChandV18,
  author       = {Ronal Pranil Chand and
                  Maheswara Rao Valluri},
  title        = {Elliptic Curves in Generalized Huff's Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1179},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1179},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChandV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangCKS18,
  author       = {Donghoon Chang and
                  Amit Kumar Chauhan and
                  Sandeep Kumar and
                  Somitra Kumar Sanadhya},
  title        = {Revocable Identity-based Encryption from Codes with Rank Metric},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {382},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/382},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangCKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaseDG18,
  author       = {Melissa Chase and
                  Apoorvaa Deshpande and
                  Esha Ghosh},
  title        = {Privacy Preserving Verifiable Key Directories},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {607},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/607},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaseDG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaseDIKLOV18,
  author       = {Melissa Chase and
                  Yevgeniy Dodis and
                  Yuval Ishai and
                  Daniel Kraschewski and
                  Tianren Liu and
                  Rafail Ostrovsky and
                  Vinod Vaikuntanathan},
  title        = {Reusable Non-Interactive Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {940},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/940},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaseDIKLOV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChatterjeeK18,
  author       = {Sanjit Chatterjee and
                  R. Kabaleeshwaran},
  title        = {Towards Static Assumption Based Cryptosystem in Pairing Setting: Further
                  Applications of D{\'{e}}j{\`{a}}Q and Dual-Form Signature},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {738},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/738},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChatterjeeK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChatterjeeM18,
  author       = {Sanjit Chatterjee and
                  Sayantan Mukherjee},
  title        = {Large Universe Subset Predicate Encryption Based on Static Assumption
                  (without Random Oracle)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1190},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1190},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChatterjeeM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChattopadhyayKO18,
  author       = {Eshan Chattopadhyay and
                  Bhavana Kanukurthi and
                  Sai Lakshmi Bhavana Obbattu and
                  Sruthi Sekar},
  title        = {Privacy Amplification from Non-malleable Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {293},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/293},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChattopadhyayKO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChattopadhyayL18,
  author       = {Eshan Chattopadhyay and
                  Xin Li},
  title        = {Non-Malleable Extractors and Codes for Composition of Tampering, Interleaved
                  Tampering and More},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1069},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1069},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChattopadhyayL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenCL18,
  author       = {Yi{-}Hsiu Chen and
                  Kai{-}Min Chung and
                  Jyun{-}Jie Liao},
  title        = {On the Complexity of Simulating Auxiliary Input},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {171},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/171},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenCL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenCS18,
  author       = {Hao Chen and
                  Ilaria Chillotti and
                  Yongsoo Song},
  title        = {Improved Bootstrapping for Approximate Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1043},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1043},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenCS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenG18,
  author       = {Yu{-}Ao Chen and
                  Xiao{-}Shan Gao},
  title        = {Quantum Algorithms for Boolean Equation Solving and Quantum Algebraic
                  Attack on Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {8},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/008},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenGHHJLL18,
  author       = {Hao Chen and
                  Ran Gilad{-}Bachrach and
                  Kyoohyung Han and
                  Zhicong Huang and
                  Amir Jalali and
                  Kim Laine and
                  Kristin E. Lauter},
  title        = {Logistic regression over encrypted data from fully homomorphic encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {462},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/462},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenGHHJLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenGMPR18,
  author       = {Cheng Chen and
                  Nicholas Genise and
                  Daniele Micciancio and
                  Yuriy Polyakov and
                  Kurt Rohloff},
  title        = {Implementing Token-Based Obfuscation under (Ring) {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1222},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1222},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenGMPR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenGMV18,
  author       = {Jing Chen and
                  Sergey Gorbunov and
                  Silvio Micali and
                  Georgios Vlachos},
  title        = {{ALGORAND} {AGREEMENT:} Super Fast and Partition Resilient Byzantine
                  Agreement},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {377},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/377},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenGMV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenGW18,
  author       = {Jie Chen and
                  Junqing Gong and
                  Hoeteck Wee},
  title        = {Improved Inner-product Encryption with Adaptive Security and Full
                  Attribute-hiding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {833},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/833},
  timestamp    = {Thu, 07 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenGW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenH18,
  author       = {Hao Chen and
                  Kyoohyung Han},
  title        = {Homomorphic Lower Digits Removal and Improved {FHE} Bootstrapping},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {67},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/067},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenHKCC18,
  author       = {Tai{-}Yuan Chen and
                  Wei{-}Ning Huang and
                  Po{-}Chun Kuo and
                  Hao Chung and
                  Tzu{-}Wei Chao},
  title        = {{DEXON:} {A} Highly Scalable, Decentralized DAG-Based Consensus Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1112},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1112},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenHKCC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenHLR18,
  author       = {Hao Chen and
                  Zhicong Huang and
                  Kim Laine and
                  Peter Rindal},
  title        = {Labeled {PSI} from Fully Homomorphic Encryption with Malicious Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {787},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/787},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenHLR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenMN18,
  author       = {Yu Long Chen and
                  Bart Mennink and
                  Mridul Nandi},
  title        = {Short Variable Length Domain Extenders With Beyond Birthday Bound
                  Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {783},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/783},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenMN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenRK18,
  author       = {Huili Chen and
                  Bita Darvish Rohani and
                  Farinaz Koushanfar},
  title        = {DeepMarks: {A} Digital Fingerprinting Framework for Deep Neural Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {322},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/322},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenRK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenT18,
  author       = {Long Chen and
                  Qiang Tang},
  title        = {People Who Live in Glass Houses Should not Throw Stones: Targeted
                  Opening Message Franking Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {994},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/994},
  timestamp    = {Wed, 20 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenVW18,
  author       = {Yilei Chen and
                  Vinod Vaikuntanathan and
                  Hoeteck Wee},
  title        = {{GGH15} Beyond Permutation Branching Programs: Proofs, Attacks, and
                  Candidates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {360},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/360},
  timestamp    = {Tue, 22 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenVW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenVWWW18,
  author       = {Yilei Chen and
                  Vinod Vaikuntanathan and
                  Brent Waters and
                  Hoeteck Wee and
                  Daniel Wichs},
  title        = {Traitor-Tracing from {LWE} Made Simple and Attribute-Based},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {897},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/897},
  timestamp    = {Tue, 22 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenVWWW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenWZ18,
  author       = {Yu Chen and
                  Yuyu Wang and
                  Hong{-}Sheng Zhou},
  title        = {Leakage-Resilient Cryptography from Puncturable Primitives and Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {781},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/781},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenWZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenY18,
  author       = {Xiaoming Chen and
                  Weiqing You},
  title        = {The Twin Conjugacy Search Problem and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {590},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/590},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenZZ18,
  author       = {Long Chen and
                  Zhenfeng Zhang and
                  Zhenfei Zhang},
  title        = {On the Hardness of the Computational Ring-LWR Problem and its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {536},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/536},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenZZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChengC18,
  author       = {Zhaohui Cheng and
                  Liqun Chen},
  title        = {Certificateless Public Key Signature Schemes from Standard Algorithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {386},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/386},
  timestamp    = {Sat, 28 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChengC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChengGZ18,
  author       = {Leixiao Cheng and
                  Boru Gong and
                  Yunlei Zhao},
  title        = {Lattice-Based Signature from Key Consensus},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1180},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1180},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChengGZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CheonCHKL18,
  author       = {Jung Hee Cheon and
                  Wonhee Cho and
                  Minki Hhan and
                  Jiseung Kim and
                  Changmin Lee},
  title        = {Statistical Zeroizing Attack: Cryptanalysis of Candidates of {BP}
                  Obfuscation over {GGH15} Multilinear Map},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1081},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1081},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CheonCHKL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CheonHH18,
  author       = {Jung Hee Cheon and
                  Kyoohyung Han and
                  Minki Hhan},
  title        = {Faster Homomorphic Discrete Fourier Transforms and Improved {FHE}
                  Bootstrapping},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1073},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1073},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CheonHH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CheonHKKS18,
  author       = {Jung Hee Cheon and
                  Kyoohyung Han and
                  Andrey Kim and
                  Miran Kim and
                  Yongsoo Song},
  title        = {Bootstrapping for Approximate Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {153},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/153},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CheonHKKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CheonHKKS18a,
  author       = {Jung Hee Cheon and
                  Kyoohyung Han and
                  Andrey Kim and
                  Miran Kim and
                  Yongsoo Song},
  title        = {A Full {RNS} Variant of Approximate Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {931},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/931},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CheonHKKS18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CheonHKL18,
  author       = {Jung Hee Cheon and
                  Minki Hhan and
                  Jiseung Kim and
                  Changmin Lee},
  title        = {Cryptanalysis on the {HHSS} Obfuscation Arising from Absence of Safeguards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {397},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/397},
  timestamp    = {Fri, 26 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CheonHKL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CheonHKL18a,
  author       = {Jung Hee Cheon and
                  Minki Hhan and
                  Jiseung Kim and
                  Changmin Lee},
  title        = {Cryptanalyses of Branching Program Obfuscations over {GGH13} Multilinear
                  Map from {NTRU} Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {408},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/408},
  timestamp    = {Fri, 26 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CheonHKL18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CheonHLS18,
  author       = {Jung Hee Cheon and
                  Seungwan Hong and
                  Changmin Lee and
                  Yongha Son},
  title        = {Polynomial Functional Encryption Scheme with Linear Ciphertext Size},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {585},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/585},
  timestamp    = {Fri, 26 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CheonHLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CheonJKL18,
  author       = {Jung Hee Cheon and
                  Jinhyuck Jeong and
                  Dongwoo Kim and
                  Jongchan Lee},
  title        = {A Reusable Fuzzy Extractor with Practical Storage Size},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {681},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/681},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CheonJKL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CheonKY18,
  author       = {Jung Hee Cheon and
                  Andrey Kim and
                  Donggeon Yhee},
  title        = {Multi-dimensional Packing for {HEAAN} for Approximate Matrix Arithmetics},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1245},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1245},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CheonKY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChepurnoyKM18,
  author       = {Alexander Chepurnoy and
                  Vasily Kharin and
                  Dmitry Meshkov},
  title        = {A Systematic Approach To Cryptocurrency Fees},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {78},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/078},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChepurnoyKM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChepurnoyPZ18,
  author       = {Alexander Chepurnoy and
                  Charalampos Papamanthou and
                  Yupeng Zhang},
  title        = {Edrax: {A} Cryptocurrency with Stateless Transaction Validation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {968},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/968},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChepurnoyPZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChialvaD18,
  author       = {Diego Chialva and
                  Ann Dooms},
  title        = {Conditionals in Homomorphic Encryption and Machine Learning Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1032},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1032},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChialvaD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChidaGHIKLN18,
  author       = {Koji Chida and
                  Daniel Genkin and
                  Koki Hamada and
                  Dai Ikarashi and
                  Ryo Kikuchi and
                  Yehuda Lindell and
                  Ariel Nof},
  title        = {Fast Large-Scale Honest-Majority {MPC} for Malicious Adversaries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {570},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/570},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChidaGHIKLN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChielleMTM18,
  author       = {Eduardo Chielle and
                  Oleg Mazonka and
                  Nektarios Georgios Tsoutsos and
                  Michail Maniatakos},
  title        = {E\({}^{\mbox{3}}\): {A} Framework for Compiling {C++} Programs with
                  Encrypted Operands},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1013},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1013},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChielleMTM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChillottiGGI18,
  author       = {Ilaria Chillotti and
                  Nicolas Gama and
                  Mariya Georgieva and
                  Malika Izabach{\`{e}}ne},
  title        = {{TFHE:} Fast Fully Homomorphic Encryption over the Torus},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {421},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/421},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChillottiGGI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChongchitmateO18,
  author       = {Wutichai Chongchitmate and
                  Rafail Ostrovsky},
  title        = {Information-Theoretic Broadcast with Dishonest Majority for Long Messages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {829},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/829},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChongchitmateO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChotardSGPP18,
  author       = {J{\'{e}}r{\'{e}}my Chotard and
                  Edouard Dufour Sans and
                  Romain Gay and
                  Duong Hieu Phan and
                  David Pointcheval},
  title        = {Multi-Client Functional Encryption with Repetition for Inner Product},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1021},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1021},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChotardSGPP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoudhuryGPRS18,
  author       = {Ashish Choudhury and
                  Gayathri Garimella and
                  Arpita Patra and
                  Divya Ravi and
                  Pratik Sarkar},
  title        = {Crash-tolerant Consensus in Directed Graph Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {436},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/436},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoudhuryGPRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chuengsatiansup18,
  author       = {Chitchanok Chuengsatiansup and
                  Chloe Martindale},
  title        = {Pairing-Friendly Twisted Hessian Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1026},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1026},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chuengsatiansup18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChungGLPS18,
  author       = {Kai{-}Min Chung and
                  Yue Guo and
                  Wei{-}Kai Lin and
                  Rafael Pass and
                  Elaine Shi},
  title        = {Game Theoretic Notions of Fairness in Multi-Party Coin Toss},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1076},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1076},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChungGLPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChungGLZ18,
  author       = {Kai{-}Min Chung and
                  Marios Georgiou and
                  Ching{-}Yi Lai and
                  Vassilis Zikas},
  title        = {Cryptography with Dispensable Backdoors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {352},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/352},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChungGLZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CiampiO18,
  author       = {Michele Ciampi and
                  Claudio Orlandi},
  title        = {Combining Private Set-Intersection with Secure Two-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {105},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/105},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CiampiO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CianciulloG18,
  author       = {Louis Cianciullo and
                  Hossein Ghodosi},
  title        = {Efficient Information Theoretic Multi-Party Computation from Oblivious
                  Linear Evaluation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1227},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1227},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CianciulloG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CidHPSS18,
  author       = {Carlos Cid and
                  Tao Huang and
                  Thomas Peyrin and
                  Yu Sasaki and
                  Ling Song},
  title        = {Boomerang Connectivity Table: {A} New Cryptanalysis Tool},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {161},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/161},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CidHPSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ClarisseS18,
  author       = {Remi Clarisse and
                  Olivier Sanders},
  title        = {Short Group Signature in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1115},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1115},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ClarisseS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CogliatiL18,
  author       = {Beno{\^{\i}}t Cogliati and
                  Jooyoung Lee},
  title        = {Wide Tweakable Block Ciphers Based on Substitution-Permutation Networks:
                  Security Beyond the Birthday Bound},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {488},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/488},
  timestamp    = {Mon, 06 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CogliatiL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CohenP18,
  author       = {Bram Cohen and
                  Krzysztof Pietrzak},
  title        = {Simple Proofs of Sequential Work},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {183},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/183},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CohenP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CohenSW18,
  author       = {Ran Cohen and
                  Abhi Shelat and
                  Daniel Wichs},
  title        = {Adaptively Secure {MPC} with Sublinear Communication Complexity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1161},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1161},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CohenSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ColombierMDMRD18,
  author       = {Brice Colombier and
                  Alexandre Menu and
                  Jean{-}Max Dutertre and
                  Pierre{-}Alain Mo{\"{e}}llic and
                  Jean{-}Baptiste Rigaud and
                  Jean{-}Luc Danger},
  title        = {Laser-induced Single-bit Faults in Flash Memory: Instructions Corruption
                  on a 32-bit Microcontroller},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1042},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1042},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ColombierMDMRD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CorettiDG18,
  author       = {Sandro Coretti and
                  Yevgeniy Dodis and
                  Siyao Guo},
  title        = {Non-Uniform Bounds in the Random-Permutation, Ideal-Cipher, and Generic-Group
                  Models},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {226},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/226},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CorettiDG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronP18,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Hilder V. L. Pereira},
  title        = {On Kilian's Randomization of Multilinear Map Encodings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1129},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1129},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CostacheFLMP18,
  author       = {Anamaria Costache and
                  Brooke Feigon and
                  Kristin E. Lauter and
                  Maike Massierer and
                  Anna Pusk{\'{a}}s},
  title        = {Ramanujan graphs in cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {593},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/593},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CostacheFLMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CosteaCGTR18,
  author       = {Sergiu Costea and
                  Marios O. Choudary and
                  Doru Gucea and
                  Bj{\"{o}}rn Tackmann and
                  Costin Raiciu},
  title        = {Secure Opportunistic Multipath Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1124},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1124},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CosteaCGTR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Costello18,
  author       = {Craig Costello},
  title        = {Computing supersingular isogenies on Kummer surfaces},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {850},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/850},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Costello18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Courtois18,
  author       = {Nicolas T. Courtois},
  title        = {On the Existence of Non-Linear Invariants and Algebraic Polynomial
                  Constructive Approach to Backdoors in Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {807},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/807},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Courtois18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Courtois18a,
  author       = {Nicolas T. Courtois},
  title        = {Structural Nonlinear Invariant Attacks on {T-310:} Attacking Arbitrary
                  Boolean Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1242},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1242},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Courtois18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CourtoisAB18,
  author       = {J{\'{e}}r{\^{o}}me Courtois and
                  Lokman A. Abbas{-}Turki and
                  Jean{-}Claude Bajard},
  title        = {Evaluation of Resilience of randomized {RNS} implementation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {9},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/009},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CourtoisAB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Couteau18,
  author       = {Geoffroy Couteau},
  title        = {A Note on the Communication Complexity of Multiparty Computation in
                  the Correlated Randomness Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {465},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/465},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Couteau18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CouteauDMRR18,
  author       = {Geoffroy Couteau and
                  Aur{\'{e}}lien Dupin and
                  Pierrick M{\'{e}}aux and
                  M{\'{e}}lissa Rossi and
                  Yann Rotella},
  title        = {On the Concrete Security of Goldreich's Pseudorandom Generator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1162},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1162},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CouteauDMRR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CouvreurLT18,
  author       = {Alain Couvreur and
                  Matthieu Lequesne and
                  Jean{-}Pierre Tillich},
  title        = {Recovering short secret keys of {RLCE} in polynomial time},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {528},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/528},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CouvreurLT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CraciunMS18,
  author       = {Vlad Constantin Craciun and
                  Andrei Mogage and
                  Emil Simion},
  title        = {Trends in design of ransomware viruses},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {598},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/598},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CraciunMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerDESX18,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Daniel Escudero and
                  Peter Scholl and
                  Chaoping Xing},
  title        = {SPD{\(\mathbb{Z}\)}\({}_{\mbox{2\({}^{\mbox{k}}\)}}\): Efficient {MPC}
                  mod 2\({}^{\mbox{k}}\) for Dishonest Majority},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {482},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/482},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerDESX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CrawfordGHPS18,
  author       = {Jack L. H. Crawford and
                  Craig Gentry and
                  Shai Halevi and
                  Daniel Platt and
                  Victor Shoup},
  title        = {Doing Real Work with {FHE:} The Case of Logistic Regression},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {202},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/202},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CrawfordGHPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CrepeauY18,
  author       = {Claude Cr{\'{e}}peau and
                  Nan Yang},
  title        = {New Perspectives on Multi-Prover Interactive Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {65},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/065},
  timestamp    = {Mon, 29 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CrepeauY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CritesL18,
  author       = {Elizabeth C. Crites and
                  Anna Lysyanskaya},
  title        = {Delegatable Anonymous Credentials from Mercurial Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {923},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/923},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CritesL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CrowleyB18,
  author       = {Paul Crowley and
                  Eric Biggers},
  title        = {HPolyC: length-preserving encryption for entry-level processors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {720},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/720},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CrowleyB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Cuevas-FarfanMC18,
  author       = {Eduardo Cuevas{-}Farfan and
                  Miguel Morales{-}Sandoval and
                  Ren{\'{e}} Cumplido},
  title        = {An FPGA-based programmable processor for bilinear pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1014},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1014},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Cuevas-FarfanMC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CuiHHLY18,
  author       = {Yuzhao Cui and
                  Qiong Huang and
                  Jianye Huang and
                  Hongbo Li and
                  Guomin Yang},
  title        = {Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and
                  Classification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1058},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1058},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CuiHHLY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CulnanePRT18,
  author       = {Chris Culnane and
                  Olivier Pereira and
                  Kim Ramchen and
                  Vanessa Teague},
  title        = {Universally Verifiable {MPC} with Applications to {IRV} Ballot Counting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {246},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/246},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CulnanePRT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DAnversKRV18,
  author       = {Jan{-}Pieter D'Anvers and
                  Angshuman Karmakar and
                  Sujoy Sinha Roy and
                  Frederik Vercauteren},
  title        = {Saber: Module-LWR based key exchange, CPA-secure encryption and CCA-secure
                  {KEM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {230},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/230},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DAnversKRV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DAnversVV18,
  author       = {Jan{-}Pieter D'Anvers and
                  Frederik Vercauteren and
                  Ingrid Verbauwhede},
  title        = {On the impact of decryption failures on the security of {LWE/LWR}
                  based schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1089},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1089},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DAnversVV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DAnversVV18a,
  author       = {Jan{-}Pieter D'Anvers and
                  Frederik Vercauteren and
                  Ingrid Verbauwhede},
  title        = {The impact of error dependencies on Ring/Mod-LWE/LWR based schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1172},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1172},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DAnversVV18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledGK18,
  author       = {Dana Dachman{-}Soled and
                  Huijing Gong and
                  Mukul Kulkarni and
                  Aria Shahverdi},
  title        = {Partial Key Exposure in Ring-LWE-Based Cryptosystems: Attacks and
                  Resilience},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1068},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1068},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-SoledGK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledK18,
  author       = {Dana Dachman{-}Soled and
                  Mukul Kulkarni},
  title        = {Upper and Lower Bounds for Continuous Non-Malleable Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {517},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/517},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-SoledK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaemenHAK18,
  author       = {Joan Daemen and
                  Seth Hoffert and
                  Gilles Van Assche and
                  Ronny Van Keer},
  title        = {Xoodoo cookbook},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {767},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/767},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DaemenHAK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaiWZ18,
  author       = {Wei Dai and
                  William Whyte and
                  Zhenfei Zhang},
  title        = {Optimizing polynomial convolution for NTRUEncrypt},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {229},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/229},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DaiWZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardGO18,
  author       = {Ivan Damg{\aa}rd and
                  Chaya Ganesh and
                  Claudio Orlandi},
  title        = {Proofs of Replicated Storage Without Timing Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {654},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/654},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardGO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardKORS18,
  author       = {Ivan Damg{\aa}rd and
                  Tomasz Kazana and
                  Maciej Obremski and
                  Varun Raj and
                  Luisa Siniscalchi},
  title        = {Continuous {NMC} Secure Against Permutations and Overwrites, with
                  Applications to {CCA} Secure Commitments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {596},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/596},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardKORS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DasNCGS18,
  author       = {Debayan Das and
                  Mayukh Nath and
                  Baibhab Chatterjee and
                  Santosh Ghosh and
                  Shreyas Sen},
  title        = {Ground-up Root-cause Analysis guided Low-Overhead Generic Countermeasure
                  for Electro-Magnetic Side-Channel Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {620},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/620},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DasNCGS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DattaDNP18,
  author       = {Nilanjan Datta and
                  Avijit Dutta and
                  Mridul Nandi and
                  Goutam Paul},
  title        = {Double-block Hash-then-Sum: {A} Paradigm for Constructing {BBB} Secure
                  {PRF}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {804},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/804},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DattaDNP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DattaDNY18,
  author       = {Nilanjan Datta and
                  Avijit Dutta and
                  Mridul Nandi and
                  Kan Yasuda},
  title        = {Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based
                  {MAC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {500},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/500},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DattaDNY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DattaOT18,
  author       = {Pratish Datta and
                  Tatsuaki Okamoto and
                  Junichi Tomida},
  title        = {Full-Hiding (Unbounded) Multi-Input Inner Product Functional Encryption
                  from the k-Linear Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {61},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/061},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DattaOT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DattaOT18a,
  author       = {Pratish Datta and
                  Tatsuaki Okamoto and
                  Katsuyuki Takashima},
  title        = {Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1093},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1093},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DattaOT18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DavidDL18,
  author       = {Bernardo David and
                  Rafael Dowsley and
                  Mario Larangeira},
  title        = {{ROYALE:} {A} Framework for Universally Composable Card Games with
                  Financial Rewards and Penalties Enforcement},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {157},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/157},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DavidDL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DavidDL18a,
  author       = {Bernardo David and
                  Rafael Dowsley and
                  Mario Larangeira},
  title        = {21 - Bringing Down the Complexity: Fast Composable Protocols for Card
                  Games Without Secret State},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {303},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/303},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DavidDL18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DavidW18,
  author       = {Liron David and
                  Avishai Wool},
  title        = {PRank: Fast Analytical Rank Estimation via Pareto Distributions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {550},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/550},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DavidW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DavidW18a,
  author       = {Liron David and
                  Avishai Wool},
  title        = {Poly-Logarithmic Side Channel Rank Estimation via Exponential Sampling},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {867},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/867},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DavidW18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DavidsonKNY18,
  author       = {Alex Davidson and
                  Shuichi Katsumata and
                  Ryo Nishimaki and
                  Shota Yamada},
  title        = {Constrained PRFs for Bit-fixing from OWFs with Constant Collusion
                  Resistance},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {982},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/982},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DavidsonKNY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DavidsonN18,
  author       = {Alex Davidson and
                  Ryo Nishimaki},
  title        = {A Bit-fixing {PRF} with {O(1)} Collusion-Resistance from {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {890},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/890},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DavidsonN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Debris-AlazardS18,
  author       = {Thomas Debris{-}Alazard and
                  Nicolas Sendrier and
                  Jean{-}Pierre Tillich},
  title        = {Wave: {A} New Code-Based Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {996},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/996},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Debris-AlazardS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Debris-AlazardS18a,
  author       = {Thomas Debris{-}Alazard and
                  Nicolas Sendrier and
                  Jean{-}Pierre Tillich},
  title        = {This is Not an Attack on Wave},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1216},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1216},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Debris-AlazardS18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Debris-AlazardT18,
  author       = {Thomas Debris{-}Alazard and
                  Jean{-}Pierre Tillich},
  title        = {A polynomial attack on a {NIST} proposal: RankSign, a code-based signature
                  in rank metric},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {339},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/339},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Debris-AlazardT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DecruPV18,
  author       = {Thomas Decru and
                  Lorenz Panny and
                  Frederik Vercauteren},
  title        = {Faster SeaSign signatures through improved rejection sampling},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1109},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1109},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DecruPV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DegabrieleF18,
  author       = {Jean Paul Degabriele and
                  Marc Fischlin},
  title        = {Simulatable Channels: Extended Security that is Universally Composable
                  and Easier to Prove},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {844},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/844},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DegabrieleF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DegabrieleS18,
  author       = {Jean Paul Degabriele and
                  Martijn Stam},
  title        = {Untagging Tor: {A} Formal Treatment of Onion Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {162},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/162},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DegabrieleS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dehnavi18,
  author       = {Seyed Mojtaba Dehnavi},
  title        = {Further observations on {SIMON} and {SPECK} families of block ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1107},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1107},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dehnavi18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DelcourtKLNPS18,
  author       = {Marguerite Delcourt and
                  Thorsten Kleinjung and
                  Arjen K. Lenstra and
                  Shubhojyoti Nath and
                  Dan Page and
                  Nigel P. Smart},
  title        = {Using the Cloud to Determine Key Strengths - Triennial Update},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1221},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1221},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DelcourtKLNPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DemarestFR18,
  author       = {Luke Demarest and
                  Benjamin Fuller and
                  Alexander Russell},
  title        = {Handling Correlated Errors: Hardness of {LWE} in the Exponent},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1005},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1005},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DemarestFR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DemmlerRRT18,
  author       = {Daniel Demmler and
                  Peter Rindal and
                  Mike Rosulek and
                  Ni Trieu},
  title        = {{PIR-PSI:} Scaling Private Contact Discovery},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {579},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/579},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DemmlerRRT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DeneuvilleG18,
  author       = {Jean{-}Christophe Deneuville and
                  Philippe Gaborit},
  title        = {Cryptanalysis of a code-based one-time signature},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1205},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1205},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DeneuvilleG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Deng18,
  author       = {Lunzhi Deng},
  title        = {Insecurity of a provably secure and lightweight certificateless signature
                  scheme for IIoT environments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1101},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1101},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Deng18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DengLX18,
  author       = {Yingpu Deng and
                  Lixia Luo and
                  Guanju Xiao},
  title        = {On Some Computational Problems in Local Fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1229},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1229},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DengLX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DerlerJSS18,
  author       = {David Derler and
                  Kai Gellert and
                  Tibor Jager and
                  Daniel Slamanig and
                  Christoph Striecks},
  title        = {Bloom Filter Encryption and Applications to Efficient Forward-Secret
                  0-RTT Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {199},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/199},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DerlerJSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DerlerKLRSS18,
  author       = {David Derler and
                  Stephan Krenn and
                  Thomas Lor{\"{u}}nser and
                  Sebastian Ramacher and
                  Daniel Slamanig and
                  Christoph Striecks},
  title        = {Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security,
                  and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {321},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/321},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DerlerKLRSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DerlerRS18,
  author       = {David Derler and
                  Sebastian Ramacher and
                  Daniel Slamanig},
  title        = {Generic Double-Authentication Preventing Signatures and a Post-Quantum
                  Instantiation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {790},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/790},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DerlerRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DeshpandeK18,
  author       = {Apoorvaa Deshpande and
                  Yael Kalai},
  title        = {Proofs of Ignorance and Applications to 2-Message Witness Hiding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {896},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/896},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DeshpandeK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DessoukyKSSZZ18,
  author       = {Ghada Dessouky and
                  Farinaz Koushanfar and
                  Ahmad{-}Reza Sadeghi and
                  Thomas Schneider and
                  Shaza Zeitouni and
                  Michael Zohner},
  title        = {Pushing the Communication Barrier in Secure Computation using Lookup
                  Tables},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {486},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/486},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DessoukyKSSZZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DeuberDMMT18,
  author       = {Dominic Deuber and
                  Nico D{\"{o}}ttling and
                  Bernardo Magri and
                  Giulio Malavolta and
                  Sri Aravinda Krishnan Thyagarajan},
  title        = {Minting Mechanisms for Blockchain - or - Moving from Cryptoassets
                  to Cryptocurrencies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1110},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1110},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DeuberDMMT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DeyG18,
  author       = {Sankhanil Dey and
                  Ranjan Ghosh},
  title        = {A review of cryptographic properties of S-boxes with Generation and
                  Analysis of crypto secure S-boxes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {405},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/405},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DeyG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DeyG18a,
  author       = {Sankhanil Dey and
                  Ranjan Ghosh},
  title        = {4-bit crypto S-boxes: Generation with irreducible polynomials over
                  Galois field {GF(24)} and cryptanalysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {591},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/591},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DeyG18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DharPKC18,
  author       = {Aritra Dhar and
                  Ivan Puddu and
                  Kari Kostiainen and
                  Srdjan Capkun},
  title        = {ProximiTEE: Hardened {SGX} Attestation and Trusted Path through Proximity
                  Verification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {902},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/902},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DharPKC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DiehlAFKG18,
  author       = {William Diehl and
                  Abubakr Abdulgadir and
                  Farnoud Farahmand and
                  Jens{-}Peter Kaps and
                  Kris Gaj},
  title        = {Comparison of Cost of Protection Against Differential Power Analysis
                  of Selected Authenticated Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {341},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/341},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DiehlAFKG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DingRAC18,
  author       = {Jintai Ding and
                  Saraswathy RV and
                  Saed Alsayigh and
                  Crystal Clough},
  title        = {How to validate the secret of a Ring Learning with Errors {(RLWE)}
                  key},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {81},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/081},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DingRAC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DinuK18,
  author       = {Daniel Dinu and
                  Ilya Kizhvatov},
  title        = {{EM} Analysis in the IoT Context: Lessons Learned from an Attack on
                  Thread},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {76},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/076},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DinuK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dinur18,
  author       = {Itai Dinur},
  title        = {An Improved Affine Equivalence Algorithm for Random Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {115},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/115},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dinur18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dinur18a,
  author       = {Itai Dinur},
  title        = {An Algorithmic Framework for the Generalized Birthday Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {575},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/575},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dinur18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dinur18b,
  author       = {Itai Dinur},
  title        = {Linear Equivalence of Block Ciphers with Partial Non-Linear Layers:
                  Application to LowMC},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {772},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/772},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dinur18b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DinurKK18,
  author       = {Itai Dinur and
                  Nathan Keller and
                  Ohad Klein},
  title        = {An Optimal Distributed Discrete Log Protocol with Applications to
                  Homomorphic Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {731},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/731},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DinurKK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DinurN18,
  author       = {Itai Dinur and
                  Niv Nadler},
  title        = {Multi-Target Attacks on the Picnic Signature Scheme and Related Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1212},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1212},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DinurN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DiopSDS18,
  author       = {Soda Diop and
                  Bernard Ousmane San{\'{e}} and
                  Nafissatou Diarra and
                  Michel Seck},
  title        = {{NTRU-LPR} {IND-CPA:} {A} New Ideal Lattices-based Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {109},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/109},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DiopSDS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DoMC18,
  author       = {Quang Do and
                  Ben Martini and
                  Kim{-}Kwang Raymond Choo},
  title        = {The Role of the Adversary Model in Applied Security Research},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1189},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1189},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DoMC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigE0LLLM18,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Lorenzo Grassi and
                  Virginie Lallemand and
                  Gregor Leander and
                  Eik List and
                  Florian Mendel and
                  Christian Rechberger},
  title        = {Rasta: {A} cipher with low ANDdepth and few ANDs per bit},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {181},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/181},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigE0LLLM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEGMMP18,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Hannes Gro{\ss} and
                  Stefan Mangard and
                  Florian Mendel and
                  Robert Primas},
  title        = {Statistical Ineffective Fault Attacks on Masked {AES} with Fault Countermeasures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {357},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/357},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEGMMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEKMMP18,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Thomas Korak and
                  Stefan Mangard and
                  Florian Mendel and
                  Robert Primas},
  title        = {Exploiting Ineffective Fault Inductions on Symmetric Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {71},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/071},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEKMMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEMS18,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel and
                  Markus Schofnegger},
  title        = {Algebraic Cryptanalysis of Frit},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {809},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/809},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigMMP18,
  author       = {Christoph Dobraunig and
                  Stefan Mangard and
                  Florian Mendel and
                  Robert Primas},
  title        = {Fault Attacks on Nonce-based Authenticated Encryption: Application
                  to Keyak and Ketje},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {852},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/852},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigMMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DoernerKLS18,
  author       = {Jack Doerner and
                  Yashvanth Kondi and
                  Eysa Lee and
                  Abhi Shelat},
  title        = {Secure Two-party Threshold {ECDSA} from {ECDSA} Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {499},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/499},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DoernerKLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DongDW18,
  author       = {Xiaoyang Dong and
                  Bingyou Dong and
                  Xiaoyun Wang},
  title        = {Quantum Attacks on Some Feistel Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {504},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/504},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DongDW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DongL18,
  author       = {Changyu Dong and
                  Grigorios Loukides},
  title        = {Approximating Private Set Union/Intersection Cardinality with Logarithmic
                  Complexity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {495},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/495},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DongL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DongWAMM18,
  author       = {Changyu Dong and
                  Yilei Wang and
                  Amjad Aldweesh and
                  Patrick McCorry and
                  Aad van Moorsel},
  title        = {Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts
                  for Verifiable Cloud Computing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {489},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/489},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DongWAMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DongY18,
  author       = {Hua Dong and
                  Li Yang},
  title        = {A voting scheme with post-quantum security based on physical laws},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {446},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/446},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DongY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DopmannRT18,
  author       = {Christoph D{\"{o}}pmann and
                  Sebastian Rust and
                  Florian Tschorsch},
  title        = {Exploring Deployment Strategies for the Tor Network},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {661},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/661},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DopmannRT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingN18,
  author       = {Nico D{\"{o}}ttling and
                  Ryo Nishimaki},
  title        = {Universal Proxy Re-Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {840},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/840},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DowlingP18,
  author       = {Benjamin Dowling and
                  Kenneth G. Paterson},
  title        = {A Cryptographic Analysis of the WireGuard Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {80},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/080},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DowlingP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DraganGM18,
  author       = {Constantin Catalin Dragan and
                  Daniel Gardham and
                  Mark Manulis},
  title        = {Hierarchical Attribute-based Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {610},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/610},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DraganGM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DrijversEFN18,
  author       = {Manu Drijvers and
                  Kasra Edalatnejad and
                  Bryan Ford and
                  Gregory Neven},
  title        = {Okamoto Beats Schnorr: On the Provable Security of Multi-Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {417},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/417},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DrijversEFN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DruckerG18,
  author       = {Nir Drucker and
                  Shay Gueron},
  title        = {Fast modular squaring with {AVX512IFMA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {335},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/335},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DruckerG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DruckerGK18,
  author       = {Nir Drucker and
                  Shay Gueron and
                  Vlad Krasnov},
  title        = {Making {AES} great again: the forthcoming vectorized {AES} instruction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {392},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/392},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DruckerGK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DryjaLP18,
  author       = {Thaddeus Dryja and
                  Quanquan C. Liu and
                  Sunoo Park},
  title        = {Static-Memory-Hard Functions and Nonlinear Space-Time Tradeoffs via
                  Pebbling},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {205},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/205},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DryjaLP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DucasP18,
  author       = {L{\'{e}}o Ducas and
                  C{\'{e}}cile Pierrot},
  title        = {Polynomial Time Bounded Distance Decoding near Minkowski's Bound in
                  Discrete Logarithm Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {146},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/146},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DucasP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dunkelman18,
  author       = {Orr Dunkelman},
  title        = {Efficient Construction of the Boomerang Connection Table},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {631},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/631},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dunkelman18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DunkelmanH18,
  author       = {Orr Dunkelman and
                  Senyang Huang},
  title        = {Reconstructing an S-box from its Difference Distribution Table},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {811},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/811},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DunkelmanH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuongCZ18,
  author       = {Tuyet Duong and
                  Alexander Chepurnoy and
                  Hong{-}Sheng Zhou},
  title        = {Multi-mode Cryptocurrency Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {129},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/129},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuongCZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DupinPB18,
  author       = {Aur{\'{e}}lien Dupin and
                  David Pointcheval and
                  Christophe Bidan},
  title        = {On the Leakage of Corrupted Garbled Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {743},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/743},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DupinPB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DupinRB18,
  author       = {Aur{\'{e}}lien Dupin and
                  Jean{-}Marc Robert and
                  Christophe Bidan},
  title        = {Location-Proof System based on Secure Multi-Party Computations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {525},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/525},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DupinRB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DupuisFLS18,
  author       = {Fr{\'{e}}d{\'{e}}ric Dupuis and
                  Serge Fehr and
                  Philippe Lamontagne and
                  Louis Salvail},
  title        = {Secure Certification of Mixed Quantum States with Application to Two-Party
                  Randomness Generation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {910},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/910},
  timestamp    = {Fri, 22 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DupuisFLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DurakV18,
  author       = {F. Bet{\"{u}}l Durak and
                  Serge Vaudenay},
  title        = {Generic Round-Function Recovery for Feistel Networks over Small Domains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {108},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/108},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DurakV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DurakV18a,
  author       = {F. Bet{\"{u}}l Durak and
                  Serge Vaudenay},
  title        = {Bidirectional Asynchronous Ratcheted Key Agreement without Key-Update
                  Primitives},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {889},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/889},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DurakV18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuttaV18,
  author       = {Arijit Dutta and
                  Saravanan Vijayakumaran},
  title        = {MProve: {A} Proof of Assets Protocol for Monero Exchanges},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1210},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1210},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuttaV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuvalL18,
  author       = {S{\'{e}}bastien Duval and
                  Ga{\"{e}}tan Leurent},
  title        = {{MDS} Matrices with Lightweight Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {260},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/260},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuvalL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DwivediM18,
  author       = {Ashutosh Dhar Dwivedi and
                  Pawel Morawiecki},
  title        = {Differential cryptanalysis in {ARX} ciphers, Application to {SPECK}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {899},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/899},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DwivediM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DwivediS18,
  author       = {Ashutosh Dhar Dwivedi and
                  Gautam Srivastava},
  title        = {Differential Cryptanalysis in {ARX} Ciphers, Applications to {LEA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {898},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/898},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DwivediS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DziembowskiEF18,
  author       = {Stefan Dziembowski and
                  Lisa Eckey and
                  Sebastian Faust},
  title        = {FairSwap: How to fairly exchange digital goods},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {740},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/740},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DziembowskiEF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DziembowskiFH18,
  author       = {Stefan Dziembowski and
                  Sebastian Faust and
                  Kristina Host{\'{a}}kov{\'{a}}},
  title        = {Foundations of State Channel Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {320},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/320},
  timestamp    = {Tue, 23 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DziembowskiFH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EatonLPS18,
  author       = {Edward Eaton and
                  Matthieu Lequesne and
                  Alex Parent and
                  Nicolas Sendrier},
  title        = {{QC-MDPC:} {A} Timing Attack and a {CCA2} {KEM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {256},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/256},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EatonLPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EisentragerHLMP18,
  author       = {Kirsten Eisentr{\"{a}}ger and
                  Sean Hallgren and
                  Kristin E. Lauter and
                  Travis Morrison and
                  Christophe Petit},
  title        = {Supersingular isogeny graphs and endomorphism rings: reductions and
                  solutions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {371},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/371},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/EisentragerHLMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EkdahlJMY18,
  author       = {Patrik Ekdahl and
                  Thomas Johansson and
                  Alexander Maximov and
                  Jing Yang},
  title        = {A new {SNOW} stream cipher called {SNOW-V}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1143},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1143},
  timestamp    = {Wed, 12 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EkdahlJMY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ekera18,
  author       = {Martin Eker{\aa}},
  title        = {Quantum algorithms for computing general discrete logarithms and orders
                  with tradeoffs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {797},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/797},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ekera18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EsginSSLL18,
  author       = {Muhammed F. Esgin and
                  Ron Steinfeld and
                  Amin Sakzad and
                  Joseph K. Liu and
                  Dongxi Liu},
  title        = {Short Lattice-based One-out-of-Many Proofs and Applications to Ring
                  Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {773},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/773},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EsginSSLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EskandariKKT18,
  author       = {Zahra Eskandari and
                  Andreas B. Kidmose and
                  Stefan K{\"{o}}lbl and
                  Tyge Tiessen},
  title        = {Finding Integral Distinguishers with Ease},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {688},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/688},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/EskandariKKT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EsserHKMS18,
  author       = {Andre Esser and
                  Felix Heuer and
                  Robert K{\"{u}}bler and
                  Alexander May and
                  Christian Sohler},
  title        = {Dissection-BKW},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {569},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/569},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EsserHKMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EtemadM018,
  author       = {Mohammad Etemad and
                  Mohammad Mahmoody and
                  David Evans},
  title        = {Optimizing Trees for Static Searchable Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {52},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/052},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EtemadM018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FabsicHZ18,
  author       = {Tom{\'{a}}s Fabsic and
                  Viliam Hromada and
                  Pavol Zajac},
  title        = {A Reaction Attack on LEDApkc},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {140},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/140},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FabsicHZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FalkNO18,
  author       = {Brett Hemenway Falk and
                  Daniel Noble and
                  Rafail Ostrovsky},
  title        = {Private Set Intersection with Linear Communication from General Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {238},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/238},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FalkNO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Fan018,
  author       = {Xiong Fan and
                  Qiang Tang},
  title        = {Making Public Key Functional Encryption Function Private, Distributively},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {250},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/250},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Fan018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Faonio18,
  author       = {Antonio Faonio},
  title        = {Efficient Fully-Leakage Resilient One-More Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1140},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1140},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Faonio18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaonioNSV18,
  author       = {Antonio Faonio and
                  Jesper Buus Nielsen and
                  Mark Simkin and
                  Daniele Venturi},
  title        = {Continuously Non-Malleable Codes with Split-State Refresh},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {606},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/606},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FaonioNSV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FarahmandDAKG18,
  author       = {Farnoud Farahmand and
                  William Diehl and
                  Abubakr Abdulgadir and
                  Jens{-}Peter Kaps and
                  Kris Gaj},
  title        = {Improved Lightweight Implementations of {CAESAR} Authenticated Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {573},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/573},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FarahmandDAKG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Farrell18,
  author       = {Stephen Farrell},
  title        = {Clusters of Re-used Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {299},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/299},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Farrell18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FarshimFP18,
  author       = {Pooya Farshim and
                  Georg Fuchsbauer and
                  Alain Passel{\`{e}}gue},
  title        = {Simpler Constructions of Asymmetric Primitives from Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {576},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/576},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FarshimFP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FarshimHHL18,
  author       = {Pooya Farshim and
                  Julia Hesse and
                  Dennis Hofheinz and
                  Enrique Larraia},
  title        = {Graded Encoding Schemes from Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {11},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/011},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FarshimHHL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaugereKMPP18,
  author       = {Jean{-}Charles Faug{\`{e}}re and
                  Eliane Koussa and
                  Gilles Macario{-}Rat and
                  Jacques Patarin and
                  Ludovic Perret},
  title        = {PKP-Based Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {714},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/714},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FaugereKMPP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FauziMMO18,
  author       = {Prastudy Fauzi and
                  Sarah Meiklejohn and
                  Rebekah Mercer and
                  Claudio Orlandi},
  title        = {QuisQuis: {A} New Design for Anonymous Cryptocurrencies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {990},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/990},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FauziMMO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Fehr18,
  author       = {Serge Fehr},
  title        = {Classical Proofs for the Quantum Collapsing Property of Classical
                  Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {887},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/887},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Fehr18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FehrKM18,
  author       = {Serge Fehr and
                  Pierre Karpman and
                  Bart Mennink},
  title        = {Short Non-Malleable Codes from Related-Key Secure Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {204},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/204},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FehrKM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FenteanyF18,
  author       = {Peter Fenteany and
                  Benjamin Fuller},
  title        = {Non-malleable Digital Lockers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {957},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/957},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FenteanyF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FeoG18,
  author       = {Luca De Feo and
                  Steven D. Galbraith},
  title        = {SeaSign: Compact isogeny signatures from class group actions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {824},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/824},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FeoG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FeoKS18,
  author       = {Luca De Feo and
                  Jean Kieffer and
                  Benjamin Smith},
  title        = {Towards practical key exchange from ordinary isogeny graphs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {485},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/485},
  timestamp    = {Wed, 15 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FeoKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FerradiGGNT18,
  author       = {Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  Sylvain Guilley and
                  David Naccache and
                  Mehdi Tibouchi},
  title        = {Recovering Secrets From Prefix-Dependent Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {798},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/798},
  timestamp    = {Wed, 03 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FerradiGGNT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FioreP18,
  author       = {Dario Fiore and
                  Elena Pagnin},
  title        = {Matrioska: {A} Compiler for Multi-Key Homomorphic Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {616},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/616},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FioreP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Fisch18,
  author       = {Ben Fisch},
  title        = {PoReps: Proofs of Space on Useful Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {678},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/678},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Fisch18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Fisch18a,
  author       = {Ben Fisch},
  title        = {Tight Proofs of Space and Replication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {702},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/702},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Fisch18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FischS18,
  author       = {Ben Fisch and
                  Shashwat Silas},
  title        = {Weak Compression and (In)security of Rational Proofs of Storage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {514},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/514},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FischS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FischlinH18,
  author       = {Marc Fischlin and
                  Patrick Harasser},
  title        = {Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {337},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/337},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FischlinH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FischlinJM18,
  author       = {Marc Fischlin and
                  Christian Janson and
                  Sogol Mazaheri},
  title        = {Backdoored Hash Functions: Immunizing {HMAC} and {HKDF}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {362},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/362},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FischlinJM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FitziGKR18,
  author       = {Matthias Fitzi and
                  Peter Gazi and
                  Aggelos Kiayias and
                  Alexander Russell},
  title        = {Parallel Chains: Improving Throughput and Latency of Blockchain Protocols
                  via Parallel Composition},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1119},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1119},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FitziGKR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FledelW18,
  author       = {Dor Fledel and
                  Avishai Wool},
  title        = {Sliding-Window Correlation Attacks Against Encryption Devices with
                  an Unstable Clock},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {317},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/317},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FledelW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FleischhackerG018,
  author       = {Nils Fleischhacker and
                  Vipul Goyal and
                  Abhishek Jain},
  title        = {On the Existence of Three Round Zero-Knowledge Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {167},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/167},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FleischhackerG018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FotiadisK18,
  author       = {Georgios Fotiadis and
                  Elisavet Konstantinou},
  title        = {{TNFS} Resistant Families of Pairing-Friendly Elliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1017},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1017},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FotiadisK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FotiadisM18,
  author       = {Georgios Fotiadis and
                  Chloe Martindale},
  title        = {Optimal TNFS-secure pairings on elliptic curves with even embedding
                  degree},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {969},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/969},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FotiadisM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FouqueHK18,
  author       = {Pierre{-}Alain Fouque and
                  Benjamin Hadjibeyli and
                  Paul Kirchner},
  title        = {Homomorphic Evaluation of Lattice-Based Symmetric Encryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {653},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/653},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FouqueHK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FranklePSGW18,
  author       = {Jonathan Frankle and
                  Sunoo Park and
                  Daniel Shaar and
                  Shafi Goldwasser and
                  Daniel J. Weitzner},
  title        = {Practical Accountability of Secret Processes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {697},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/697},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FranklePSGW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FrederiksenLOP18,
  author       = {Tore Kasper Frederiksen and
                  Yehuda Lindell and
                  Valery Osheter and
                  Benny Pinkas},
  title        = {Fast Distributed {RSA} Key Generation for Semi-Honest and Malicious
                  Adversaries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {577},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/577},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FrederiksenLOP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FrioloMV18,
  author       = {Daniele Friolo and
                  Daniel Masny and
                  Daniele Venturi},
  title        = {Secure Multi-Party Computation from Strongly Uniform Key Agreement},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {473},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/473},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FrioloMV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FritzmannPS18,
  author       = {Tim Fritzmann and
                  Thomas P{\"{o}}ppelmann and
                  Johanna Sep{\'{u}}lveda},
  title        = {Analysis of Error-Correcting Codes for Lattice-Based Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {150},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/150},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FritzmannPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuWDM18,
  author       = {Ximing Fu and
                  Xiaoyun Wang and
                  Xiaoyang Dong and
                  Willi Meier},
  title        = {A Key-recovery Attack on 855-round Trivium},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {198},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/198},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuWDM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuWDMHZ18,
  author       = {Ximing Fu and
                  Xiaoyun Wang and
                  Xiaoyang Dong and
                  Willi Meier and
                  Yonglin Hao and
                  Boxin Zhao},
  title        = {A Refinement of "A Key-recovery Attack on 855-round Trivium" From
                  {CRYPTO} 2018},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {999},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/999},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuWDMHZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuchsbauerG18,
  author       = {Georg Fuchsbauer and
                  Romain Gay},
  title        = {Weakly Secure Equivalence-Class Signatures from Standard Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {37},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/037},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuchsbauerG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuchsbauerKKP18,
  author       = {Georg Fuchsbauer and
                  Chethan Kamath and
                  Karen Klein and
                  Krzysztof Pietrzak},
  title        = {Adaptively Secure Proxy Re-encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {426},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/426},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuchsbauerKKP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuchsbauerO18,
  author       = {Georg Fuchsbauer and
                  Michele Orr{\`{u}}},
  title        = {Non-interactive zaps of knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {228},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/228},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuchsbauerO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuchsbauerOS18,
  author       = {Georg Fuchsbauer and
                  Michele Orr{\`{u}} and
                  Yannick Seurin},
  title        = {Aggregate Cash Systems: {A} Cryptographic Investigation of Mimblewimble},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1039},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1039},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuchsbauerOS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FujiokaTTY18,
  author       = {Atsushi Fujioka and
                  Katsuyuki Takashima and
                  Shintaro Terada and
                  Kazuki Yoneyama},
  title        = {Supersingular Isogeny Diffie-Hellman Authenticated Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {730},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/730},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FujiokaTTY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FujiokaTY18,
  author       = {Atsushi Fujioka and
                  Katsuyuki Takashima and
                  Kazuki Yoneyama},
  title        = {One-Round Authenticated Group Key Exchange from Isogenies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1033},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1033},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FujiokaTY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FullerP18,
  author       = {Benjamin Fuller and
                  Lowen Peng},
  title        = {When are Continuous-Source Fuzzy Extractors Possible?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {461},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/461},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FullerP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalalY18,
  author       = {Hisham S. Galal and
                  Amr M. Youssef},
  title        = {Verifiable Sealed-Bid Auction on the Ethereum Blockchain},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {704},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/704},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalalY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Galbraith18,
  author       = {Steven D. Galbraith},
  title        = {Authenticated key exchange for {SIDH}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {266},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/266},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Galbraith18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithPSV18,
  author       = {Steven D. Galbraith and
                  Lorenz Panny and
                  Benjamin Smith and
                  Frederik Vercauteren},
  title        = {Quantum Equivalence of the {DLP} and {CDHP} for Group Actions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1199},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1199},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithPSV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaneshKPS18,
  author       = {Chaya Ganesh and
                  Yashvanth Kondi and
                  Arpita Patra and
                  Pratik Sarkar},
  title        = {Efficient Adaptively Secure Zero-knowledge from Garbled Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {43},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/043},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaneshKPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaneshOT18,
  author       = {Chaya Ganesh and
                  Claudio Orlandi and
                  Daniel Tschudi},
  title        = {Proof-of-Stake Protocols for Privacy-Aware Blockchains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1105},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1105},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaneshOT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gao18,
  author       = {Shuhong Gao},
  title        = {Efficient Fully Homomorphic Encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {637},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/637},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gao18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaoJKNXBKDRR18,
  author       = {Yansong Gao and
                  Chenglu Jin and
                  Jeeson Kim and
                  Hussein Nili and
                  Xiaolin Xu and
                  Wayne P. Burleson and
                  Omid Kavehei and
                  Marten van Dijk and
                  Damith Chinthana Ranasinghe and
                  Ulrich R{\"{u}}hrmair},
  title        = {Efficient Erasable PUFs from Programmable Logic and Memristors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {358},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/358},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaoJKNXBKDRR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaoOCX18,
  author       = {Si Gao and
                  Elisabeth Oswald and
                  Hua Chen and
                  Wei Xi},
  title        = {Non-profiled Mask Recovery: the impact of Independent Component Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {871},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/871},
  timestamp    = {Fri, 04 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaoOCX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaoRO18,
  author       = {Si Gao and
                  Arnab Roy and
                  Elisabeth Oswald},
  title        = {Constructing TI-friendly Substitution Boxes using Shift-Invariant
                  Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {949},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/949},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaoRO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaoZC18,
  author       = {Yiwen Gao and
                  Yongbin Zhou and
                  Wei Cheng},
  title        = {How Does Strict Parallelism Affect Security? {A} Case Study on the
                  Side-Channel Attacks against GPU-based Bitsliced {AES} Implementation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1080},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1080},
  timestamp    = {Fri, 11 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GaoZC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarayK18,
  author       = {Juan A. Garay and
                  Aggelos Kiayias},
  title        = {SoK: {A} Consensus Taxonomy in the Blockchain Era},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {754},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/754},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarayK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargGH18,
  author       = {Sanjam Garg and
                  Romain Gay and
                  Mohammad Hajiabadi},
  title        = {New Techniques for Efficient Trapdoor Functions and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {872},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/872},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargGH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargH18,
  author       = {Sanjam Garg and
                  Mohammad Hajiabadi},
  title        = {Trapdoor Functions from the Computational Diffie-Hellman Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {529},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/529},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargHMM18,
  author       = {Sanjam Garg and
                  Mohammad Hajiabadi and
                  Mohammad Mahmoody and
                  Ameer Mohammed},
  title        = {Limits on the Power of Garbling Techniques for Public-Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {555},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/555},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargHMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargHMR18,
  author       = {Sanjam Garg and
                  Mohammad Hajiabadi and
                  Mohammad Mahmoody and
                  Ahmadreza Rahimi},
  title        = {Registration-Based Encryption: Removing Private-Key Generator from
                  {IBE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {919},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/919},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargHMR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargHMRS18,
  author       = {Sanjam Garg and
                  Mohammad Hajiabadi and
                  Mohammad Mahmoody and
                  Ahmadreza Rahimi and
                  Sruthi Sekar},
  title        = {Registration-Based Encryption from Standard Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1030},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1030},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargHMRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargIS18,
  author       = {Sanjam Garg and
                  Yuval Ishai and
                  Akshayaram Srinivasan},
  title        = {Two-Round {MPC:} Information-Theoretic and Black-Box},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {909},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/909},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargIS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargKP18,
  author       = {Sanjam Garg and
                  Susumu Kiyoshima and
                  Omkant Pandey},
  title        = {A New Approach to Black-Box Concurrent Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {156},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/156},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargKP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargMS18,
  author       = {Sanjam Garg and
                  Peihan Miao and
                  Akshayaram Srinivasan},
  title        = {Two-Round Multiparty Secure Computation Minimizing Public Key Operations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {180},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/180},
  timestamp    = {Wed, 02 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargOS18,
  author       = {Sanjam Garg and
                  Rafail Ostrovsky and
                  Akshayaram Srinivasan},
  title        = {Adaptive Garbled {RAM} from Laconic Oblivious Transfer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {549},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/549},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargOS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargS18,
  author       = {Sanjam Garg and
                  Akshayaram Srinivasan},
  title        = {Adaptively Secure Garbling with Near Optimal Online Complexity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {151},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/151},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargS18a,
  author       = {Sanjam Garg and
                  Akshayaram Srinivasan},
  title        = {A Simple Construction of iO for Turing Machines},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {771},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/771},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargS18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GayHKP18,
  author       = {Romain Gay and
                  Dennis Hofheinz and
                  Lisa Kohl and
                  Jiaxin Pan},
  title        = {More Efficient (Almost) Tightly Secure Structure-Preserving Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {54},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/054},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GayHKP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GayKW18,
  author       = {Romain Gay and
                  Lucas Kowalczyk and
                  Hoeteck Wee},
  title        = {Tight Adaptively Secure Broadcast Encryption with Short Ciphertexts
                  and Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {391},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/391},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GayKW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaziKR18,
  author       = {Peter Gazi and
                  Aggelos Kiayias and
                  Alexander Russell},
  title        = {Stake-Bleeding Attacks on Proof-of-Stake Blockchains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {248},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/248},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaziKR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaziKZ18,
  author       = {Peter Gazi and
                  Aggelos Kiayias and
                  Dionysis Zindros},
  title        = {Proof-of-Stake Sidechains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1239},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1239},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaziKZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GellesPZ18,
  author       = {Ran Gelles and
                  Anat Paskin{-}Cherniavsky and
                  Vassilis Zikas},
  title        = {Secure Two-Party Computation over Unreliable Channels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {506},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/506},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GellesPZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Geltink18,
  author       = {Gerben Geltink},
  title        = {Concealing Ketje: {A} Lightweight PUF-Based Privacy Preserving Authentication
                  Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1016},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1016},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Geltink18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GenetKPM18,
  author       = {Aymeric Gen{\^{e}}t and
                  Matthias J. Kannwischer and
                  Herv{\'{e}} Pelletier and
                  Andrew McLauchlan},
  title        = {Practical Fault Injection Attacks on {SPHINCS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {674},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/674},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GenetKPM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GeniseMP18,
  author       = {Nicholas Genise and
                  Daniele Micciancio and
                  Yuriy Polyakov},
  title        = {Building an Efficient Lattice Gadget Toolkit: Subgaussian Sampling
                  and More},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {946},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/946},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GeniseMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GenkinPTY18,
  author       = {Daniel Genkin and
                  Lev Pachmanov and
                  Eran Tromer and
                  Yuval Yarom},
  title        = {Drive-by Key-Extraction Cache Attacks from Portable Code},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {119},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/119},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GenkinPTY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GennaroMNO18,
  author       = {Rosario Gennaro and
                  Michele Minelli and
                  Anca Nitulescu and
                  Michele Orr{\`{u}}},
  title        = {Lattice-Based zk-SNARKs from Square Span Programs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {275},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/275},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GennaroMNO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryJ18,
  author       = {Craig Gentry and
                  Charanjit S. Jutla},
  title        = {Obfuscation Using Tensor Products},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {756},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/756},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryOR18,
  author       = {Craig Gentry and
                  Adam O'Neill and
                  Leonid Reyzin},
  title        = {A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate
                  Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {70},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/070},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryOR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gerard18,
  author       = {Fran{\c{c}}ois G{\'{e}}rard},
  title        = {Module-lattice {KEM} Over a Ring of Dimension 128 for Embedded Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {677},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/677},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gerard18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GerardM18,
  author       = {Fran{\c{c}}ois G{\'{e}}rard and
                  Keno Merckx},
  title        = {Post-Quantum Signcryption From Lattice-Based Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {56},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/056},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GerardM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GeraudN18,
  author       = {R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  title        = {Mixed-radix Naccache-Stern encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {278},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/278},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GeraudN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ghadafi18,
  author       = {Essam Ghadafi},
  title        = {Further Lower Bounds for Structure-Preserving Signatures in Asymmetric
                  Bilinear Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1224},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1224},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ghadafi18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GhoshalPM18,
  author       = {Ashrujit Ghoshal and
                  Sikhar Patranabis and
                  Debdeep Mukhopadhyay},
  title        = {Template-based Fault Injection Analysis of Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {72},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/072},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GhoshalPM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GhoshalSPDPM18,
  author       = {Ashrujit Ghoshal and
                  Rajat Sadhukhan and
                  Sikhar Patranabis and
                  Nilanjan Datta and
                  Stjepan Picek and
                  Debdeep Mukhopadhyay},
  title        = {Lightweight and Side-channel Secure 4x4 S-Boxes from Cellular Automata
                  Rules},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {832},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/832},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GhoshalSPDPM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GiaconHP18,
  author       = {Federico Giacon and
                  Felix Heuer and
                  Bertram Poettering},
  title        = {{KEM} Combiners},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {24},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/024},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GiaconHP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GjosteenJ18,
  author       = {Kristian Gj{\o}steen and
                  Tibor Jager},
  title        = {Practical and Tightly-Secure Digital Signatures and Authenticated
                  Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {543},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/543},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GjosteenJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GodiV18,
  author       = {Murali Godi and
                  Roopa Vishwanathan},
  title        = {New Techniques for Public Key Encryption with Sender Recovery},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {16},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/016},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GodiV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldwasserP18,
  author       = {Shafi Goldwasser and
                  Sunoo Park},
  title        = {Public Accountability vs. Secret Laws: Can They Coexist?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {664},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/664},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldwasserP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GologluJ18,
  author       = {Faruk G{\"{o}}loglu and
                  Antoine Joux},
  title        = {A Simplified Approach to Rigorous Degree 2 Elimination in Discrete
                  Logarithm Algorithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {430},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/430},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GologluJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoodellN18,
  author       = {Brandon Goodell and
                  Sarang Noether},
  title        = {Thring Signatures and their Applications to Spender-Ambiguous Digital
                  Currencies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {774},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/774},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoodellN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GordonR018,
  author       = {S. Dov Gordon and
                  Samuel Ranellucci and
                  Xiao Wang},
  title        = {Secure Computation with Low Communication from Cross-checking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {216},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/216},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GordonR018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GossJ18,
  author       = {Ken Goss and
                  Wei Jiang},
  title        = {Efficient and Constant-Rounds Secure Comparison through Dynamic Groups
                  and Asymmetric Computations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {179},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/179},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GossJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GotaishiT18,
  author       = {Masahito Gotaishi and
                  Shigeo Tsujii},
  title        = {Organizational Cryptography for Access Control},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1120},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1120},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GotaishiT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoubinMRP18,
  author       = {Louis Goubin and
                  Geraldine Monsalve and
                  Juan L. Reutter and
                  Francisco Jos{\'{e}} Vial Prado},
  title        = {Excalibur Key-Generation Protocols For {DAG} Hierarchic Decryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1177},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1177},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoubinMRP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoubinP18,
  author       = {Louis Goubin and
                  Francisco Jos{\'{e}} Vial Prado},
  title        = {Blending {FHE-NTRU} keys - The Excalibur Property},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {794},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/794},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoubinP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoubinPRW18,
  author       = {Louis Goubin and
                  Pascal Paillier and
                  Matthieu Rivain and
                  Junwei Wang},
  title        = {How to Reveal the Secrets of an Obscure White-Box Implementation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {98},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/098},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoubinPRW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoudarziJRS18,
  author       = {Dahmun Goudarzi and
                  Anthony Journault and
                  Matthieu Rivain and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Secure Multiplication for Bitslice Higher-Order Masking: Optimisation
                  and Comparison},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {315},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/315},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoudarziJRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Goyal018,
  author       = {Vipul Goyal and
                  Ashutosh Kumar},
  title        = {Non-Malleable Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {316},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/316},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Goyal018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Goyal18,
  author       = {Rishab Goyal},
  title        = {Quantum Multi-Key Homomorphic Encryption for Polynomial-Sized Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {443},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/443},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Goyal18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalK18,
  author       = {Vipul Goyal and
                  Ashutosh Kumar},
  title        = {Non-Malleable Secret Sharing for General Access Structures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {750},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/750},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalKW18,
  author       = {Rishab Goyal and
                  Venkata Koppula and
                  Brent Waters},
  title        = {Collusion Resistant Traitor Tracing from Learning with Errors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {346},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/346},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalKW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Grebnev18,
  author       = {Sergey Grebnev},
  title        = {On the Feasibility of an {ECDLP} Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {399},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/399},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Grebnev18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GreenRO18,
  author       = {Joey Green and
                  Arnab Roy and
                  Elisabeth Oswald},
  title        = {A Systematic Study of the Impact of Graphical Models on Inference-based
                  Attacks on {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {671},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/671},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GreenRO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GregoirePSS18,
  author       = {Benjamin Gr{\'{e}}goire and
                  Kostas Papagiannopoulos and
                  Peter Schwabe and
                  Ko Stoffelen},
  title        = {Vectorizing Higher-Order Masking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {173},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/173},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GregoirePSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gremy18,
  author       = {Laurent Gr{\'{e}}my},
  title        = {Higher dimensional sieving for the number field sieve algorithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {967},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/967},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gremy18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrigorievS18,
  author       = {Dima Grigoriev and
                  Vladimir Shpilrain},
  title        = {Tropical cryptography {II:} extensions by homomorphisms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1104},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1104},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrigorievS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrittiOM18,
  author       = {Cl{\'{e}}mentine Gritti and
                  Melek {\"{O}}nen and
                  Refik Molva},
  title        = {{CHARIOT:} Cloud-Assisted Access Control for the Internet of Things},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {632},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/632},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrittiOM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrontasPZZ18,
  author       = {Panagiotis Grontas and
                  Aris Pagourtzis and
                  Alexandros Zacharakis and
                  Bingsheng Zhang},
  title        = {Towards everlasting privacy and efficient coercion resistance in remote
                  electronic voting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {215},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/215},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrontasPZZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrossMKM18,
  author       = {Hannes Gro{\ss} and
                  Lauren De Meyer and
                  Martin Krenn and
                  Stefan Mangard},
  title        = {Masking the {AES} with Only Two Random Bits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1007},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1007},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrossMKM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Grosso18,
  author       = {Vincent Grosso},
  title        = {Scalable Key Rank Estimation (and Key Enumeration) Algorithm for Large
                  Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {175},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/175},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Grosso18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrothKMMM18,
  author       = {Jens Groth and
                  Markulf Kohlweiss and
                  Mary Maller and
                  Sarah Meiklejohn and
                  Ian Miers},
  title        = {Updatable and Universal Common Reference Strings with Applications
                  to zk-SNARKs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {280},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/280},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrothKMMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrubbsLMP18,
  author       = {Paul Grubbs and
                  Marie{-}Sarah Lacharit{\'{e}} and
                  Brice Minaud and
                  Kenny Paterson},
  title        = {Pump up the Volume: Practical Database Reconstruction from Volume
                  Leakage on Range Queries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {965},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/965},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrubbsLMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gu18,
  author       = {Chunsheng Gu},
  title        = {Multilinear maps via secret ring},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {312},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/312},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gu18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuW18,
  author       = {Ke Gu and
                  Na Wu},
  title        = {Constant Size Traceable Ring Signature Scheme without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {288},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/288},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuY18,
  author       = {Ke Gu and
                  Bo Yin},
  title        = {Efficient Group Signature Scheme without Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {879},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/879},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuilhemOPS18,
  author       = {Cyprien Delpech de Saint Guilhem and
                  Emmanuela Orsini and
                  Christophe Petit and
                  Nigel P. Smart},
  title        = {Secure Oblivious Transfer from Semi-Commutative Masking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {648},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/648},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GuilhemOPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GunluKISKS18,
  author       = {Onur G{\"{u}}nl{\"{u}} and
                  Tasnad Kernetzky and
                  Onurcan Iscan and
                  Vladimir Sidorenko and
                  Gerhard Kramer and
                  Rafael F. Schaefer},
  title        = {Secure and Reliable Key Agreement with Physical Unclonable Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {518},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/518},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GunluKISKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GunnPA18,
  author       = {Lachlan J. Gunn and
                  Ricardo Vieitez Parra and
                  N. Asokan},
  title        = {On The Use of Remote Attestation to Break and Repair Deniability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {424},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/424},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GunnPA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoGS18,
  author       = {Qian Guo and
                  Vincent Grosso and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Modeling Soft Analytical Side-Channel Attacks from a Coding Theory
                  Viewpoint},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {498},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/498},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoGS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoPPS18,
  author       = {Chun Guo and
                  Olivier Pereira and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Leakage-Resilient Authenticated Encryption with Misuse in the Leveled
                  Leakage Setting: Definitions, Separation Results, and Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {484},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/484},
  timestamp    = {Thu, 04 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoPPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoW18,
  author       = {Chun Guo and
                  Lei Wang},
  title        = {Revisiting Key-alternating Feistel Ciphers for Shorter Keys and Multi-user
                  Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {816},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/816},
  timestamp    = {Thu, 04 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gyu-CholS18,
  author       = {Gyu{-}Chol Kim and
                  Su{-}Chol Li},
  title        = {A study on the fast ElGamal encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {930},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/930},
  timestamp    = {Wed, 03 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gyu-CholS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaaghKOSS18,
  author       = {Helene Haagh and
                  Aleksandr Karbyshev and
                  Sabine Oechsner and
                  Bas Spitters and
                  Pierre{-}Yves Strub},
  title        = {Computer-aided proofs for multiparty computation with active security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {502},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/502},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaaghKOSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaaseL18,
  author       = {Bj{\"{o}}rn Haase and
                  Beno{\^{\i}}t Labrique},
  title        = {AuCPace: Efficient verifier-based {PAKE} protocol tailored for the
                  IIoT},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {286},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/286},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaaseL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Haider18,
  author       = {Faraz Haider},
  title        = {Compact Sparse Merkle Trees},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {955},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/955},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Haider18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaitnerMO18,
  author       = {Iftach Haitner and
                  Nikolaos Makriyannis and
                  Eran Omri},
  title        = {On the Complexity of Fair Coin Flipping},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {901},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/901},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaitnerMO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hajiabadi18,
  author       = {Mohammad Hajiabadi},
  title        = {Enhancements Are Blackbox Non-Trivial: Impossibility of Enhanced Trapdoor
                  Permutations from Standard Trapdoor Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {900},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/900},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hajiabadi18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviIKR18,
  author       = {Shai Halevi and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Tal Rabin},
  title        = {Best Possible Information-Theoretic {MPC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {913},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/913},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviIKR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviPS18,
  author       = {Shai Halevi and
                  Yuriy Polyakov and
                  Victor Shoup},
  title        = {An Improved {RNS} Variant of the {BFV} Homomorphic Encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {117},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/117},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviS18,
  author       = {Shai Halevi and
                  Victor Shoup},
  title        = {Faster Homomorphic Linear Transformations in HElib},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {244},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/244},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hall-AndersenV18,
  author       = {Mathias Hall{-}Andersen and
                  Philip S. Vejre},
  title        = {Generating Graphs Packed with Paths},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {764},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/764},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hall-AndersenV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HalunenL18,
  author       = {Kimmo Halunen and
                  Outi{-}Marja Latvala},
  title        = {Cryptography for Human Senses},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {757},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/757},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HalunenL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HamlinOWW18,
  author       = {Ariel Hamlin and
                  Rafail Ostrovsky and
                  Mor Weiss and
                  Daniel Wichs},
  title        = {Private Anonymous Data Access},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {363},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/363},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HamlinOWW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HamlinSWW18,
  author       = {Ariel Hamlin and
                  Abhi Shelat and
                  Mor Weiss and
                  Daniel Wichs},
  title        = {Multi-Key Searchable Encryption, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {18},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/018},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HamlinSWW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HanHCP18,
  author       = {Kyoohyung Han and
                  Seungwan Hong and
                  Jung Hee Cheon and
                  Daejun Park},
  title        = {Efficient Logistic Regression on Large Encrypted Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {662},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/662},
  timestamp    = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HanHCP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaoJLMTW18,
  author       = {Yonglin Hao and
                  Lin Jiao and
                  Chaoyun Li and
                  Willi Meier and
                  Yosuke Todo and
                  Qingju Wang},
  title        = {Observations on the Dynamic Cube Attack of 855-Round {TRIVIUM} from
                  Crypto'18},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {972},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/972},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaoJLMTW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaraKMHT18,
  author       = {Keisuke Hara and
                  Fuyuki Kitagawa and
                  Takahiro Matsuda and
                  Goichiro Hanaoka and
                  Keisuke Tanaka},
  title        = {Simulation-based Receiver Selective Opening {CCA} Secure {PKE} from
                  Standard Computational Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1091},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1091},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaraKMHT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HarcholAP18,
  author       = {Yotam Harchol and
                  Ittai Abraham and
                  Benny Pinkas},
  title        = {Distributed {SSH} Key Management with Proactive {RSA} Threshold Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {389},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/389},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HarcholAP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HarshaB18,
  author       = {Benjamin Harsha and
                  Jeremiah Blocki},
  title        = {Just in Time Hashing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {112},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/112},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HarshaB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hashimoto18,
  author       = {Yasufumi Hashimoto},
  title        = {On the security of Circulant UOV/Rainbow},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {947},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/947},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hashimoto18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HashimotoIT18,
  author       = {Yasufumi Hashimoto and
                  Yasuhiko Ikematsu and
                  Tsuyoshi Takagi},
  title        = {Chosen Message Attack on Multivariate Signature {ELSA} at Asiacrypt
                  2017},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {310},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/310},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HashimotoIT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HastingsHW18,
  author       = {Marcella Hastings and
                  Nadia Heninger and
                  Eric Wustrow},
  title        = {The Proof is in the Pudding: Proofs of Work for Solving Discrete Logarithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {939},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/939},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HastingsHW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HayashiK18,
  author       = {Masahito Hayashi and
                  Takeshi Koshiba},
  title        = {Secure Modulo Zero-Sum Randomness as Cryptographic Resource},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {802},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/802},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HayashiK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HazayOSS18,
  author       = {Carmit Hazay and
                  Emmanuela Orsini and
                  Peter Scholl and
                  Eduardo Soria{-}Vazquez},
  title        = {TinyKeys: {A} New Approach to Efficient Multi-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {208},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/208},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HazayOSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HazayOSS18a,
  author       = {Carmit Hazay and
                  Emmanuela Orsini and
                  Peter Scholl and
                  Eduardo Soria{-}Vazquez},
  title        = {Concretely Efficient Large-Scale {MPC} with Active Security (or, TinyKeys
                  for TinyOT)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {843},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/843},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HazayOSS18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HazayV18,
  author       = {Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Round-Optimal Fully Black-Box Zero-Knowledge Arguments from One-Way
                  Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {912},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/912},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HazayV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HebantPP18,
  author       = {Chlo{\'{e}} H{\'{e}}bant and
                  Duong Hieu Phan and
                  David Pointcheval},
  title        = {Decentralized Evaluation of Quadratic Polynomials on Encrypted Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1019},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1019},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HebantPP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeibergKSW18,
  author       = {Sven Heiberg and
                  Ivo Kubjas and
                  Janno Siim and
                  Jan Willemson},
  title        = {On Trade-offs of Applying Block Chains for Electronic Voting Bulletin
                  Boards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {685},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/685},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeibergKSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HelslootTE18,
  author       = {Leon J. Helsloot and
                  Gamze Tillem and
                  Zekeriya Erkin},
  title        = {BAdASS: Preserving Privacy in Behavioural Advertising with Applied
                  Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {744},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/744},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HelslootTE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HesseHK18,
  author       = {Julia Hesse and
                  Dennis Hofheinz and
                  Lisa Kohl},
  title        = {On Tightly Secure Non-Interactive Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {237},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/237},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HesseHK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Heys18,
  author       = {Howard M. Heys},
  title        = {Distributed Time-Memory Tradeoff Attacks on Ciphers (with Application
                  to Stream Ciphers and Counter Mode)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {123},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/123},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Heys18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HiroseS18,
  author       = {Shoichi Hirose and
                  Junji Shikata},
  title        = {Non-adaptive Group-Testing Aggregate {MAC} Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {448},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/448},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HiroseS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HisilR18,
  author       = {H{\"{u}}seyin Hisil and
                  Joost Renes},
  title        = {On Kummer Lines With Full Rational 2-torsion and Their Usage in Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {839},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/839},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HisilR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoangOJY18,
  author       = {Thang Hoang and
                  Muslum Ozgur Ozmen and
                  Yeongjin Jang and
                  Attila A. Yavuz},
  title        = {Hardware-Supported {ORAM} in Effect: Practical Oblivious Search and
                  Update on Very Large Dataset},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {247},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/247},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HoangOJY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoangTT18,
  author       = {Viet Tung Hoang and
                  Stefano Tessaro and
                  Ni Trieu},
  title        = {The Curse of Small Domains: New Attacks on Format-Preserving Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {556},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/556},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HoangTT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoangTT18a,
  author       = {Viet Tung Hoang and
                  Stefano Tessaro and
                  Aishwarya Thiruvengadam},
  title        = {The Multi-user Security of GCM, Revisited: Tight Bounds for Nonce
                  Randomization},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {993},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/993},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HoangTT18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoffmannFNRS18,
  author       = {Max Hoffmann and
                  Valerie Fetzer and
                  Matthias Nagel and
                  Andy Rupp and
                  Rebecca Schwerdt},
  title        = {{P4TC} - Provably-Secure yet Practical Privacy-Preserving Toll Collection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1106},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1106},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HoffmannFNRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoffsteinSWZ18,
  author       = {Jeffrey Hoffstein and
                  Joseph H. Silverman and
                  William Whyte and
                  Zhenfei Zhang},
  title        = {A signature scheme from the finite field isomorphism problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {675},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/675},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HoffsteinSWZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HofheinzJP18,
  author       = {Dennis Hofheinz and
                  Dingding Jia and
                  Jiaxin Pan},
  title        = {Identity-based Encryption Tightly Secure under Chosen-ciphertext Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {834},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/834},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HofheinzJP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HofheinzN18,
  author       = {Dennis Hofheinz and
                  Ngoc Khanh Nguyen},
  title        = {On Tightly Secure Primitives in the Multi-Instance Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {958},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/958},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HofheinzN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoganMRCDHVZ18,
  author       = {Kyle Hogan and
                  Hoda Maleki and
                  Reza Rahaeimehr and
                  Ran Canetti and
                  Marten van Dijk and
                  Jason Hennessey and
                  Mayank Varia and
                  Haibin Zhang},
  title        = {On the Universally Composable Security of OpenStack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {602},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/602},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HoganMRCDHVZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HohenbergerW18,
  author       = {Susan Hohenberger and
                  Brent Waters},
  title        = {Synchronized Aggregate Signatures from the {RSA} Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {82},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/082},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HohenbergerW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HolmgrenL18,
  author       = {Justin Holmgren and
                  Alex Lombardi},
  title        = {Cryptographic Hashing From Strong One-Way Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {385},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/385},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HolmgrenL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HolmgrenR18,
  author       = {Justin Holmgren and
                  Ron D. Rothblum},
  title        = {Delegating Computations with (almost) Minimal Time and Space Overhead},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {861},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/861},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HolmgrenR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Homer18,
  author       = {Miloslav Homer},
  title        = {A Chosen Plaintext Attack on Offset Public Permutation Mode},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {351},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/351},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Homer18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HongKKLW18,
  author       = {Cheng Hong and
                  Jonathan Katz and
                  Vladimir Kolesnikov and
                  Wen{-}jie Lu and
                  Xiao Wang},
  title        = {Covert Security with Public Verifiability: Faster, Leaner, and Simpler},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1108},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1108},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HongKKLW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HorelPRV18,
  author       = {Thibaut Horel and
                  Sunoo Park and
                  Silas Richelson and
                  Vinod Vaikuntanathan},
  title        = {How to Subvert Backdoored Encryption: Security Against Adversaries
                  that Decrypt All Ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {212},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/212},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HorelPRV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HosoyamadaSTX18,
  author       = {Akinori Hosoyamada and
                  Yu Sasaki and
                  Seiichiro Tani and
                  Keita Xagawa},
  title        = {Improved Quantum Multicollision-Finding Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1122},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1122},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HosoyamadaSTX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HosoyamadaY18,
  author       = {Akinori Hosoyamada and
                  Kan Yasuda},
  title        = {Building Quantum-One-Way Functions from Block Ciphers: Davies-Meyer
                  and Merkle-Damg{\aa}rd Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {841},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/841},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HosoyamadaY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HosoyamadaY18a,
  author       = {Akinori Hosoyamada and
                  Takashi Yamakawa},
  title        = {Finding Collisions in a Quantum World: Quantum Black-Box Separation
                  of Collision-Resistance and One-Wayness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1066},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1066},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HosoyamadaY18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HouBZL18,
  author       = {Xiaolu Hou and
                  Jakub Breier and
                  Fuyuan Zhang and
                  Yang Liu},
  title        = {Fully Automated Differential Fault Analysis on Software Implementations
                  of Cryptographic Algorithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {545},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/545},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HouBZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HovelmannsKSU18,
  author       = {Kathrin H{\"{o}}velmanns and
                  Eike Kiltz and
                  Sven Sch{\"{a}}ge and
                  Dominique Unruh},
  title        = {Generic Authenticated Key Exchange in the Quantum Random Oracle Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {928},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/928},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HovelmannsKSU18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoweOKG18,
  author       = {James Howe and
                  Tobias Oder and
                  Markus Krausz and
                  Tim G{\"{u}}neysu},
  title        = {Standard Lattice-Based Key Encapsulation on Embedded Devices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {686},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/686},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HoweOKG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuCA18,
  author       = {Peizhao Hu and
                  Sherman S. M. Chow and
                  Asma Aloufi},
  title        = {Geosocial Query with User-Controlled Privacy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {304},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/304},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuCA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuCGW18,
  author       = {Kai Hu and
                  Tingting Cui and
                  Chao Gao and
                  Meiqin Wang},
  title        = {Towards Key-Dependent Integral and Impossible Differential Distinguishers
                  on 5-Round {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {726},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/726},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HuCGW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuW18,
  author       = {Kai Hu and
                  Meiqin Wang},
  title        = {Automatic Search for {A} Variant of Division Property Using Three
                  Subsets (Full Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1187},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1187},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HuW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuZG18,
  author       = {Kexin Hu and
                  Zhenfeng Zhang and
                  Kaiwen Guo},
  title        = {Breaking the Binding: Attacks on the Merkle Approach to Prove Liabilities
                  and its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1139},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1139},
  timestamp    = {Wed, 24 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HuZG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangL18,
  author       = {Qiong Huang and
                  Hongbo Li},
  title        = {An Efficient Public-Key Searchable Encryption Scheme Secure against
                  Inside Keyword Guessing Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {7},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/007},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangLCAPL18,
  author       = {Zhengan Huang and
                  Junzuo Lai and
                  Wenbin Chen and
                  Man Ho Au and
                  Zhen Peng and
                  Jin Li},
  title        = {Hedged Nonce-Based Public-Key Encryption: Adaptive Security under
                  Randomness Failures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {25},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/025},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangLCAPL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangLCAPL18a,
  author       = {Zhengan Huang and
                  Junzuo Lai and
                  Wenbin Chen and
                  Man Ho Au and
                  Zhen Peng and
                  Jin Li},
  title        = {Simulation-Based Selective Opening Security for Receivers under Chosen-Ciphertext
                  Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {755},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/755},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangLCAPL18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HubacekRV18,
  author       = {Pavel Hub{\'{a}}cek and
                  Alon Rosen and
                  Margarita Vald},
  title        = {An Efficiency-Preserving Transformation from Honest-Verifier Statistical
                  Zero-Knowledge to Statistical Zero-Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {164},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/164},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HubacekRV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Huguenin-Dumittan18,
  author       = {Lo{\"{\i}}s Huguenin{-}Dumittan and
                  Iraklis Leontiadis},
  title        = {A Message Franking Channel},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {920},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/920},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Huguenin-Dumittan18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HulsingBB18,
  author       = {Andreas H{\"{u}}lsing and
                  Christoph Busold and
                  Johannes Buchmann},
  title        = {Forward Secure Signatures on Smart Cards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {924},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/924},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HulsingBB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/InoueM18,
  author       = {Akiko Inoue and
                  Kazuhiko Minematsu},
  title        = {Cryptanalysis of {OCB2}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1040},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1040},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/InoueM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshaiMO18,
  author       = {Yuval Ishai and
                  Manika Mittal and
                  Rafail Ostrovsky},
  title        = {On the Message Complexity of Secure Multiparty Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {38},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/038},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshaiMO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshizakaM18,
  author       = {Masahito Ishizaka and
                  Kanta Matsuura},
  title        = {Strongly Unforgeable Signatures Resilient to Polynomially Hard-to-Invert
                  Leakage under Standard Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1044},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1044},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshizakaM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IslerK18,
  author       = {Devri\c{s} \.{I}\c{s}ler and
                  Alptekin K{\"{u}}p{\c{c}}{\"{u}}},
  title        = {Distributed Single Password Protocol Framework},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {976},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/976},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IslerK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IslerK18a,
  author       = {Devri\c{s} \.{I}\c{s}ler and
                  Alptekin K{\"{u}}p{\c{c}}{\"{u}}},
  title        = {Threshold Single Password Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {977},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/977},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IslerK18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IslerKC18,
  author       = {Devri\c{s} \.{I}\c{s}ler and
                  Alptekin K{\"{u}}p{\c{c}}{\"{u}} and
                  Aykut Coskun},
  title        = {User Study on Single Password Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {975},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/975},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IslerKC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IsobeM18,
  author       = {Takanori Isobe and
                  Kazuhiko Minematsu},
  title        = {Breaking Message Integrity of an End-to-End Encryption Scheme of {LINE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {668},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/668},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IsobeM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ItoHMSI18,
  author       = {Gembu Ito and
                  Akinori Hosoyamada and
                  Ryutaroh Matsumoto and
                  Yu Sasaki and
                  Tetsu Iwata},
  title        = {Quantum Chosen-Ciphertext Attacks against Feistel Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1193},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1193},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ItoHMSI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Iwata18,
  author       = {Tetsu Iwata},
  title        = {Plaintext Recovery Attack of {OCB2}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1090},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1090},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Iwata18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IwataLLS18,
  author       = {Tetsu Iwata and
                  Virginie Lallemand and
                  Gregor Leander and
                  Yu Sasaki},
  title        = {Universal Forgery and Multiple Forgeries of MergeMAC and Generalized
                  Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {793},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/793},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IwataLLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JacquetM18,
  author       = {Philippe Jacquet and
                  Bernard Mans},
  title        = {Green Mining: toward a less energetic impact of cryptocurrencies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {197},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/197},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JacquetM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JaegerS18,
  author       = {Joseph Jaeger and
                  Igors Stepanovs},
  title        = {Optimal Channel Security Against Fine-Grained State Compromise: The
                  Safety of Messaging},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {553},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/553},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JaegerS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JagerKM18,
  author       = {Tibor Jager and
                  Saqib A. Kakvi and
                  Alexander May},
  title        = {On the Security of the PKCS{\#}1 v1.5 Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {855},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/855},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JagerKM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JagerKP18,
  author       = {Tibor Jager and
                  Rafael Kurek and
                  Jiaxin Pan},
  title        = {Simple and More Efficient PRFs with Tight Security from {LWE} and
                  Matrix-DDH},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {826},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/826},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JagerKP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JainS18,
  author       = {Aayush Jain and
                  Amit Sahai},
  title        = {How to leverage hardness of constant-degree expanding polynomials
                  over {\(\mathbb{R}\)} to build iO},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {973},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/973},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JainS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Jakobsson18,
  author       = {Markus Jakobsson},
  title        = {Secure Remote Attestation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {31},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/031},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Jakobsson18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JareckiKR18,
  author       = {Stanislaw Jarecki and
                  Hugo Krawczyk and
                  Jason K. Resch},
  title        = {Threshold Partially-Oblivious PRFs with Applications to Key Management},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {733},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/733},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JareckiKR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JareckiKSS18,
  author       = {Stanislaw Jarecki and
                  Hugo Krawczyk and
                  Maliheh Shirvanian and
                  Nitesh Saxena},
  title        = {Two-Factor Authentication with End-to-End Password Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {33},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/033},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JareckiKSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JareckiKX18,
  author       = {Stanislaw Jarecki and
                  Hugo Krawczyk and
                  Jiayu Xu},
  title        = {{OPAQUE:} An Asymmetric {PAKE} Protocol Secure Against Pre-Computation
                  Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {163},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/163},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JareckiKX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JareckiW18,
  author       = {Stanislaw Jarecki and
                  Boyang Wei},
  title        = {3PC {ORAM} with Low Latency, Low Bandwidth, and Fast Batch Retrieval},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {347},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/347},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JareckiW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JarvinenKSTY18,
  author       = {Kimmo J{\"{a}}rvinen and
                  {\'{A}}gnes Kiss and
                  Thomas Schneider and
                  Oleksandr Tkachenko and
                  Zheng Yang},
  title        = {Faster Privacy-Preserving Location Proximity Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {694},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/694},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JarvinenKSTY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JaschkeA18,
  author       = {Angela J{\"{a}}schke and
                  Frederik Armknecht},
  title        = {Unsupervised Machine Learning on Encrypted Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {411},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/411},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JaschkeA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JayasankaranSSH18,
  author       = {Nithyashankari Gummidipoondi Jayasankaran and
                  Adriana C. Sanabria{-}Borbon and
                  Edgar S{\'{a}}nchez{-}Sinencio and
                  Jiang Hu and
                  Jeyavijayan Rajendran},
  title        = {Towards Provably-Secure Analog and Mixed-Signal Locking Against Overproduction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1064},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1064},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JayasankaranSSH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JhaN18,
  author       = {Ashwin Jha and
                  Mridul Nandi},
  title        = {Applications of H-Technique: Revisiting Symmetric Key Security Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1130},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1130},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JhaN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JiLS18,
  author       = {Zhengfeng Ji and
                  Yi{-}Kai Liu and
                  Fang Song},
  title        = {Pseudorandom Quantum States},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {544},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/544},
  timestamp    = {Mon, 30 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/JiLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JiangKLS18,
  author       = {Xiaoqian Jiang and
                  Miran Kim and
                  Kristin E. Lauter and
                  Yongsoo Song},
  title        = {Secure Outsourced Matrix Computation and Application to Neural Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1041},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1041},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JiangKLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Jimenez18,
  author       = {Reynier Antonio de la Cruz Jim{\'{e}}nez},
  title        = {On some methods for constructing almost optimal S-Boxes and their
                  resilience against side-channel attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {618},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/618},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Jimenez18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JinDRZ18,
  author       = {Chenglu Jin and
                  Marten van Dijk and
                  Michael K. Reiter and
                  Haibin Zhang},
  title        = {PwoP: Intrusion-Tolerant and Privacy-Preserving Sensor Fusion},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1171},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1171},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JinDRZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JostBB18,
  author       = {Daniel Jost and
                  Christian Badertscher and
                  Fabio Banfi},
  title        = {A note on the equivalence of {IND-CCA} {\&} {INT-PTXT} and {IND-CCA}
                  {\&} {INT-CTXT}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {135},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/135},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JostBB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JostMM18,
  author       = {Daniel Jost and
                  Ueli Maurer and
                  Marta Mularczyk},
  title        = {Efficient Ratcheting: Almost-Optimal Guarantees for Secure Messaging},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {954},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/954},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JostMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JoyeM18,
  author       = {Marc Joye and
                  Yan Michalevsky},
  title        = {{RSA} Signatures Under Hardware Restrictions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {878},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/878},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JoyeM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JudmayerSSW18,
  author       = {Aljosha Judmayer and
                  Nicholas Stifter and
                  Philipp Schindler and
                  Edgar R. Weippl},
  title        = {Pitchforks in Cryptocurrencies: Enforcing rule changes through offensive
                  forking- and consensus techniques},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {836},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/836},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JudmayerSSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JungkPS18,
  author       = {Bernhard Jungk and
                  Richard Petri and
                  Marc St{\"{o}}ttinger},
  title        = {Efficient Side-Channel Protections of {ARX} Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {693},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/693},
  timestamp    = {Tue, 05 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JungkPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Jutla18,
  author       = {Charanjit S. Jutla},
  title        = {Authenticated Encryption Mode {IAPM} using SHA-3's Public Random Permutation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {128},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/128},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Jutla18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JutlaO018,
  author       = {Charanjit S. Jutla and
                  Miyako Ohkubo and
                  Arnab Roy},
  title        = {Improved (Almost) Tightly-Secure Structure-Preserving Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {42},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/042},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JutlaO018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JuvekarVC18,
  author       = {Chiraag Juvekar and
                  Vinod Vaikuntanathan and
                  Anantha P. Chandrakasan},
  title        = {{GAZELLE:} {A} Low Latency Framework for Secure Neural Network Inference},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {73},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/073},
  timestamp    = {Mon, 27 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JuvekarVC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ka18,
  author       = {Ahmad Khoureich Ka},
  title        = {{R-MAC} - {A} lightwheight authentication protocol for {RFID} Tags},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {214},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/214},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ka18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KaafaraniK18,
  author       = {Ali {El Kaafarani} and
                  Shuichi Katsumata},
  title        = {Attribute-based Signatures for Unbounded Circuits in the {ROM} and
                  Efficient Instantiations from Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {22},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/022},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KaafaraniK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KalaiK18,
  author       = {Yael Tauman Kalai and
                  Dakshita Khurana},
  title        = {Non-Interactive Non-Malleability from Quantum Supremacy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1118},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1118},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KalaiK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KalaiKS18,
  author       = {Yael Tauman Kalai and
                  Dakshita Khurana and
                  Amit Sahai},
  title        = {Statistical Witness Indistinguishability (and more) in Two Messages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {168},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/168},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KalaiKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KalaiPY18,
  author       = {Yael Kalai and
                  Omer Paneth and
                  Lisa Yang},
  title        = {On Publicly Verifiable Delegation From Standard Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {776},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/776},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KalaiPY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KamaraM18,
  author       = {Seny Kamara and
                  Tarik Moataz},
  title        = {Encrypted Multi-Maps with Computationally-Secure Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {978},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/978},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KamaraM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KamaraMO18,
  author       = {Seny Kamara and
                  Tarik Moataz and
                  Olga Ohrimenko},
  title        = {Structured Encryption and Leakage Suppression},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {551},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/551},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KamaraMO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KammadanamSH18,
  author       = {Vamshi Krishna Kammadanam and
                  Virendra R. Sule and
                  Yi Hong},
  title        = {A Public Key Exchange Cryptosystem Based on Ideal Secrecy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1133},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1133},
  timestamp    = {Fri, 01 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KammadanamSH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KampPEJ18,
  author       = {Tim van de Kamp and
                  Andreas Peter and
                  Maarten H. Everts and
                  Willem Jonker},
  title        = {Multi-client Predicate-only Encryption for Conjunctive Equality Tests},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {563},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/563},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KampPEJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KampanakisPDG18,
  author       = {Panos Kampanakis and
                  Peter Panburana and
                  Ellie Daw and
                  Daniel Van Geest},
  title        = {The Viability of Post-quantum {X.509} Certificates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {63},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/063},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KampanakisPDG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KandeleP18,
  author       = {Suyash Kandele and
                  Souradyuti Paul},
  title        = {Message-locked Encryption with File Update},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {422},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/422},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KandeleP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KandeleP18a,
  author       = {Suyash Kandele and
                  Souradyuti Paul},
  title        = {Key Assignment Scheme with Authenticated Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1233},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1233},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KandeleP18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KannwischerGBKB18,
  author       = {Matthias J. Kannwischer and
                  Aymeric Gen{\^{e}}t and
                  Denis Butin and
                  Juliane Kr{\"{a}}mer and
                  Johannes Buchmann},
  title        = {Differential Power Analysis of {XMSS} and {SPHINCS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {673},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/673},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KannwischerGBKB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KannwischerRS18,
  author       = {Matthias J. Kannwischer and
                  Joost Rijneveld and
                  Peter Schwabe},
  title        = {Faster multiplication in {\(\mathbb{Z}\)}\({}_{\mbox{2\({}^{\mbox{m}}\)}}\)[x]
                  on Cortex-M4 to speed up {NIST} {PQC} candidates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1018},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1018},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KannwischerRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KarmakarMRV18,
  author       = {Angshuman Karmakar and
                  Jose Maria Bermudo Mera and
                  Sujoy Sinha Roy and
                  Ingrid Verbauwhede},
  title        = {Saber on {ARM} CCA-secure module lattice-based key encapsulation on
                  {ARM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {682},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/682},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KarmakarMRV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KarpmanR18,
  author       = {Pierre Karpman and
                  Daniel S. Roche},
  title        = {New Instantiations of the {CRYPTO} 2017 Masking Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {492},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/492},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KarpmanR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KassemCBKCH18,
  author       = {Nada El Kassem and
                  Liqun Chen and
                  Rachid El Bansarkhani and
                  Ali {El Kaafarani} and
                  Jan Camenisch and
                  Patrick Hough},
  title        = {{L-DAA:} Lattice-Based Direct Anonymous Attestation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {401},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/401},
  timestamp    = {Sat, 28 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KassemCBKCH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KatsumataMT18,
  author       = {Shuichi Katsumata and
                  Takahiro Matsuda and
                  Atsushi Takayasu},
  title        = {Lattice-based Revocable (Hierarchical) {IBE} with Decryption Key Exposure
                  Resistance},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {420},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/420},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KatsumataMT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KatsumataY18,
  author       = {Shuichi Katsumata and
                  Shota Yamada},
  title        = {Note on Constructing Constrained PRFs from OWFs with Constant Collusion
                  Resistance},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {914},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/914},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KatsumataY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KatsumataYY18,
  author       = {Shuichi Katsumata and
                  Shota Yamada and
                  Takashi Yamakawa},
  title        = {Tighter Security Proofs for {GPV-IBE} in the Quantum Random Oracle
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {451},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/451},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KatsumataYY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KatzKW18,
  author       = {Jonathan Katz and
                  Vladimir Kolesnikov and
                  Xiao Wang},
  title        = {Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum
                  Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {475},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/475},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KatzKW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KatzRRW18,
  author       = {Jonathan Katz and
                  Samuel Ranellucci and
                  Mike Rosulek and
                  Xiao Wang},
  title        = {Optimizing Authenticated Garbling for Faster Secure Two-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {578},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/578},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KatzRRW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KerberKKZ18,
  author       = {Thomas Kerber and
                  Markulf Kohlweiss and
                  Aggelos Kiayias and
                  Vassilis Zikas},
  title        = {Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1132},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1132},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KerberKKZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhairallahCMM18,
  author       = {Mustafa Khairallah and
                  Anupam Chattopadhyay and
                  Bimal Mandal and
                  Subhamoy Maitra},
  title        = {On Hardware Implementation of Tang-Maitra Boolean Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {667},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/667},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KhairallahCMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhalidHRRO18,
  author       = {Ayesha Khalid and
                  James Howe and
                  Ciara Rafferty and
                  Francesco Regazzoni and
                  M{\'{a}}ire O'Neill},
  title        = {Compact, Scalable, and Efficient Discrete Gaussian Samplers for Lattice-Based
                  Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {265},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/265},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KhalidHRRO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhalilG18,
  author       = {Rami Khalil and
                  Arthur Gervais},
  title        = {{NOCUST} - {A} Non-Custodial 2nd-Layer Financial Intermediary},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {642},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/642},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KhalilG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhanDM18,
  author       = {Haibat Khan and
                  Benjamin Dowling and
                  Keith M. Martin},
  title        = {Identity Confidentiality in 5G Mobile Telephony Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {876},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/876},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KhanDM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Khazaei18,
  author       = {Shahram Khazaei},
  title        = {Conjecturally Superpolynomial Lower Bound for Share Size},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {143},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/143},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Khazaei18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhuranaOS18,
  author       = {Dakshita Khurana and
                  Rafail Ostrovsky and
                  Akshayaram Srinivasan},
  title        = {Round Optimal Black-Box {\textquotedblleft}Commit-and-Prove{\textquotedblright}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {921},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/921},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KhuranaOS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasKLSZ18,
  author       = {Aggelos Kiayias and
                  Annabell Kuldmaa and
                  Helger Lipmaa and
                  Janno Siim and
                  Thomas Zacharias},
  title        = {On the Security Properties of e-Voting Bulletin Boards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {567},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/567},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasKLSZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasLT18,
  author       = {Aggelos Kiayias and
                  Feng{-}Hao Liu and
                  Yiannis Tselekounis},
  title        = {Non-Malleable Codes for Partial Functions with Manipulation Detection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {538},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/538},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasLT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasORT18,
  author       = {Aggelos Kiayias and
                  Murat Osmanoglu and
                  Alexander Russell and
                  Qiang Tang},
  title        = {Space Efficient Computational Multi-Secret Sharing and Its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1010},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1010},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasORT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasR18,
  author       = {Aggelos Kiayias and
                  Alexander Russell},
  title        = {Ouroboros-BFT: {A} Simple Byzantine Fault Tolerant Consensus Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1049},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1049},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasZ18,
  author       = {Aggelos Kiayias and
                  Dionysis Zindros},
  title        = {Proof-of-Work Sidechains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1048},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1048},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KikuchiIMHC18,
  author       = {Ryo Kikuchi and
                  Dai Ikarashi and
                  Takahiro Matsuda and
                  Koki Hamada and
                  Koji Chida},
  title        = {Efficient Bit-Decomposition and Modulus-Conversion Protocols with
                  an Honest Majority},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {387},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/387},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KikuchiIMHC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KilincV18,
  author       = {Handan Kilin{\c{c}} and
                  Serge Vaudenay},
  title        = {Formal Analysis of Distance Bounding with Secure Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {440},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/440},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KilincV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimJH18,
  author       = {Panjin Kim and
                  Kyung Chul Jeong and
                  Daewan Han},
  title        = {Time-Space Complexity of Quantum Search Algorithms in Symmetric Cryptanalysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {452},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/452},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimJH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimLKOHJO18,
  author       = {Jihye Kim and
                  Jiwon Lee and
                  Hankyung Ko and
                  Donghwan Oh and
                  Semin Han and
                  Kwonho Jeong and
                  Hyunok Oh},
  title        = {AuthCropper: Authenticated Image Cropper for Privacy Preserving Surveillance
                  Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1202},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1202},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimLKOHJO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimLP18,
  author       = {Eunkyung Kim and
                  Hyang{-}Sook Lee and
                  Jeongeun Park},
  title        = {Towards Round-Optimal Secure Multiparty Computations: Multikey {FHE}
                  without a {CRS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1156},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1156},
  timestamp    = {Tue, 26 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimLP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimPHBH18,
  author       = {Jaehun Kim and
                  Stjepan Picek and
                  Annelie Heuser and
                  Shivam Bhasin and
                  Alan Hanjalic},
  title        = {Make Some Noise: Unleashing the Power of Convolutional Neural Networks
                  for Profiled Side-channel Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1023},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1023},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimPHBH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimS0XJ18,
  author       = {Miran Kim and
                  Yongsoo Song and
                  Shuang Wang and
                  Yuhou Xia and
                  Xiaoqian Jiang},
  title        = {Secure Logistic Regression based on Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {74},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/074},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimS0XJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimS18,
  author       = {Duhyeong Kim and
                  Yongsoo Song},
  title        = {Approximate Homomorphic Encryption over the Conjugate-invariant Ring},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {952},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/952},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimSKLC18,
  author       = {Andrey Kim and
                  Yongsoo Song and
                  Miran Kim and
                  Keewoo Lee and
                  Jung Hee Cheon},
  title        = {Logistic Regression Model Training based on the Approximate Homomorphic
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {254},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/254},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimSKLC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimW18,
  author       = {Sam Kim and
                  David J. Wu},
  title        = {Multi-Theorem Preprocessing NIZKs from Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {272},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/272},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimW18a,
  author       = {Sam Kim and
                  David J. Wu},
  title        = {Watermarking PRFs from Lattices: Stronger Security via Extractable
                  PRFs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {986},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/986},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimW18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimYKPH18,
  author       = {Suhri Kim and
                  Kisoon Yoon and
                  Jihoon Kwon and
                  Young{-}Ho Park and
                  Seokhie Hong},
  title        = {New Hybrid Method for Isogeny-based Cryptosystems using Edwards Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1215},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1215},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimYKPH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KirianskyLADE18,
  author       = {Vladimir Kiriansky and
                  Ilia A. Lebedev and
                  Saman P. Amarasinghe and
                  Srinivas Devadas and
                  Joel S. Emer},
  title        = {{DAWG:} {A} Defense Against Cache Timing Attacks in Speculative Execution
                  Processors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {418},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/418},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KirianskyLADE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kiryukhin18,
  author       = {Vitaly Kiryukhin},
  title        = {Exact maximum expected differential and linear probability for 2-round
                  Kuznyechik},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1085},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1085},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kiryukhin18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KishoreKVS18,
  author       = {Ravi Kishore and
                  Ashutosh Kumar and
                  Chiranjeevi Vanarasa and
                  Kannan Srinathan},
  title        = {On the Price of Proactivizing Round-Optimal Perfectly Secret Message
                  Transmission},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1167},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1167},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KishoreKVS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KissNLAS18,
  author       = {{\'{A}}gnes Kiss and
                  Masoud Naderpour and
                  Jian Liu and
                  N. Asokan and
                  Thomas Schneider},
  title        = {SoK: Modular and Efficient Private Decision Tree Evaluation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1099},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1099},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KissNLAS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KitagawaNTY18,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki and
                  Keisuke Tanaka and
                  Takashi Yamakawa},
  title        = {Adaptively Secure and Succinct Functional Encryption: Improving Security
                  and Efficiency, Simultaneously},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {974},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/974},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KitagawaNTY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KitagawaT18,
  author       = {Fuyuki Kitagawa and
                  Keisuke Tanaka},
  title        = {A Framework for Achieving {KDM-CCA} Secure Public-Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {845},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/845},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KitagawaT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kiyoshima18,
  author       = {Susumu Kiyoshima},
  title        = {No-signaling Linear PCPs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {649},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/649},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kiyoshima18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Klein18,
  author       = {Dominik Klein},
  title        = {Key-Secrecy of {PACE} with OTS/CafeOBJ},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {510},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/510},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Klein18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KleinjungW18,
  author       = {Thorsten Kleinjung and
                  Benjamin Wesolowski},
  title        = {A new perspective on the powers of two descent for discrete logarithms
                  in finite fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {647},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/647},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KleinjungW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KluczniakA18,
  author       = {Kamil Kluczniak and
                  Man Ho Au},
  title        = {Fine-Tuning Decentralized Anonymous Payment Systems based on Arguments
                  for Arithmetic Circuit Satisfiability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {176},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/176},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KluczniakA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kobeissi18,
  author       = {Nadim Kobeissi},
  title        = {Capsule: {A} Protocol for Secure Collaborative Document Editing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {253},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/253},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kobeissi18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kobeissi18a,
  author       = {Nadim Kobeissi},
  title        = {An Analysis of the ProtonMail Cryptographic Architecture},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1121},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1121},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kobeissi18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KobeissiB18,
  author       = {Nadim Kobeissi and
                  Karthikeyan Bhargavan},
  title        = {Noise Explorer: Fully Automated Modeling and Verification for Arbitrary
                  Noise Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {766},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/766},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KobeissiB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KobeissiK18,
  author       = {Nadim Kobeissi and
                  Natalia Kulatova},
  title        = {Ledger Design Language: Towards Formal Reasoning and Implementation
                  for Public Ledgers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {416},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/416},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KobeissiK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Koch18,
  author       = {Alexander Koch},
  title        = {The Landscape of Optimal Card-based Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {951},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/951},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Koch18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KochW18,
  author       = {Alexander Koch and
                  Stefan Walzer},
  title        = {Private Function Evaluation with Cards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1113},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1113},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KochW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kokoris-KogiasA18,
  author       = {Eleftherios Kokoris{-}Kogias and
                  Enis Ceyhun Alp and
                  Sandra Deepthy Siby and
                  Nicolas Gailly and
                  Philipp Jovanovic and
                  Linus Gasser and
                  Bryan Ford},
  title        = {Hidden in Plain Sight: Storing and Managing Secrets on a Public Ledger},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {209},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/209},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kokoris-KogiasA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kolesnikov18,
  author       = {Vladimir Kolesnikov},
  title        = {Free {IF:} How to Omit Inactive Branches and Implement S-Universal
                  Garbled Circuit (Almost) for Free},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {789},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/789},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kolesnikov18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KomanoSM18,
  author       = {Yuichi Komano and
                  Hideo Shimizu and
                  Hideyuki Miyake},
  title        = {Integrative Acceleration of First-Order Boolean Masking for Embedded
                  IoT Devices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {934},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/934},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KomanoSM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KomargodskiY18,
  author       = {Ilan Komargodski and
                  Eylon Yogev},
  title        = {Another Step Towards Realizing Random Oracles: Non-Malleable Point
                  Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {149},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/149},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KomargodskiY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KomargodskiY18a,
  author       = {Ilan Komargodski and
                  Eylon Yogev},
  title        = {On Distributional Collision Resistant Hashing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {480},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/480},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KomargodskiY18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoppKBP18,
  author       = {Henning Kopp and
                  Frank Kargl and
                  Christoph B{\"{o}}sch and
                  Andreas Peter},
  title        = {uMine: a Blockchain based on Human Miners},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {722},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/722},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoppKBP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoppermannPHS18,
  author       = {Philipp Koppermann and
                  Eduard Pop and
                  Johann Heyszl and
                  Georg Sigl},
  title        = {18 Seconds to Key Exchange: Limitations of Supersingular Isogeny Diffie-Hellman
                  on Embedded Devices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {932},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/932},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoppermannPHS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoppulaW18,
  author       = {Venkata Koppula and
                  Brent Waters},
  title        = {Realizing Chosen Ciphertext Security Generically in Attribute-Based
                  Encryption and Predicate Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {847},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/847},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoppulaW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KornaropoulosPT18,
  author       = {Evgenios M. Kornaropoulos and
                  Charalampos Papamanthou and
                  Roberto Tamassia},
  title        = {Data Recovery on Encrypted Databases With k-Nearest Neighbor Query
                  Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {719},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/719},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KornaropoulosPT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KotovMMPU18,
  author       = {Matvei Kotov and
                  Anton Menshov and
                  Alex D. Myasnikov and
                  Dmitry Panteleev and
                  Alexander Ushakov},
  title        = {Conjugacy Separation Problem in Braids: an Attack on the Original
                  Colored Burau Key Agreement Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {491},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/491},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KotovMMPU18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KotovMU18,
  author       = {Matvei Kotov and
                  Anton Menshov and
                  Alexander Ushakov},
  title        = {{AN} {ATTACK} {ON} {THE} {WALNUT} {DIGITAL} {SIGNATURE} {ALGORITHM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {393},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/393},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KotovMU18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KotovMU18a,
  author       = {Matvei Kotov and
                  Anton Menshov and
                  Alexander Ushakov},
  title        = {Attack on Kayawood Protocol: Uncloaking Private Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {604},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/604},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KotovMU18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KounavisDDPD18,
  author       = {Michael E. Kounavis and
                  David Durham and
                  Sergej Deutsch and
                  Antonios Papadimitriou and
                  Amitabh Das},
  title        = {Cryptographic Constructions Supporting Implicit Data Integrity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {534},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/534},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KounavisDDPD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KovalenkoK18,
  author       = {Bohdan Kovalenko and
                  Anton Kudin},
  title        = {Kleptography trapdoor free cryptographic protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {989},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/989},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KovalenkoK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KowalczykLMM18,
  author       = {Lucas Kowalczyk and
                  Jiahui Liu and
                  Tal Malkin and
                  Kailash Meiyappan},
  title        = {Mitigating the One-Use Restriction in Attribute-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {645},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/645},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KowalczykLMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KraitsbergLOSA18,
  author       = {Michael Kraitsberg and
                  Yehuda Lindell and
                  Valery Osheter and
                  Nigel P. Smart and
                  Younes Talibi Alaoui},
  title        = {Adding Distributed Decryption and Key Generation to a Ring-LWE Based
                  {CCA} Encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1034},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1034},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KraitsbergLOSA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KrennPSS18,
  author       = {Stephan Krenn and
                  Henrich C. P{\"{o}}hls and
                  Kai Samelin and
                  Daniel Slamanig},
  title        = {Protean Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {970},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/970},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KrennPSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KrennPSS18a,
  author       = {Stephan Krenn and
                  Henrich C. P{\"{o}}hls and
                  Kai Samelin and
                  Daniel Slamanig},
  title        = {Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {971},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/971},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KrennPSS18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KrennSS18,
  author       = {Stephan Krenn and
                  Kai Samelin and
                  Dieter Sommer},
  title        = {Stronger Security for Sanitizable Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {858},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/858},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KrennSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KubilayKM18,
  author       = {Murat Yasin Kubilay and
                  Mehmet Sabir Kiraz and
                  Haci Ali Mantar},
  title        = {CertLedger: {A} New {PKI} Model with Certificate Transparency Based
                  on Blockchain},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1071},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1071},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KubilayKM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KulykV18,
  author       = {Oksana Kulyk and
                  Melanie Volkamer},
  title        = {Usability is not Enough: Lessons Learned from 'Human Factors in Security'
                  Research for Verifiability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {683},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/683},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KulykV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KumarLLAPBWZ18,
  author       = {Vireshwar Kumar and
                  He Li and
                  Noah Luther and
                  Pranav Asokan and
                  Jung{-}Min "Jerry" Park and
                  Kaigui Bian and
                  Martin B. H. Weiss and
                  Taieb Znati},
  title        = {Direct Anonymous Attestation with Efficient Verifier-Local Revocation
                  for Subscription System},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {290},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/290},
  timestamp    = {Sat, 26 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KumarLLAPBWZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KumarMS18,
  author       = {Ashutosh Kumar and
                  Raghu Meka and
                  Amit Sahai},
  title        = {Leakage-Resilient Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1138},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1138},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KumarMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KumarMS18a,
  author       = {Rajendra Kumar and
                  Nikhil Mittal and
                  Shashank Singh},
  title        = {Cryptanalysis of 2-round {KECCAK-384}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1191},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1191},
  timestamp    = {Fri, 28 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KumarMS18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KumawatP18,
  author       = {Sudhakar Kumawat and
                  Souradyuti Paul},
  title        = {A New Constant-size Accountable Ring Signature Scheme Without Random
                  Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {242},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/242},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KumawatP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KunnemannG018,
  author       = {Robert K{\"{u}}nnemann and
                  Deepak Garg and
                  Michael Backes},
  title        = {Accountability in Security Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {127},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/127},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KunnemannG018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KutylowskiHK18,
  author       = {Miroslaw Kutylowski and
                  Lucjan Hanzlik and
                  Kamil Kluczniak},
  title        = {Towards Practical Security of Pseudonymous Signature on the {BSI}
                  eIDAS Token},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1148},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1148},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KutylowskiHK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaVigneZMMMT18,
  author       = {Rio LaVigne and
                  Chen{-}Da Liu Zhang and
                  Ueli Maurer and
                  Tal Moran and
                  Marta Mularczyk and
                  Daniel Tschudi},
  title        = {Topology-Hiding Computation Beyond Semi-Honest Adversaries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {255},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/255},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LaVigneZMMMT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaanPRRSV18,
  author       = {Ebo van der Laan and
                  Erik Poll and
                  Joost Rijneveld and
                  Joeri de Ruiter and
                  Peter Schwabe and
                  Jan Verschuren},
  title        = {Is Java Card ready for hash-based signatures?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {611},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/611},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LaanPRRSV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaarhovenM18,
  author       = {Thijs Laarhoven and
                  Artur Mariano},
  title        = {Progressive lattice sieving},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {79},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/079},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LaarhovenM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaiM18,
  author       = {Russell W. F. Lai and
                  Giulio Malavolta},
  title        = {Optimal Succinct Arguments via Hidden Order Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {705},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/705},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LaiM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaiMS18,
  author       = {Russell W. F. Lai and
                  Giulio Malavolta and
                  Dominique Schr{\"{o}}der},
  title        = {Homomorphic Secret Sharing for Low Degree Polynomials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1065},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1065},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LaiMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaiPSLMSSLZ18,
  author       = {Shangqi Lai and
                  Sikhar Patranabis and
                  Amin Sakzad and
                  Joseph K. Liu and
                  Debdeep Mukhopadhyay and
                  Ron Steinfeld and
                  Shifeng Sun and
                  Dongxi Liu and
                  Cong Zuo},
  title        = {Result Pattern Hiding Searchable Encryption for Conjunctive Queries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1168},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1168},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LaiPSLMSSLZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LapidW18,
  author       = {Ben Lapid and
                  Avishai Wool},
  title        = {Cache-Attacks on the {ARM} TrustZone implementations of {AES-256}
                  and {AES-256-GCM} via GPU-based analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {621},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/621},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LapidW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lara-NinoDM18,
  author       = {Carlos Andres Lara{-}Nino and
                  Arturo Diaz{-}Perez and
                  Miguel Morales{-}Sandoval},
  title        = {FPGA-based Assessment of Midori and {GIFT} Lightweight Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {979},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/979},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lara-NinoDM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LarsenN18,
  author       = {Kasper Green Larsen and
                  Jesper Buus Nielsen},
  title        = {Yes, There is an Oblivious {RAM} Lower Bound!},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {423},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/423},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LarsenN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeGrowJA18,
  author       = {Jason T. LeGrow and
                  David Jao and
                  Reza Azarderakhsh},
  title        = {Modeling Quantum-Safe Authenticated Key Establishment, and an Isogeny-Based
                  Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {282},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/282},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeGrowJA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeKK18,
  author       = {Duc Viet Le and
                  Mahimna Kelkar and
                  Aniket Kate},
  title        = {Flexible Signatures: Towards Making Authentication Suitable for Real-Time
                  Environments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {343},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/343},
  timestamp    = {Mon, 29 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LeKK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LebedevHD18,
  author       = {Ilia A. Lebedev and
                  Kyle Hogan and
                  Srinivas Devadas},
  title        = {Secure Boot and Remote Attestation in the Sanctum Processor},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {427},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/427},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LebedevHD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeJK18,
  author       = {Seungkwang Lee and
                  Nam{-}Su Jho and
                  Myungchul Kim},
  title        = {A Key Leakage Preventive White-box Cryptographic Implementation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1047},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1047},
  timestamp    = {Mon, 05 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeJK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeK18,
  author       = {Suhyeon Lee and
                  Seungjoo Kim},
  title        = {Countering Block Withholding Attack Effciently},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1211},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1211},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeK18a,
  author       = {Suhyeon Lee and
                  Seungjoo Kim},
  title        = {Pooled Mining Makes Selfish Mining Tricky},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1230},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1230},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeK18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeKK18,
  author       = {Jung{-}Keun Lee and
                  Bonwook Koo and
                  Woo{-}Hwan Kim},
  title        = {Related-Key Linear Cryptanalysis on {SIMON}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {152},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/152},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeKK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeKKSSC18,
  author       = {Joohee Lee and
                  Dongwoo Kim and
                  Duhyeong Kim and
                  Yongsoo Song and
                  Junbum Shin and
                  Jung Hee Cheon},
  title        = {Instant Privacy-Preserving Biometric Authentication for Hamming Distance},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1214},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1214},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeKKSSC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeL18,
  author       = {ByeongHak Lee and
                  Jooyoung Lee},
  title        = {Tweakable Block Ciphers Secure Beyond the Birthday Bound in the Ideal
                  Cipher Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {784},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/784},
  timestamp    = {Tue, 19 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeWZ18,
  author       = {Hyung Tae Lee and
                  Huaxiong Wang and
                  Kai Zhang},
  title        = {Security Analysis and Modification of ID-Based Encryption with Equality
                  Test from {ACISP} 2017},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {369},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/369},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeWZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeermakersS18,
  author       = {Daan Leermakers and
                  Boris Skoric},
  title        = {Security proof for Quantum Key Recycling with noise},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {264},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/264},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeermakersS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LehmannT18,
  author       = {Anja Lehmann and
                  Bj{\"{o}}rn Tackmann},
  title        = {Updatable Encryption with Post-Compromise Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {118},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/118},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LehmannT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeontiadisV18,
  author       = {Iraklis Leontiadis and
                  Serge Vaudenay},
  title        = {Private Message Franking with After Opening Privacy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {938},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/938},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeontiadisV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LermanPVM18,
  author       = {Liran Lerman and
                  Stjepan Picek and
                  Nikita Veshchikov and
                  Olivier Markowitch},
  title        = {Higher Order Side-Channel Attacks Resilient S-boxes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {6},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/006},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LermanPVM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeungSGZ18,
  author       = {Derek Leung and
                  Adam Suhl and
                  Yossi Gilad and
                  Nickolai Zeldovich},
  title        = {Vault: Fast Bootstrapping for Cryptocurrencies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {269},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/269},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeungSGZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeurentNS18,
  author       = {Ga{\"{e}}tan Leurent and
                  Mridul Nandi and
                  Ferdinand Sibleyras},
  title        = {Generic Attacks against Beyond-Birthday-Bound MACs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {541},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/541},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeurentNS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeurentS18,
  author       = {Ga{\"{e}}tan Leurent and
                  Ferdinand Sibleyras},
  title        = {The Missing Difference Problem, and its Applications to Counter Mode
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {159},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/159},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeurentS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LewiRWLXY18,
  author       = {Kevin Lewi and
                  Callen Rain and
                  Stephen A. Weis and
                  Yueting Lee and
                  Haozhi Xiong and
                  Benjamin Yang},
  title        = {Scaling Backend Authentication at Facebook},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {413},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/413},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LewiRWLXY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Li18,
  author       = {Xin Li},
  title        = {Non-Malleable Extractors and Non-Malleable Codes: Partially Optimal
                  Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {353},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/353},
  timestamp    = {Tue, 06 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Li18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiLNC18,
  author       = {Fenghua Li and
                  Hui Li and
                  Ben Niu and
                  Jinjun Chen},
  title        = {Privacy Computing: Concept, Computing Framework And Future Development
                  Trends},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1145},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1145},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiLNC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiLPX18,
  author       = {Haoyu Li and
                  Renzhang Liu and
                  Yanbin Pan and
                  Tianyuan Xie},
  title        = {Cryptanalysis of Compact-LWE Submitted to {NIST} {PQC} Project},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {20},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/020},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiLPX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiM18,
  author       = {Baiyu Li and
                  Daniele Micciancio},
  title        = {Symbolic security of garbled circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {141},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/141},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiXY18,
  author       = {Zhe Li and
                  Chaoping Xing and
                  Sze Ling Yeo},
  title        = {Reducing the Key Size of McEliece Cryptosystem from Goppa Codes via
                  Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1029},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1029},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiXY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiYAKV18,
  author       = {Songze Li and
                  Mingchao Yu and
                  Amir Salman Avestimehr and
                  Sreeram Kannan and
                  Pramod Viswanath},
  title        = {PolyShard: Coded Sharding Achieves Linearly Scaling Efficiency and
                  Security Simultaneously},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {925},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/925},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiYAKV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiZGQ18,
  author       = {Yin Li and
                  Yu Zhang and
                  Xiaoli Guo and
                  Chuanda Qi},
  title        = {N-term Karatsuba Algorithm and its Application to Multiplier designs
                  for Special Trinomials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {605},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/605},
  timestamp    = {Thu, 15 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiZGQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiZYHLL18,
  author       = {Ningbo Li and
                  Tanping Zhou and
                  Xiaoyuan Yang and
                  Yiliang Han and
                  Longfei Liu and
                  Wenchao Liu},
  title        = {Two round multiparty computation via Multi-key fully homomorphic encryption
                  with faster homomorphic evaluations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1249},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1249},
  timestamp    = {Fri, 15 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LiZYHLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Liang18,
  author       = {Min Liang},
  title        = {Teleportation-based quantum homomorphic encryption scheme with quasi-compactness
                  and perfect security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1209},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1209},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Liang18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertLNW18,
  author       = {Beno{\^{\i}}t Libert and
                  San Ling and
                  Khoa Nguyen and
                  Huaxiong Wang},
  title        = {Lattice-Based Zero-Knowledge Arguments for Integer Relations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {716},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/716},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertLNW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertST18,
  author       = {Beno{\^{\i}}t Libert and
                  Damien Stehl{\'{e}} and
                  Radu Titiu},
  title        = {Adaptively Secure Distributed PRFs from {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {927},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/927},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertST18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinCGSW18,
  author       = {Fuchun Lin and
                  Mahdi Cheraghchi and
                  Venkatesan Guruswami and
                  Reihaneh Safavi{-}Naini and
                  Huaxiong Wang},
  title        = {Secret Sharing with Binary Shares},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {746},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/746},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinCGSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinM18,
  author       = {Huijia Lin and
                  Christian Matt},
  title        = {Pseudo Flawed-Smudging Generators and Their Application to Indistinguishability
                  Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {646},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/646},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinSX18,
  author       = {Wei{-}Kai Lin and
                  Elaine Shi and
                  Tiancheng Xie},
  title        = {Can We Overcome the n log n Barrier for Oblivious Sorting?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {227},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/227},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinSX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LindellNR18,
  author       = {Yehuda Lindell and
                  Ariel Nof and
                  Samuel Ranellucci},
  title        = {Fast Secure Multiparty {ECDSA} with Practical Distributed Key Generation
                  and Applications to Cryptocurrency Custody},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {987},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/987},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LindellNR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LingNWX18,
  author       = {San Ling and
                  Khoa Nguyen and
                  Huaxiong Wang and
                  Yanhong Xu},
  title        = {Constant-size Group Signatures from Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {34},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/034},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LingNWX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LingNWX18a,
  author       = {San Ling and
                  Khoa Nguyen and
                  Huaxiong Wang and
                  Yanhong Xu},
  title        = {Accountable Tracing Signatures from Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1251},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1251},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LingNWX18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Liu18,
  author       = {Fukang Liu},
  title        = {Efficient Collision Attack Frameworks for {RIPEMD-160}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {652},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/652},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Liu18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Liu18a,
  author       = {Fukang Liu},
  title        = {Finding Ordinary Cube Variables for Keccak-MAC with Greedy Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {799},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/799},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Liu18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuV18,
  author       = {Tianren Liu and
                  Vinod Vaikuntanathan},
  title        = {Breaking the Circuit-Size Barrier in Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {333},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/333},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuW18,
  author       = {Zhen Liu and
                  Duncan S. Wong},
  title        = {On Enabling Attribute-Based Encryption to Be Traceable against Traitors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {963},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/963},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuY0L18,
  author       = {Joseph K. Liu and
                  Tsz Hon Yuen and
                  Peng Zhang and
                  Kaitai Liang},
  title        = {Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption
                  with Short Revocation List},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {330},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/330},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuY0L18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuYWL18,
  author       = {Meicheng Liu and
                  Jingchun Yang and
                  Wenhao Wang and
                  Dongdai Lin},
  title        = {Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {158},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/158},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuYWL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuYWNW18,
  author       = {Zhen Liu and
                  Guomin Yang and
                  Duncan S. Wong and
                  Khoa Nguyen and
                  Huaxiong Wang},
  title        = {Key-Insulated and Privacy-Preserving Signature Scheme with Publicly
                  Derived Public Key},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {956},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/956},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuYWNW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuZ18,
  author       = {Qipeng Liu and
                  Mark Zhandry},
  title        = {On Finding Quantum Multi-collisions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1096},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1096},
  timestamp    = {Fri, 30 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LochbihlerS18,
  author       = {Andreas Lochbihler and
                  S. Reza Sefidgar},
  title        = {A tutorial introduction to CryptHOL},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {941},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/941},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LochbihlerS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lochter18,
  author       = {Manfred Lochter},
  title        = {Blockchain as cryptanalytic tool},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {893},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/893},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lochter18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LohrkeTKBS18,
  author       = {Heiko Lohrke and
                  Shahin Tajik and
                  Thilo Krachenfels and
                  Christian Boit and
                  Jean{-}Pierre Seifert},
  title        = {Key Extraction using Thermal Laser Stimulation: {A} Case Study on
                  Xilinx Ultrascale FPGAs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {717},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/717},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LohrkeTKBS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Longa18,
  author       = {Patrick Longa},
  title        = {A Note on Post-Quantum Authenticated Key Exchange from Supersingular
                  Isogenies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {267},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/267},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Longa18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LossM18,
  author       = {Julian Loss and
                  Tal Moran},
  title        = {Combining Asynchronous and Synchronous Byzantine Agreement: The Best
                  of Both Worlds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {235},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/235},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LossM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuAZ18,
  author       = {Xingye Lu and
                  Man Ho Au and
                  Zhenfei Zhang},
  title        = {Raptor: {A} Practical Lattice-Based (Linkable) Ring Signature},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {857},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/857},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuAZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuLZJXHL18,
  author       = {Xianhui Lu and
                  Yamin Liu and
                  Zhenfei Zhang and
                  Dingding Jia and
                  Haiyang Xue and
                  Jingnan He and
                  Bao Li},
  title        = {{LAC:} Practical Ring-LWE Based Public-Key Encryption with Byte-Level
                  Modulus},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1009},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1009},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuLZJXHL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuykxP18,
  author       = {Atul Luykx and
                  Bart Preneel},
  title        = {Optimal Forgeries Against Polynomial-Based MACs and {GCM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {166},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/166},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuykxP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LyuLHG18,
  author       = {Lin Lyu and
                  Shengli Liu and
                  Shuai Han and
                  Dawu Gu},
  title        = {Tightly {SIM-SO-CCA} Secure Public Key Encryption from Standard Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {30},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/030},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LyuLHG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MadalaJC18,
  author       = {D. S. V. Madala and
                  Mahabir Prasad Jhanwar and
                  Anupam Chattopadhyay},
  title        = {Certificate Transparency Using Blockchain},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1232},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1232},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/MadalaJC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaghrebiP18,
  author       = {Houssem Maghrebi and
                  Emmanuel Prouff},
  title        = {On the Use of Independent Component Analysis to Denoise Side-Channel
                  Measurements},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {177},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/177},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaghrebiP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MahalanobisM18,
  author       = {Ayan Mahalanobis and
                  Vivek Mallick},
  title        = {A Las Vegas algorithm to solve the elliptic curve discrete logarithm
                  problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {134},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/134},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MahalanobisM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MahdionSHM18,
  author       = {Parinaz Mahdion and
                  Hadi Soleimany and
                  Pouya Habibi and
                  Farokhlagha Moazami},
  title        = {New Single-Trace Side-Channel Attacks on a Specific Class of Elgamal
                  Cryptosystem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {761},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/761},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MahdionSHM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MahloujifarMM18,
  author       = {Saeed Mahloujifar and
                  Mohammad Mahmoody and
                  Ameer Mohammed},
  title        = {Multi-party Poisoning through Generalized p-Tampering},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {854},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/854},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MahloujifarMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MahriSBDW18,
  author       = {Hassan Qahur Al Mahri and
                  Leonie Simpson and
                  Harry Bartlett and
                  Ed Dawson and
                  Kenneth Koon{-}Ho Wong},
  title        = {Tweaking Generic {OTR} to Avoid Forgery Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {66},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/066},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MahriSBDW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaimutT18,
  author       = {Diana Maimut and
                  George Teseleanu},
  title        = {New Configurations of Grain Ciphers: Security Against Slide Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {692},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/692},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaimutT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaimutT18a,
  author       = {Diana Maimut and
                  George Teseleanu},
  title        = {A Unified Security Perspective on Legally Fair Contract Signing Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1027},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1027},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaimutT18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaininiH18,
  author       = {Pascal Mainini and
                  Rolf Haenni},
  title        = {Outsourcing Modular Exponentiation in Cryptographic Web Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {300},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/300},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaininiH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MalacariaKPPL18,
  author       = {Pasquale Malacaria and
                  M. H. R. Khouzani and
                  Corina S. Pasareanu and
                  Quoc{-}Sang Phan and
                  Kasper S{\o}e Luckow},
  title        = {Symbolic Side-Channel Analysis for Probabilistic Programs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {329},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/329},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MalacariaKPPL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MalavoltaMSKM18,
  author       = {Giulio Malavolta and
                  Pedro Moreno{-}Sanchez and
                  Clara Schneidewind and
                  Aniket Kate and
                  Matteo Maffei},
  title        = {Multi-Hop Locks for Secure, Privacy-Preserving and Interoperable Payment-Channel
                  Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {472},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/472},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MalavoltaMSKM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MandalD18,
  author       = {Mriganka Mandal and
                  Ratna Dutta},
  title        = {Cost-Effective Private Linear Key Agreement With Adaptive {CCA} Security
                  from Prime Order Multilinear Maps and Tracing Traitors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {508},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/508},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MandalD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MandalMMR18,
  author       = {Avradip Mandal and
                  John C. Mitchell and
                  Hart Montgomery and
                  Arnab Roy},
  title        = {Data Oblivious Genome Variants Search on Intel {SGX}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {732},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/732},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MandalMMR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MangipudiRCK18,
  author       = {Easwar Vivek Mangipudi and
                  Krutarth Rao and
                  Jeremy Clark and
                  Aniket Kate},
  title        = {Automated Penalization of Data Breaches using Crypto-augmented Smart
                  Contracts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1050},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1050},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MangipudiRCK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MarcusHG18,
  author       = {Yuval Marcus and
                  Ethan Heilman and
                  Sharon Goldberg},
  title        = {Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {236},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/236},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MarcusHG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MartinM18,
  author       = {Daniel P. Martin and
                  Marco Martinoli},
  title        = {A Note on Key Rank},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {614},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/614},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MartinM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MastanP18,
  author       = {Indra Deep Mastan and
                  Souradyuti Paul},
  title        = {A New Approach to Deanonymization of Unreachable Bitcoin Nodes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {243},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/243},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MastanP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MasureDP18,
  author       = {Lo{\"{\i}}c Masure and
                  C{\'{e}}cile Dumas and
                  Emmanuel Prouff},
  title        = {Gradient Visualization for General Characterization in Profiling Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1196},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1196},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MasureDP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MateticSMJC18,
  author       = {Sinisa Matetic and
                  Moritz Schneider and
                  Andrew Miller and
                  Ari Juels and
                  Srdjan Capkun},
  title        = {DelegaTEE: Brokered Delegation Using Trusted Execution Environments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {160},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/160},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MateticSMJC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MateticWSKKC18,
  author       = {Sinisa Matetic and
                  Karl W{\"{u}}st and
                  Moritz Schneider and
                  Kari Kostiainen and
                  Ghassan Karame and
                  Srdjan Capkun},
  title        = {{BITE:} Bitcoin Lightweight Client Privacy using Trusted Execution},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {803},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/803},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MateticWSKKC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MateticWSMKC18,
  author       = {Sinisa Matetic and
                  Karl W{\"{u}}st and
                  Moritz Schneider and
                  Ian Miers and
                  Kari Kostiainen and
                  Srdjan Capkun},
  title        = {ZLiTE: Lightweight Clients for Shielded Zcash Transactions using Trusted
                  Execution},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1024},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1024},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MateticWSMKC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MatsudaTK18,
  author       = {Yoshitatsu Matsuda and
                  Tadanori Teruya and
                  Kenji Kashiwabara},
  title        = {Estimation of the Success Probability of Random Sampling by the Gram-Charlier
                  Approximation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {815},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/815},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MatsudaTK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaxwellPSW18,
  author       = {Gregory Maxwell and
                  Andrew Poelstra and
                  Yannick Seurin and
                  Pieter Wuille},
  title        = {Simple Schnorr Multi-Signatures with Applications to Bitcoin},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {68},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/068},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaxwellPSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MayH18,
  author       = {Alexander May and
                  Gottfried Herold},
  title        = {{LP} Solutions of Vectorial Integer Subset Sums - Cryptanalysis of
                  Galbraith's Binary Matrix {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {741},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/741},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MayH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/McCorryBBMM18,
  author       = {Patrick McCorry and
                  Surya Bakshi and
                  Iddo Bentov and
                  Andrew Miller and
                  Sarah Meiklejohn},
  title        = {Pisa: Arbitration Outsourcing for State Channels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {582},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/582},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/McCorryBBMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/McCorryHM18,
  author       = {Patrick McCorry and
                  Alexander Hicks and
                  Sarah Meiklejohn},
  title        = {Smart contracts for bribing miners},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {581},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/581},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/McCorryHM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/McQuoidSR18,
  author       = {Ian McQuoid and
                  Trevor Swope and
                  Mike Rosulek},
  title        = {Characterizing Collision and Second-Preimage Resistance in Linicrypt},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {458},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/458},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/McQuoidSR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MehrdadMS18,
  author       = {Alireza Mehrdad and
                  Farokhlagha Moazami and
                  Hadi Soleimany},
  title        = {Impossible Differential Cryptanalysis on Deoxys-BC-256},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {48},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/048},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MehrdadMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Meiser18,
  author       = {Sebastian Meiser},
  title        = {Approximate and Probabilistic Differential Privacy Definitions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {277},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/277},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Meiser18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Mennink18,
  author       = {Bart Mennink},
  title        = {Towards Tight Security of Cascaded {LRW2}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {434},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/434},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Mennink18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Mennink18a,
  author       = {Bart Mennink},
  title        = {Key Prediction Security of Keyed Sponges},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {449},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/449},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Mennink18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MentensCR18,
  author       = {Nele Mentens and
                  Edoardo Charbon and
                  Francesco Regazzoni},
  title        = {Rethinking Secure FPGAs: Towards a Cryptography-friendly Configurable
                  Cell Architecture and its Automated Design Flow},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {724},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/724},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MentensCR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MentensMNV18,
  author       = {Nele Mentens and
                  Vojtech Miskovsk{\'{y}} and
                  Martin Novotn{\'{y}} and
                  Jo Vliegen},
  title        = {High-speed Side-channel-protected Encryption and Authentication in
                  Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1088},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1088},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MentensMNV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Menyachikhin18,
  author       = {A. V. Menyachikhin},
  title        = {Spectral-linear and spectral-differential methods for generating S-boxes
                  having almost optimal cryptographic parameters},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {370},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/370},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Menyachikhin18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MerzP18,
  author       = {Simon{-}Philipp Merz and
                  Christophe Petit},
  title        = {On the (non) obfuscating power of Garside Normal Forms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1142},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1142},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/MerzP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MesnagerKCT18,
  author       = {Sihem Mesnager and
                  Kwang Ho Kim and
                  Junyop Choe and
                  Chunming Tang},
  title        = {On the Menezes-Teske-Weng's conjecture},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {659},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/659},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/MesnagerKCT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MesnagerKJ18,
  author       = {Sihem Mesnager and
                  Kwang Ho Kim and
                  Myong Song Jo},
  title        = {Improved upper bound on root number of linearized polynomials and
                  its application to nonlinearity estimation of Boolean functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1159},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1159},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MesnagerKJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MeyerANNR18,
  author       = {Lauren De Meyer and
                  Victor Arribas and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen},
  title        = {M{\&}M: Masks and Macs against Physical Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1195},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1195},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MeyerANNR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MeyerB18,
  author       = {Lauren De Meyer and
                  Beg{\"{u}}l Bilgin},
  title        = {Classification of Balanced Quadratic Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {113},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/113},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MeyerB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MeyerBR18,
  author       = {Lauren De Meyer and
                  Beg{\"{u}}l Bilgin and
                  Oscar Reparaz},
  title        = {Consolidating Security Notions in Hardware Masking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {597},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/597},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MeyerBR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MeyerCR18,
  author       = {Michael Meyer and
                  Fabio Campos and
                  Steffen Reith},
  title        = {On Lions and Elligators: An efficient constant-time implementation
                  of {CSIDH}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1198},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1198},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/MeyerCR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MeyerR18,
  author       = {Michael Meyer and
                  Steffen Reith},
  title        = {A faster way to the {CSIDH}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {782},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/782},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/MeyerR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MeyerRB18,
  author       = {Lauren De Meyer and
                  Oscar Reparaz and
                  Beg{\"{u}}l Bilgin},
  title        = {Multiplicative Masking for {AES} in Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {865},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/865},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MeyerRB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Micciancio018,
  author       = {Daniele Micciancio and
                  Michael Walter},
  title        = {On the Bit Security of Cryptographic Primitives},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {77},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/077},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Micciancio018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Micciancio18,
  author       = {Daniele Micciancio},
  title        = {On the Hardness of Learning With Errors with Binary Secrets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {988},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/988},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Micciancio18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MicciancioS18,
  author       = {Daniele Micciancio and
                  Jessica Sorrell},
  title        = {Ring packing and amortized {FHEW} bootstrapping},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {532},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/532},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MicciancioS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Michalas18,
  author       = {Antonis Michalas},
  title        = {The Lord of the Shares: Combining Attribute-Based Encryption and Searchable
                  Encryption for Flexible Data Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1204},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1204},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Michalas18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MichalevskyJ18,
  author       = {Yan Michalevsky and
                  Marc Joye},
  title        = {Decentralized Policy-Hiding Attribute-Based Encryption with Receiver
                  Privacy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {753},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/753},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MichalevskyJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MicheliHS18,
  author       = {Gabrielle De Micheli and
                  Nadia Heninger and
                  Barak Shani},
  title        = {Characterizing overstretched {NTRU} attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {630},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/630},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MicheliHS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MillerS18,
  author       = {Stephen D. Miller and
                  Noah Stephens{-}Davidowitz},
  title        = {Generalizations of Banaszczyk's transference theorems and tail bound},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {188},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/188},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MillerS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MinaeiMK18,
  author       = {Mohsen Minaei and
                  Pedro Moreno{-}Sanchez and
                  Aniket Kate},
  title        = {{R3C3:} Cryptographically secure Censorship Resistant Rendezvous using
                  Cryptocurrencies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {454},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/454},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MinaeiMK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Minaud18,
  author       = {Brice Minaud},
  title        = {Linear Biases in {AEGIS} Keystream},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {292},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/292},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Minaud18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MingCLYZZ18,
  author       = {Jingdian Ming and
                  Wei Cheng and
                  Huizhong Li and
                  Guang Yang and
                  Yongbin Zhou and
                  Qian Zhang},
  title        = {Achilles' Heel: the Unbalanced Mask Sets May Destroy a Masking Countermeasure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {745},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/745},
  timestamp    = {Fri, 11 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/MingCLYZZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MishraRDY18,
  author       = {Pradeep Kumar Mishra and
                  Deevashwer Rathee and
                  Dung Hoang Duong and
                  Masaya Yasuda},
  title        = {Fast Secure Matrix Multiplications over Ring-Based Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {663},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/663},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MishraRDY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MizuideTT18,
  author       = {Taiga Mizuide and
                  Atsushi Takayasu and
                  Tsuyoshi Takagi},
  title        = {Tight Reductions for Diffie-Hellman Variants in the Algebraic Group
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1220},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1220},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MizuideTT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MohasselR18,
  author       = {Payman Mohassel and
                  Peter Rindal},
  title        = {{ABY3:} {A} Mixed Protocol Framework for Machine Learning},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {403},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/403},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MohasselR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Montgomery18,
  author       = {Hart William Montgomery},
  title        = {A Nonstandard Variant of Learning with Rounding with Polynomial Modulus
                  and Unbounded Samples},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {100},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/100},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Montgomery18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Montgomery18a,
  author       = {Hart Montgomery},
  title        = {More Efficient Lattice PRFs from Keyed Pseudorandom Synthesizers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1077},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1077},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Montgomery18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoosMR18,
  author       = {Thorben Moos and
                  Amir Moradi and
                  Bastian Richter},
  title        = {Static Power Side-Channel Analysis - {A} Survey on Measurement Factors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {676},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/676},
  timestamp    = {Mon, 10 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoosMR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoosMSS18,
  author       = {Thorben Moos and
                  Amir Moradi and
                  Tobias Schneider and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Glitch-Resistant Masking Revisited - or Why Proofs in the Robust Probing
                  Model are Needed},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {490},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/490},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoosMSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MorganP18,
  author       = {Andrew Morgan and
                  Rafael Pass},
  title        = {On the Security Loss of Unique Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {905},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/905},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MorganP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MorganP18a,
  author       = {Andrew Morgan and
                  Rafael Pass},
  title        = {Achieving Fair Treatment in Algorithmic Classification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {911},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/911},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MorganP18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MusaX18,
  author       = {Saud Al Musa and
                  Guangwu Xu},
  title        = {Fast Scalar Multiplication for Elliptic Curves over Prime Fields by
                  Efficiently Computable Formulas},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {964},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/964},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MusaX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MustafaCAA18,
  author       = {Mustafa A. Mustafa and
                  Sara Cleemput and
                  Abdelrahaman Aly and
                  Aysajan Abidin},
  title        = {A Secure and Privacy-preserving Protocol for Smart Metering Operational
                  Data Collection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {101},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/101},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MustafaCAA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nandi18,
  author       = {Mridul Nandi},
  title        = {Bernstein Bound on {WCS} is Tight - Repairing Luykx-Preneel Optimal
                  Forgeries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {520},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/520},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nandi18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorPR18,
  author       = {Moni Naor and
                  Benny Pinkas and
                  Eyal Ronen},
  title        = {How to (not) share a password: Privacy preserving protocols for finding
                  heavy hitters with adversarial behavior},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {3},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/003},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaorPR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorRS18,
  author       = {Moni Naor and
                  Lior Rotem and
                  Gil Segev},
  title        = {The Security of Lazy Users in Out-of-Band Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {823},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/823},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaorRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NarayananP18,
  author       = {Varun Narayanan and
                  Vinod M. Prabhakaran},
  title        = {Oblivious Transfer in Incomplete Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {875},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/875},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NarayananP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NarulaVV18,
  author       = {Neha Narula and
                  Willy Vasquez and
                  Madars Virza},
  title        = {zkLedger: Privacy-Preserving Auditing for Distributed Ledgers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {241},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/241},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NarulaVV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NathS18,
  author       = {Kaushik Nath and
                  Palash Sarkar},
  title        = {Efficient Inversion In (Pseudo-)Mersenne Prime Order Fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {985},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/985},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NathS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NejatollahiDBC18,
  author       = {Hamid Nejatollahi and
                  Nikil D. Dutt and
                  Indranil Banerjee and
                  Rosario Cammarota},
  title        = {Domain-specific Accelerators for Ideal Lattice-based Public Key Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {608},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/608},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/NejatollahiDBC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NeumayerVE18,
  author       = {Seb Neumayer and
                  Mayank Varia and
                  Ittay Eyal},
  title        = {An Analysis of Acceptance Policies For Blockchain Transactions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {40},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/040},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NeumayerVE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NguyenSJMRD18,
  author       = {Phuong Ha Nguyen and
                  Durga Prasad Sahoo and
                  Chenglu Jin and
                  Kaleel Mahmood and
                  Ulrich R{\"{u}}hrmair and
                  Marten van Dijk},
  title        = {The Interpose {PUF:} Secure {PUF} Design against State-of-the-art
                  Machine Learning Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {350},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/350},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NguyenSJMRD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NikovaNR18,
  author       = {Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen},
  title        = {Decomposition of Permutations in a Finite Field},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {103},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/103},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NikovaNR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NilssonJS18,
  author       = {Alexander Nilsson and
                  Thomas Johansson and
                  Paul Stankovski},
  title        = {Error Amplification in Code-based Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1223},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1223},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NilssonJS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NingDHC18,
  author       = {Jianting Ning and
                  Hung Dang and
                  Ruomu Hou and
                  Ee{-}Chien Chang},
  title        = {Keeping Time-Release Secrets through Smart Contracts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1166},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1166},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NingDHC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NingMHMXW18,
  author       = {Yu Ning and
                  Fuyou Miao and
                  Wenchao Huang and
                  Keju Meng and
                  Yan Xiong and
                  Xingfu Wang},
  title        = {Constructing Ideal Secret Sharing Schemes based on Chinese Remainder
                  Theorem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {837},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/837},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NingMHMXW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NordholtV18,
  author       = {Peter Sebastian Nordholt and
                  Meilof Veeningen},
  title        = {Minimising Communication in Honest-Majority {MPC} by Batchwise Multiplication
                  Verification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {474},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/474},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NordholtV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nuida18,
  author       = {Koji Nuida},
  title        = {Keeping or Losing Tiny-Error Correctness of Cryptosystems Implemented
                  by Secure Pseudorandom Generators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {718},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/718},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nuida18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OkamotoTYO18,
  author       = {Takeshi Okamoto and
                  Raylin Tso and
                  Michitomo Yamaguchi and
                  Eiji Okamoto},
  title        = {A k-out-of-n Ring Signature with Flexible Participation for Signers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {728},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/728},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OkamotoTYO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OrtizADAC18,
  author       = {Jheyne N. Ortiz and
                  Robson R. de Araujo and
                  Ricardo Dahab and
                  Diego F. Aranha and
                  Sueli I. R. Costa},
  title        = {In Praise of Twisted Canonical Embedding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {356},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/356},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OrtizADAC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OstrovskyPVV18,
  author       = {Rafail Ostrovsky and
                  Giuseppe Persiano and
                  Daniele Venturi and
                  Ivan Visconti},
  title        = {Continuously Non-Malleable Codes in the Split-State Model from Minimal
                  Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {542},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/542},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OstrovskyPVV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OuZL18,
  author       = {Changhai Ou and
                  Xinping Zhou and
                  Siew{-}Kei Lam},
  title        = {Information Entropy Based Leakage Certification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {959},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/959},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OuZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OuZL18a,
  author       = {Changhai Ou and
                  Chengju Zhou and
                  Siew{-}Kei Lam},
  title        = {Compressive Sensing based Leakage Sampling and Reconstruction: {A}
                  First Study},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1149},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1149},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OuZL18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OzmenBY18,
  author       = {Muslum Ozgur Ozmen and
                  Rouzbeh Behnia and
                  Attila A. Yavuz},
  title        = {Compact Energy and Delay-aware Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {28},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/028},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OzmenBY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OzmenBY18a,
  author       = {Muslum Ozgur Ozmen and
                  Rouzbeh Behnia and
                  Attila A. Yavuz},
  title        = {Fast Authentication from Aggregate Signatures with Improved Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1141},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1141},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OzmenBY18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Pakniat18,
  author       = {Nasrollah Pakniat},
  title        = {On the Security of a Certificateless Strong Designated Verifier Signature
                  Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {915},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/915},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Pakniat18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PalD18,
  author       = {Tapas Pal and
                  Ratna Dutta},
  title        = {Constructing Witness {PRF} and Offline Witness Encryption Without
                  Multilinear Maps},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {587},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/587},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PalD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PanLN18,
  author       = {Dongxue Pan and
                  Hongda Li and
                  Peifang Ni},
  title        = {Candidate Differing-Inputs Obfuscation from Indistinguishability Obfuscation
                  and Auxiliary-Input Point Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1055},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1055},
  timestamp    = {Mon, 12 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PanLN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PanjaR18,
  author       = {Somnath Panja and
                  Bimal Kumar Roy},
  title        = {A secure end-to-end verifiable e-voting system using zero knowledge
                  based blockchain},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {466},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/466},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PanjaR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Papagiannopoulos18,
  author       = {Kostas Papagiannopoulos},
  title        = {Low Randomness Masking and Shuffling: An Evaluation Using Mutual Information},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {825},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/825},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Papagiannopoulos18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PascaS18,
  author       = {Vlad{-}Raul Pasca and
                  Emil Simion},
  title        = {Challenges in cyber security - Ransomware Phenomenon},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {125},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/125},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PascaS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Paskin-Cherniavsky18,
  author       = {Anat Paskin{-}Cherniavsky},
  title        = {On Perfectly Secure 2PC in the OT-hybrid model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {308},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/308},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Paskin-Cherniavsky18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PassS18,
  author       = {Rafael Pass and
                  Elaine Shi},
  title        = {Rethinking Large-Scale Consensus},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {302},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/302},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PassS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatelPRY18,
  author       = {Sarvar Patel and
                  Giuseppe Persiano and
                  Mariana Raykova and
                  Kevin Yeo},
  title        = {PanORAMa: Oblivious {RAM} with Logarithmic Overhead},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {373},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/373},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatelPRY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatelPY18,
  author       = {Sarvar Patel and
                  Giuseppe Persiano and
                  Kevin Yeo},
  title        = {Private Stateful Information Retrieval},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1083},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1083},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatelPY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatersonS18,
  author       = {Kenneth G. Paterson and
                  Jacob C. N. Schuldt},
  title        = {Statistical Attacks on Cookie Masking for {RC4}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {93},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/093},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatersonS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatraR18,
  author       = {Arpita Patra and
                  Divya Ravi},
  title        = {On the Exact Round Complexity of Secure Three-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {481},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/481},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatraR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatranabisM18,
  author       = {Sikhar Patranabis and
                  Debdeep Mukhopadhyay},
  title        = {New Lower Bounds on Predicate Entropy for Function Private Public-Key
                  Predicate Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {190},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/190},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatranabisM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatranabisMR18,
  author       = {Sikhar Patranabis and
                  Debdeep Mukhopadhyay and
                  Somindu C. Ramanna},
  title        = {Function Private Predicate Encryption for Low Min-Entropy Predicates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1250},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1250},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatranabisMR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatsonakisSRK18,
  author       = {Christos Patsonakis and
                  Katerina Samari and
                  Mema Roussopoulos and
                  Aggelos Kiayias},
  title        = {Towards a Smart Contract-based, Decentralized, Public-Key Infrastructure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {853},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/853},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatsonakisSRK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PattonS18,
  author       = {Christopher Patton and
                  Thomas Shrimpton},
  title        = {Partially specified channels: The {TLS} 1.3 record layer without elision},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {634},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/634},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PattonS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PaulSSR18,
  author       = {Arinjita Paul and
                  Varshika Srinivasavaradhan and
                  S. Sharmila Deva Selvi and
                  C. Pandu Rangan},
  title        = {A CCA-secure collusion-resistant Identity-based Proxy Re-encryption
                  Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1131},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1131},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PaulSSR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PedrosaPP18,
  author       = {Alejandro Ranchal{-}Pedrosa and
                  Maria Potop{-}Butucaru and
                  Sara {Tucci Piergiovanni}},
  title        = {Lightning Factories},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {918},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/918},
  timestamp    = {Mon, 15 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/PedrosaPP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Pellet-Mary18,
  author       = {Alice Pellet{-}Mary},
  title        = {Quantum Attacks against Indistinguishablility Obfuscators Proved Secure
                  in the Weak Multilinear Map Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {533},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/533},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Pellet-Mary18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Perez-SolaDNH18,
  author       = {Cristina P{\'{e}}rez{-}Sol{\`{a}} and
                  Sergi Delgado{-}Segura and
                  Guillermo Navarro{-}Arribas and
                  Jordi Herrera{-}Joancomart{\'{\i}}},
  title        = {Another coin bites the dust: An analysis of dust in {UTXO} based cryptocurrencies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {513},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/513},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Perez-SolaDNH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PersianoY18,
  author       = {Giuseppe Persiano and
                  Kevin Yeo},
  title        = {Lower Bounds for Differentially Private RAMs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1051},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1051},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PersianoY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PfeiferH18,
  author       = {Christophe Pfeifer and
                  Patrick Haddad},
  title        = {Spread: a new layer for profiled deep-learning side-channel attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {880},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/880},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PfeiferH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PiccoliVR18,
  author       = {Alessandro De Piccoli and
                  Andrea Visconti and
                  Ottavio Giulio Rizzo},
  title        = {Polynomial multiplication over binary finite fields: new upper bounds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {91},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/091},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PiccoliVR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PicekHAR18,
  author       = {Stjepan Picek and
                  Annelie Heuser and
                  Cesare Alippi and
                  Francesco Regazzoni},
  title        = {When Theory Meets Practice: {A} Framework for Robust Profiled Side-channel
                  Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1123},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1123},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PicekHAR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PicekHJBR18,
  author       = {Stjepan Picek and
                  Annelie Heuser and
                  Alan Jovic and
                  Shivam Bhasin and
                  Francesco Regazzoni},
  title        = {The Curse of Class Imbalance and Conflicting Metrics with Machine
                  Learning for Side-channel Evaluations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {476},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/476},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PicekHJBR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PicekSHKBL18,
  author       = {Stjepan Picek and
                  Ioannis Petros Samiotis and
                  Annelie Heuser and
                  Jaehun Kim and
                  Shivam Bhasin and
                  Axel Legay},
  title        = {On the Performance of Deep Learning for Side-channel Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {4},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/004},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PicekSHKBL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Pietrzak18,
  author       = {Krzysztof Pietrzak},
  title        = {Proofs of Catalytic Space},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {194},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/194},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Pietrzak18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Pietrzak18a,
  author       = {Krzysztof Pietrzak},
  title        = {Simple Verifiable Delay Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {627},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/627},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Pietrzak18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PilyankevichKM18,
  author       = {Eugene Pilyankevich and
                  Ignat Korchagin and
                  Andrey Mnatsakanov},
  title        = {Hermes. {A} framework for cryptographically assured access control
                  and data security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {200},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/200},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PilyankevichKM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Pinkas0WW18,
  author       = {Benny Pinkas and
                  Thomas Schneider and
                  Christian Weinert and
                  Udi Wieder},
  title        = {Efficient Circuit-based {PSI} via Cuckoo Hashing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {120},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/120},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Pinkas0WW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PinoLS18,
  author       = {Rafa{\"{e}}l Del Pino and
                  Vadim Lyubashevsky and
                  Gregor Seiler},
  title        = {Lattice-Based Group Signatures and Zero-Knowledge Proofs of Automorphism
                  Stability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {779},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/779},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PinoLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Poettering18,
  author       = {Bertram Poettering},
  title        = {Shorter double-authentication preventing signatures for small address
                  spaces},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {223},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/223},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Poettering18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Poettering18a,
  author       = {Bertram Poettering},
  title        = {Breaking the confidentiality of {OCB2}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1087},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1087},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Poettering18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PoetteringR18,
  author       = {Bertram Poettering and
                  Paul R{\"{o}}sler},
  title        = {Ratcheted key exchange, revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {296},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/296},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PoetteringR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ProuffSBCD18,
  author       = {Emmanuel Prouff and
                  R{\'{e}}mi Strullu and
                  Ryad Benadjila and
                  Eleonora Cagli and
                  C{\'{e}}cile Dumas},
  title        = {Study of Deep Learning Techniques for Side-Channel Analysis and Introduction
                  to {ASCAD} Database},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {53},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/053},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ProuffSBCD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PullsD18,
  author       = {Tobias Pulls and
                  Rasmus Dahlberg},
  title        = {Steady: {A} Simple End-to-End Secure Logging System},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {737},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/737},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PullsD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PutraSW18,
  author       = {Dea Saka Kurnia Putra and
                  Mohamad Ali Sadikin and
                  Susila Windarta},
  title        = {S-Mbank: Secure Mobile Banking Authentication Scheme Using Signcryption,
                  Pair Based Text Authentication, and Contactless Smartcard},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {868},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/868},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PutraSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/QuachWW18,
  author       = {Willy Quach and
                  Hoeteck Wee and
                  Daniel Wichs},
  title        = {Laconic Function Evaluation and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {409},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/409},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/QuachWW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/QuachWZ18,
  author       = {Willy Quach and
                  Daniel Wichs and
                  Giorgos Zirdelis},
  title        = {Watermarking PRFs under Standard Assumptions: Public Marking and Security
                  with Extraction Queries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {906},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/906},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/QuachWZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/QuagliaS18,
  author       = {Elizabeth A. Quaglia and
                  Ben Smyth},
  title        = {Authentication with weaker trust assumptions for voting systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {222},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/222},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/QuagliaS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RaddumZ18,
  author       = {H{\aa}vard Raddum and
                  Pavol Zajac},
  title        = {{MRHS} Solver Based on Linear Algebra and Exhaustive Search},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {111},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/111},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RaddumZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RajuTV18,
  author       = {Kallepu Raju and
                  Appala Naidu Tentu and
                  China Venkaiah Vadlamudi},
  title        = {Cryptanalysis of a Group Key Transfer Protocol Based on Secret Sharing:
                  Generalization and Countermeasures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {711},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/711},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RajuTV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics