Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/iacr/iacr2018.bht:"
more than 1000 matches, exporting first 1000 hits only!
@article{DBLP:journals/iacr/000118, author = {Martin Strand}, title = {A verifiable shuffle for the {GSW} cryptosystem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {27}, year = {2018}, url = {http://eprint.iacr.org/2018/027}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/000118.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001C18, author = {Yongjun Zhao and Sherman S. M. Chow}, title = {Can you find the one for me? Privacy-Preserving Matchmaking via Threshold {PSI}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {184}, year = {2018}, url = {http://eprint.iacr.org/2018/184}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001C18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001HKS18, author = {Michael Backes and Lucjan Hanzlik and Kamil Kluczniak and Jonas Schneider}, title = {Signatures with Flexible Public Key: {A} Unified Approach to Privacy-Preserving Signatures (Full Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {191}, year = {2018}, url = {http://eprint.iacr.org/2018/191}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001HKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001MO18, author = {Daniel P. Martin and Luke Mather and Elisabeth Oswald}, title = {Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {19}, year = {2018}, url = {http://eprint.iacr.org/2018/019}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001MO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001R18, author = {Lorenzo Grassi and Christian Rechberger}, title = {New Rigorous Analysis of Truncated Differentials for 5-round {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {182}, year = {2018}, url = {http://eprint.iacr.org/2018/182}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001R18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0002S18, author = {Takahiro Matsuda and Jacob C. N. Schuldt}, title = {Related Randomness Security for Public Key Encryption, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {41}, year = {2018}, url = {http://eprint.iacr.org/2018/041}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0002S18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0003QX18, author = {Yu Chen and Baodong Qin and Haiyang Xue}, title = {Regularly Lossy Functions and Their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {21}, year = {2018}, url = {http://eprint.iacr.org/2018/021}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0003QX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0012GK18, author = {Xiao Wang and S. Dov Gordon and Jonathan Katz}, title = {Simple and Efficient Two-Server {ORAM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {5}, year = {2018}, url = {http://eprint.iacr.org/2018/005}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0012GK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0021GKW18, author = {Jie Chen and Junqing Gong and Lucas Kowalczyk and Hoeteck Wee}, title = {Unbounded {ABE} via Bilinear Entropy Expansion, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {116}, year = {2018}, url = {http://eprint.iacr.org/2018/116}, timestamp = {Thu, 07 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0021GKW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbadiTMD18, author = {Aydin Abadi and Sotirios Terzis and Roberto Metere and Changyu Dong}, title = {Efficient Delegated Private Set Intersection on Outsourced Private Datasets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {496}, year = {2018}, url = {https://eprint.iacr.org/2018/496}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbadiTMD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdelraheemAGG18, author = {Mohamed Ahmed Abdelraheem and Tobias Andersson and Christian Gehrmann and Cornelius Glackin}, title = {Practical Attacks on Relational Databases Protected via Searchable Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {715}, year = {2018}, url = {https://eprint.iacr.org/2018/715}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdelraheemAGG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdolmalekiLSZ18, author = {Behzad Abdolmaleki and Helger Lipmaa and Janno Siim and Michal Zajac}, title = {On {QA-NIZK} in the {BPK} Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {877}, year = {2018}, url = {https://eprint.iacr.org/2018/877}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdolmalekiLSZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdouliABCHMM18, author = {Ameera Salem Al Abdouli and Mohamed Al Ali and Emanuele Bellini and Florian Caullery and Alexandros Hasikos and Marc Manzano and V{\'{\i}}ctor Mateu}, title = {{DRANKULA:} a McEliece-like rank metric based cryptosystem implementation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {768}, year = {2018}, url = {https://eprint.iacr.org/2018/768}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdouliABCHMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbeAOT18, author = {Masayuki Abe and Miguel Ambrona and Miyako Ohkubo and Mehdi Tibouchi}, title = {Lower Bounds on Structure-Preserving Signatures for Bilateral Messages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {640}, year = {2018}, url = {https://eprint.iacr.org/2018/640}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbeAOT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbeJOR18, author = {Masayuki Abe and Charanjit S. Jutla and Miyako Ohkubo and Arnab Roy}, title = {Improved (Almost) Tightly-Secure Simulation-Sound {QA-NIZK} with Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {849}, year = {2018}, url = {https://eprint.iacr.org/2018/849}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbeJOR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Abraham18, author = {Endre Abraham}, title = {Post-quantum verifiable random functions from ring signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1231}, year = {2018}, url = {https://eprint.iacr.org/2018/1231}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Abraham18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbrahamDDNR18, author = {Ittai Abraham and Srinivas Devadas and Danny Dolev and Kartik Nayak and Ling Ren}, title = {Synchronous Byzantine Agreement with Expected {O(1)} Rounds, Expected O(n\({}^{\mbox{2)}}\) Communication, and Optimal Resilience}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1028}, year = {2018}, url = {https://eprint.iacr.org/2018/1028}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbrahamDDNR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbrahamMNR18, author = {Ittai Abraham and Dahlia Malkhi and Kartik Nayak and Ling Ren}, title = {Dfinity Consensus, Explored}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1153}, year = {2018}, url = {https://eprint.iacr.org/2018/1153}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbrahamMNR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbspoelBSV18, author = {Mark Abspoel and Niek J. Bouman and Berry Schoenmakers and Niels de Vreede}, title = {Fast Secure Comparison for Medium-Sized Integers and Its Application in Binarized Neural Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1236}, year = {2018}, url = {https://eprint.iacr.org/2018/1236}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbspoelBSV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AdjAM18, author = {Gora Adj and Omran Ahmadi and Alfred Menezes}, title = {On Isogeny Graphs of Supersingular Elliptic Curves over Finite Fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {132}, year = {2018}, url = {http://eprint.iacr.org/2018/132}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AdjAM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AdjCCMR18, author = {Gora Adj and Daniel Cervantes{-}V{\'{a}}zquez and Jes{\'{u}}s{-}Javier Chi{-}Dom{\'{\i}}nguez and Alfred Menezes and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {On the cost of computing isogenies between supersingular elliptic curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {313}, year = {2018}, url = {https://eprint.iacr.org/2018/313}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AdjCCMR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AdomnicaiFM18, author = {Alexandre Adomnicai and Jacques J. A. Fournier and Laurent Masson}, title = {Masking the Lightweight Authenticated Ciphers {ACORN} and Ascon in Software}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {708}, year = {2018}, url = {https://eprint.iacr.org/2018/708}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AdomnicaiFM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgarwalHKM18, author = {Archita Agarwal and Maurice Herlihy and Seny Kamara and Tarik Moataz}, title = {Encrypted Databases for Differential Privacy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {860}, year = {2018}, url = {https://eprint.iacr.org/2018/860}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgarwalHKM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AggarwalDNOPRS18, author = {Divesh Aggarwal and Ivan Damg{\aa}rd and Jesper Buus Nielsen and Maciej Obremski and Erick Purwanto and Jo{\~{a}}o Ribeiro and Mark Simkin}, title = {Stronger Leakage-Resilient and Non-Malleable Secret-Sharing Schemes for General Access Structures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1147}, year = {2018}, url = {https://eprint.iacr.org/2018/1147}, timestamp = {Sat, 18 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AggarwalDNOPRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AggarwalG18, author = {Abhinav Aggarwal and Yue Guo}, title = {A Simple Reduction from State Machine Replication to Binary Agreement in Partially Synchronous or Asynchronous Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {60}, year = {2018}, url = {http://eprint.iacr.org/2018/060}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AggarwalG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AggarwalKO18, author = {Divesh Aggarwal and Tomasz Kazana and Maciej Obremski}, title = {Leakage-resilient Algebraic Manipulation Detection Codes with Optimal Parameters}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {58}, year = {2018}, url = {http://eprint.iacr.org/2018/058}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AggarwalKO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Aghaie0RS018, author = {Anita Aghaie and Amir Moradi and Shahram Rasoolzadeh and Falk Schellenberg and Tobias Schneider}, title = {Impeccable Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {203}, year = {2018}, url = {http://eprint.iacr.org/2018/203}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Aghaie0RS018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AghiliM18, author = {Seyed Farhad Aghili and Hamid Mala}, title = {Security Analysis of Fan et al. Lightweight {RFID} Authentication Protocol for Privacy Protection in IoT}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {388}, year = {2018}, url = {https://eprint.iacr.org/2018/388}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AghiliM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AghiliM18a, author = {Seyed Farhad Aghili and Hamid Mala}, title = {Breaking a Lightweight {M2M} Authentication Protocol for Communications in IIoT Environment}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {891}, year = {2018}, url = {https://eprint.iacr.org/2018/891}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AghiliM18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Agievich18, author = {Sergey Agievich}, title = {XS-circuits in Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {592}, year = {2018}, url = {https://eprint.iacr.org/2018/592}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Agievich18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Agrawal18, author = {Shweta Agrawal}, title = {New Methods for Indistinguishability Obfuscation: Bootstrapping and Instantiation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {633}, year = {2018}, url = {https://eprint.iacr.org/2018/633}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Agrawal18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalGM18, author = {Shashank Agrawal and Chaya Ganesh and Payman Mohassel}, title = {Non-Interactive Zero-Knowledge Proofs for Composite Statements}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {557}, year = {2018}, url = {https://eprint.iacr.org/2018/557}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalGM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalM18, author = {Shweta Agrawal and Monosij Maitra}, title = {{FE} and iO for Turing Machines from Minimal Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {908}, year = {2018}, url = {https://eprint.iacr.org/2018/908}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalMMM18, author = {Shashank Agrawal and Peihan Miao and Payman Mohassel and Pratyay Mukherjee}, title = {{PASTA:} PASsword-based Threshold Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {885}, year = {2018}, url = {https://eprint.iacr.org/2018/885}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalMMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalMMR18, author = {Shashank Agrawal and Payman Mohassel and Pratyay Mukherjee and Peter Rindal}, title = {DiSE: Distributed Symmetric-key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {727}, year = {2018}, url = {https://eprint.iacr.org/2018/727}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalMMR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrikolaCH18, author = {Thomas Agrikola and Geoffroy Couteau and Dennis Hofheinz}, title = {The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {470}, year = {2018}, url = {https://eprint.iacr.org/2018/470}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrikolaCH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrikolaH18, author = {Thomas Agrikola and Dennis Hofheinz}, title = {Interactively Secure Groups from Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {10}, year = {2018}, url = {http://eprint.iacr.org/2018/010}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrikolaH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AhmadiS18, author = {Ahmad Ahmadi and Reihaneh Safavi{-}Naini}, title = {Directional Distance-Bounding Identification Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {366}, year = {2018}, url = {https://eprint.iacr.org/2018/366}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AhmadiS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AhmadiSA18, author = {Ahmad Ahmadi and Reihaneh Safavi{-}Naini and Md. Mamunur Rashid Akand}, title = {Anonymous Distance-Bounding Identification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {365}, year = {2018}, url = {https://eprint.iacr.org/2018/365}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AhmadiSA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ahn018, author = {Na{-}Young Ahn and Dong Hoon Lee}, title = {Countermeasures against a side-channel attack in a kernel memory}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {62}, year = {2018}, url = {http://eprint.iacr.org/2018/062}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ahn018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AkandS18, author = {Md. Mamunur Rashid Akand and Reihaneh Safavi{-}Naini}, title = {In-region Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {345}, year = {2018}, url = {https://eprint.iacr.org/2018/345}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AkandS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AkaviaFS18, author = {Adi Akavia and Dan Feldman and Hayim Shaul}, title = {Secure Search via Multi-Ring Fully Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {245}, year = {2018}, url = {http://eprint.iacr.org/2018/245}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AkaviaFS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AkaviaFS18a, author = {Adi Akavia and Dan Feldman and Hayim Shaul}, title = {Secure Data Retrieval On The Cloud Homomorphic Encryption Meets Coresets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1003}, year = {2018}, url = {https://eprint.iacr.org/2018/1003}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AkaviaFS18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AkaviaGHL18, author = {Adi Akavia and Craig Gentry and Shai Halevi and Max Leibovich}, title = {Setup-Free Secure Search on Encrypted Data: Faster and Post-Processing Free}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1235}, year = {2018}, url = {https://eprint.iacr.org/2018/1235}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AkaviaGHL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AkhmetzyanovaAS18, author = {Liliya R. Akhmetzyanova and Evgeny K. Alekseev and Stanislav V. Smyshlyaev}, title = {Security bound for {CTR-ACPKM} internally re-keyed encryption mode}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {950}, year = {2018}, url = {https://eprint.iacr.org/2018/950}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AkhmetzyanovaAS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AkhmetzyanovaCG18, author = {Liliya R. Akhmetzyanova and Cas Cremers and Luke Garratt and Stanislav V. Smyshlyaev}, title = {Security Analysis for Randomness Improvements for Security Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1057}, year = {2018}, url = {https://eprint.iacr.org/2018/1057}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AkhmetzyanovaCG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlSabahOR18, author = {Mashael AlSabah and Gabriele Oligeri and Ryan Riley}, title = {Your Culture is in Your Password: An Analysis of a Demographically-diverse Password Dataset}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1063}, year = {2018}, url = {https://eprint.iacr.org/2018/1063}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlSabahOR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlagicGM18, author = {Gorjan Alagic and Tommaso Gagliardoni and Christian Majenz}, title = {Can you sign a quantum state}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1164}, year = {2018}, url = {https://eprint.iacr.org/2018/1164}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlagicGM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlagicJOP18, author = {Gorjan Alagic and Stacey Jeffery and Maris Ozols and Alexander Poremba}, title = {On Quantum Chosen-Ciphertext Attacks and Learning with Errors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1185}, year = {2018}, url = {https://eprint.iacr.org/2018/1185}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlagicJOP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlagicMRS18, author = {Gorjan Alagic and Christian Majenz and Alexander Russell and Fang Song}, title = {Quantum-secure message authentication via blind-unforgeability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1150}, year = {2018}, url = {https://eprint.iacr.org/2018/1150}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlagicMRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbrechtCDDPPVW18, author = {Martin R. Albrecht and Benjamin R. Curtis and Amit Deo and Alex Davidson and Rachel Player and Eamonn W. Postlethwaite and Fernando Virdia and Thomas Wunderer}, title = {Estimate all the \{LWE, NTRU\} schemes!}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {331}, year = {2018}, url = {https://eprint.iacr.org/2018/331}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbrechtCDDPPVW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbrechtDP18, author = {Martin R. Albrecht and Amit Deo and Kenneth G. Paterson}, title = {Cold Boot Attacks on Ring and Module {LWE} Keys Under the {NTT}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {672}, year = {2018}, url = {https://eprint.iacr.org/2018/672}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbrechtDP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbrechtHHPVW18, author = {Martin R. Albrecht and Christian Hanser and Andrea H{\"{o}}ller and Thomas P{\"{o}}ppelmann and Fernando Virdia and Andreas Wallner}, title = {Learning with Errors on {RSA} Co-Processors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {425}, year = {2018}, url = {https://eprint.iacr.org/2018/425}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbrechtHHPVW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbrechtMPS18, author = {Martin R. Albrecht and Jake Massimo and Kenneth G. Paterson and Juraj Somorovsky}, title = {Prime and Prejudice: Primality Testing Under Adversarial Conditions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {749}, year = {2018}, url = {https://eprint.iacr.org/2018/749}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbrechtMPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AldayaBHGT18, author = {Alejandro Cabrera Aldaya and Billy Bob Brumley and Sohaib ul Hassan and Cesar Pereida Garc{\'{\i}}a and Nicola Tuveri}, title = {Port Contention for Fun and Profit}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1060}, year = {2018}, url = {https://eprint.iacr.org/2018/1060}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AldayaBHGT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AldayaGTB18, author = {Alejandro Cabrera Aldaya and Cesar Pereida Garc{\'{\i}}a and Luis Manuel Alvarez Tapia and Billy Bob Brumley}, title = {Cache-Timing Attacks on {RSA} Key Generation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {367}, year = {2018}, url = {https://eprint.iacr.org/2018/367}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AldayaGTB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AliMS18, author = {Mohammad Ali and Javad Mohajeri and Mohammad{-}Reza (Rafsanjani) Sadeghi}, title = {A fully distributed revocable ciphertext-policy hierarchical attribute-based encryption without pairing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1102}, year = {2018}, url = {https://eprint.iacr.org/2018/1102}, timestamp = {Fri, 19 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AliMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlmeidaBBPPP18, author = {Jos{\'{e}} Bacelar Almeida and Manuel Barbosa and Gilles Barthe and Hugo Pacheco and Vitor Pereira and Bernardo Portela}, title = {Enforcing ideal-world leakage bounds in real-world secret sharing {MPC} frameworks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {404}, year = {2018}, url = {https://eprint.iacr.org/2018/404}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlmeidaBBPPP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlonsoH18, author = {Kurt M. Alonso and Jordi Herrera{-}Joancomart{\'{\i}}}, title = {Monero - Privacy in the Blockchain}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {535}, year = {2018}, url = {https://eprint.iacr.org/2018/535}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlonsoH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlsalamiZ18, author = {Nasser Alsalami and Bingsheng Zhang}, title = {Uncontrolled Randomness in Blockchains: Covert Bulletin Board for Illicit Activities}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1184}, year = {2018}, url = {https://eprint.iacr.org/2018/1184}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlsalamiZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AltugC18, author = {Salim Ali Altug and Yilei Chen}, title = {A Candidate Group with Infeasible Inversion}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {926}, year = {2018}, url = {https://eprint.iacr.org/2018/926}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AltugC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlwenBP18, author = {Jo{\"{e}}l Alwen and Jeremiah Blocki and Krzysztof Pietrzak}, title = {Sustained Space Complexity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {147}, year = {2018}, url = {http://eprint.iacr.org/2018/147}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlwenBP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlwenCD18, author = {Jo{\"{e}}l Alwen and Sandro Coretti and Yevgeniy Dodis}, title = {The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1037}, year = {2018}, url = {https://eprint.iacr.org/2018/1037}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlwenCD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AmbainisHU18, author = {Andris Ambainis and Mike Hamburg and Dominique Unruh}, title = {Quantum security proofs using semi-classical oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {904}, year = {2018}, url = {https://eprint.iacr.org/2018/904}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AmbainisHU18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AmjadKM18, author = {Ghous Amjad and Seny Kamara and Tarik Moataz}, title = {Breach-Resistant Structured Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {195}, year = {2018}, url = {http://eprint.iacr.org/2018/195}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AmjadKM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Amoussou-Guenou18, author = {Yackolley Amoussou{-}Guenou and Antonella Del Pozzo and Maria Potop{-}Butucaru and Sara {Tucci Piergiovanni}}, title = {Correctness and Fairness of Tendermint-core Blockchains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {574}, year = {2018}, url = {https://eprint.iacr.org/2018/574}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Amoussou-Guenou18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnadaA18, author = {Hiroaki Anada and Seiko Arita}, title = {Witness-Indistinguishable Arguments with {\(\Sigma\)}-Protocols for Bundled Witness Spaces and its Application to Global Identities}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {742}, year = {2018}, url = {https://eprint.iacr.org/2018/742}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnadaA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnanthBJMS18, author = {Prabhanjan Ananth and Saikrishna Badrinarayanan and Aayush Jain and Nathan Manohar and Amit Sahai}, title = {From {FE} Combiners to Secure {MPC} and Back}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {457}, year = {2018}, url = {https://eprint.iacr.org/2018/457}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnanthBJMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnanthCGJ18, author = {Prabhanjan Ananth and Arka Rai Choudhuri and Aarushi Goel and Abhishek Jain}, title = {Round-Optimal Secure Multiparty Computation with Honest Majority}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {572}, year = {2018}, url = {https://eprint.iacr.org/2018/572}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnanthCGJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnanthCGJ18a, author = {Prabhanjan Ananth and Arka Rai Choudhuri and Aarushi Goel and Abhishek Jain}, title = {Two Round Information-Theoretic {MPC} with Malicious Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1078}, year = {2018}, url = {https://eprint.iacr.org/2018/1078}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnanthCGJ18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnanthF18, author = {Prabhanjan Ananth and Xiong Fan}, title = {Attribute Based Encryption for RAMs from {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {273}, year = {2018}, url = {https://eprint.iacr.org/2018/273}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnanthF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnanthIS18, author = {Prabhanjan Ananth and Yuval Ishai and Amit Sahai}, title = {Private Circuits: {A} Modular Approach}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {566}, year = {2018}, url = {https://eprint.iacr.org/2018/566}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnanthIS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnanthJKS18, author = {Prabhanjan Ananth and Aayush Jain and Dakshita Khurana and Amit Sahai}, title = {Indistinguishability Obfuscation Without Multilinear Maps: iO from LWE, Bilinear Maps, and Weak Pseudorandomness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {615}, year = {2018}, url = {https://eprint.iacr.org/2018/615}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnanthJKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnanthL18, author = {Prabhanjan Ananth and Alex Lombardi}, title = {Succinct Garbling Schemes from Functional Encryption through a Local Simulation Paradigm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {759}, year = {2018}, url = {https://eprint.iacr.org/2018/759}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnanthL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnceaumePLPP18, author = {Emmanuelle Anceaume and Antonella Del Pozzo and Romaric Ludinard and Maria Potop{-}Butucaru and Sara {Tucci Piergiovanni}}, title = {Blockchain Abstract Data Type}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {561}, year = {2018}, url = {https://eprint.iacr.org/2018/561}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnceaumePLPP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AndoniMN18, author = {Alexandr Andoni and Tal Malkin and Negev Shekel Nosatzki}, title = {Two Party Distribution Testing: Communication and Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1086}, year = {2018}, url = {https://eprint.iacr.org/2018/1086}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AndoniMN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AndreevaRVV18, author = {Elena Andreeva and Reza Reyhanitabar and Kerem Varici and Damian Viz{\'{a}}r}, title = {Forking a Blockcipher for Authenticated Encryption of Very Short Messages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {916}, year = {2018}, url = {https://eprint.iacr.org/2018/916}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AndreevaRVV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AndreinaBKLM18, author = {S{\'{e}}bastien Andreina and Jens{-}Matthias Bohli and Ghassan O. Karame and Wenting Li and Giorgia Azzurra Marson}, title = {PoTS - {A} Secure Proof of TEE-Stake for Permissionless Blockchains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1135}, year = {2018}, url = {https://eprint.iacr.org/2018/1135}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AndreinaBKLM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnhC18, author = {Nguyen Tuan Anh and Nguyen Bui Cuong}, title = {Evaluating the indistinguishability of the {XTS} mode in the proposed security model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {124}, year = {2018}, url = {http://eprint.iacr.org/2018/124}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnhC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnkeleBF18, author = {Ralph Ankele and Florian B{\"{o}}hl and Simon Friedberger}, title = {MergeMAC: {A} {MAC} for Authentication with Strict Time Constraints and Limited Bandwidth}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {342}, year = {2018}, url = {https://eprint.iacr.org/2018/342}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnkeleBF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnkeleK18, author = {Ralph Ankele and Stefan K{\"{o}}lbl}, title = {Mind the Gap - {A} Closer Look at the Security of Block Ciphers against Differential Cryptanalysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {689}, year = {2018}, url = {https://eprint.iacr.org/2018/689}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnkeleK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnkeleL18, author = {Ralph Ankele and Eik List}, title = {Differential Cryptanalysis of Round-Reduced Sparx-64/128}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {332}, year = {2018}, url = {https://eprint.iacr.org/2018/332}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnkeleL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Anokhin18, author = {Mikhail Anokhin}, title = {Pseudo-Free Families of Computational Universal Algebras}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1178}, year = {2018}, url = {https://eprint.iacr.org/2018/1178}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Anokhin18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AonoNS18, author = {Yoshinori Aono and Phong Q. Nguyen and Yixin Shen}, title = {Quantum Lattice Enumeration and Tweaking Discrete Pruning}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {546}, year = {2018}, url = {https://eprint.iacr.org/2018/546}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AonoNS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AonoNSS18, author = {Yoshinori Aono and Phong Q. Nguyen and Takenobu Seito and Junji Shikata}, title = {Lower Bounds on Lattice Enumeration with Extreme Pruning}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {586}, year = {2018}, url = {https://eprint.iacr.org/2018/586}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AonoNSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ApplebaumA18, author = {Benny Applebaum and Barak Arkis}, title = {Conditional Disclosure of Secrets and d-Uniform Secret Sharing with Constant Information Rate}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1}, year = {2018}, url = {http://eprint.iacr.org/2018/001}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ApplebaumA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ApplebaumBT18, author = {Benny Applebaum and Zvika Brakerski and Rotem Tsabary}, title = {Perfect Secure Computation in Two Rounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {894}, year = {2018}, url = {https://eprint.iacr.org/2018/894}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ApplebaumBT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ApplebaumHMS18, author = {Benny Applebaum and Thomas Holenstein and Manoj Mishra and Ofer Shayevitz}, title = {The Communication Complexity of Private Simultaneous Messages, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {144}, year = {2018}, url = {http://eprint.iacr.org/2018/144}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ApplebaumHMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ApplebaumV18, author = {Benny Applebaum and Prashant Nalini Vasudevan}, title = {Placing Conditional Disclosure of Secrets in the Communication Complexity Universe}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1169}, year = {2018}, url = {https://eprint.iacr.org/2018/1169}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ApplebaumV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AragonBGHZ18, author = {Nicolas Aragon and Olivier Blazy and Philippe Gaborit and Adrien Hauteville and Gilles Z{\'{e}}mor}, title = {Durandal: a rank metric based signature scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1192}, year = {2018}, url = {https://eprint.iacr.org/2018/1192}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AragonBGHZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArakiBFKLOT18, author = {Toshinori Araki and Assi Barak and Jun Furukawa and Marcel Keller and Yehuda Lindell and Kazuma Ohara and Hikaru Tsuchida}, title = {Generalizing the {SPDZ} Compiler For Other Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {762}, year = {2018}, url = {https://eprint.iacr.org/2018/762}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArakiBFKLOT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArcherBLKNPSW18, author = {David W. Archer and Dan Bogdanov and Yehuda Lindell and Liina Kamm and Kurt Nielsen and Jakob Illeborg Pagter and Nigel P. Smart and Rebecca N. Wright}, title = {From Keys to Databases - Real-World Applications of Secure Multi-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {450}, year = {2018}, url = {https://eprint.iacr.org/2018/450}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArcherBLKNPSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArribasNR18, author = {Victor Arribas and Svetla Nikova and Vincent Rijmen}, title = {Guards in Action: First-Order {SCA} Secure Implementations of Ketje without Additional Randomness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {806}, year = {2018}, url = {https://eprint.iacr.org/2018/806}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArribasNR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AsayagCGLRTY18, author = {Avi Asayag and Gad Cohen and Ido Grayevsky and Maya Leshkowitz and Ori Rottenstreich and Ronen Tamari and David Yakira}, title = {Helix: {A} Scalable and Fair Consensus Algorithm Resistant to Ordering Manipulation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {863}, year = {2018}, url = {https://eprint.iacr.org/2018/863}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AsayagCGLRTY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AsharovEKP18, author = {Gilad Asharov and Naomi Ephraim and Ilan Komargodski and Rafael Pass}, title = {On the Complexity of Compressing Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {552}, year = {2018}, url = {https://eprint.iacr.org/2018/552}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AsharovEKP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AsharovKLNS18, author = {Gilad Asharov and Ilan Komargodski and Wei{-}Kai Lin and Kartik Nayak and Elaine Shi}, title = {OptORAMa: Optimal Oblivious {RAM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {892}, year = {2018}, url = {https://eprint.iacr.org/2018/892}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AsharovKLNS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AsharovSS18, author = {Gilad Asharov and Gil Segev and Ido Shahaf}, title = {Tight Tradeoffs in Searchable Symmetric Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {507}, year = {2018}, url = {https://eprint.iacr.org/2018/507}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AsharovSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AshokkumarRVM18, author = {C. Ashokkumar and Bholanath Roy and M. Bhargav Sri Venkatesh and Bernard L. Menezes}, title = {"S-Box" Implementation of {AES} is {NOT} side-channel resistant}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1002}, year = {2018}, url = {https://eprint.iacr.org/2018/1002}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AshokkumarRVM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AshurD18, author = {Tomer Ashur and Siemen Dhooghe}, title = {MARVELlous: a STARK-Friendly Family of Cryptographic Primitives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1098}, year = {2018}, url = {https://eprint.iacr.org/2018/1098}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AshurD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AshurELLMRSV18, author = {Tomer Ashur and Maria Eichlseder and Martin M. Lauridsen and Ga{\"{e}}tan Leurent and Brice Minaud and Yann Rotella and Yu Sasaki and Beno{\^{\i}}t Viguier}, title = {Cryptanalysis of {MORUS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {464}, year = {2018}, url = {https://eprint.iacr.org/2018/464}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AshurELLMRSV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AshurP18, author = {Tomer Ashur and Raluca Posteuca}, title = {On linear hulls in one round of {DES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {635}, year = {2018}, url = {https://eprint.iacr.org/2018/635}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AshurP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AshurP18a, author = {Tomer Ashur and Raluca Posteuca}, title = {Cryptanalysis of the Full {DES} and the Full 3DES Using a New Linear Property}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1219}, year = {2018}, url = {https://eprint.iacr.org/2018/1219}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AshurP18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseFNV18, author = {Giuseppe Ateniese and Danilo Francati and David Nu{\~{n}}ez and Daniele Venturi}, title = {Match Me if You Can: Matchmaking Encryption and its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1094}, year = {2018}, url = {https://eprint.iacr.org/2018/1094}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseFNV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Attrapadung0N0Y18, author = {Nuttapong Attrapadung and Takahiro Matsuda and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, title = {Constrained PRFs for {NC1} in Traditional Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {154}, year = {2018}, url = {http://eprint.iacr.org/2018/154}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Attrapadung0N0Y18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AttrapadungMNYY18, author = {Nuttapong Attrapadung and Takahiro Matsuda and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, title = {Adaptively Single-Key Secure Constrained PRFs for {NC1}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1000}, year = {2018}, url = {https://eprint.iacr.org/2018/1000}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AttrapadungMNYY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtzeiBCLZ18, author = {Nicola Atzei and Massimo Bartoletti and Tiziana Cimoli and Stefano Lande and Roberto Zunino}, title = {SoK: unraveling Bitcoin smart contracts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {192}, year = {2018}, url = {http://eprint.iacr.org/2018/192}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtzeiBCLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AuerbachBK18, author = {Benedikt Auerbach and Mihir Bellare and Eike Kiltz}, title = {Public-Key Encryption Resistant to Parameter Subversion and its Realization from Efficiently-Embeddable Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {23}, year = {2018}, url = {http://eprint.iacr.org/2018/023}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AuerbachBK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AuerbachKPS18, author = {Benedikt Auerbach and Eike Kiltz and Bertram Poettering and Stefan Schoenen}, title = {Lossy Trapdoor Permutations with Improved Lossiness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1183}, year = {2018}, url = {https://eprint.iacr.org/2018/1183}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AuerbachKPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AuerbachP18, author = {Benedikt Auerbach and Bertram Poettering}, title = {Hashing solutions instead of generating problems: On the interactive certification of {RSA} moduli}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {13}, year = {2018}, url = {http://eprint.iacr.org/2018/013}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AuerbachP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BabuT18, author = {Arun Babu Puthuparambil and Jithin Jose Thomas}, title = {Freestyle, a randomized version of ChaCha for resisting offline brute-force and dictionary attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1127}, year = {2018}, url = {https://eprint.iacr.org/2018/1127}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BabuT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackendalBSS18, author = {Matilda Backendal and Mihir Bellare and Jessica Sorrell and Jiahao Sun}, title = {The Fiat-Shamir Zoo: Relating the Security of Different Signature Variants}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {775}, year = {2018}, url = {https://eprint.iacr.org/2018/775}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackendalBSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesHS18, author = {Michael Backes and Lucjan Hanzlik and Jonas Schneider}, title = {Membership Privacy for Fully Dynamic Group Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {641}, year = {2018}, url = {https://eprint.iacr.org/2018/641}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesHS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadawiCLMJTNAC18, author = {Ahmad Al Badawi and Jin Chao and Jie Lin and Chan Fook Mun and Sim Jun Jie and Benjamin Hong Meng Tan and Xiao Nan and Khin Mi Mi Aung and Vijay Ramaseshan Chandrasekhar}, title = {The AlexNet Moment for Homomorphic Encryption: HCNN, the First Homomorphic {CNN} on Encrypted Data with GPUs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1056}, year = {2018}, url = {https://eprint.iacr.org/2018/1056}, timestamp = {Sun, 30 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadawiCLMJTNAC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadawiPAVR18, author = {Ahmad Al Badawi and Yuriy Polyakov and Khin Mi Mi Aung and Bharadwaj Veeravalli and Kurt Rohloff}, title = {Implementation and Performance Evaluation of {RNS} Variants of the {BFV} Homomorphic Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {589}, year = {2018}, url = {https://eprint.iacr.org/2018/589}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadawiPAVR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadertscherBM18, author = {Christian Badertscher and Fabio Banfi and Ueli Maurer}, title = {A Constructive Perspective on Signcryption Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {50}, year = {2018}, url = {http://eprint.iacr.org/2018/050}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadertscherBM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadertscherGKRZ18, author = {Christian Badertscher and Peter Gazi and Aggelos Kiayias and Alexander Russell and Vassilis Zikas}, title = {Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {378}, year = {2018}, url = {https://eprint.iacr.org/2018/378}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadertscherGKRZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadertscherGMTZ18, author = {Christian Badertscher and Juan A. Garay and Ueli Maurer and Daniel Tschudi and Vassilis Zikas}, title = {But Why does it Work? {A} Rational Protocol Design Treatment of Bitcoin}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {138}, year = {2018}, url = {http://eprint.iacr.org/2018/138}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadertscherGMTZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadertscherMT18, author = {Christian Badertscher and Ueli Maurer and Bj{\"{o}}rn Tackmann}, title = {On Composable Security for Digital Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {15}, year = {2018}, url = {http://eprint.iacr.org/2018/015}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadertscherMT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayananF18, author = {Saikrishna Badrinarayanan and Rex Fernando and Venkata Koppula and Amit Sahai and Brent Waters}, title = {Output Compression, MPC, and iO for Turing Machines}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {866}, year = {2018}, url = {https://eprint.iacr.org/2018/866}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayananF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayananJ18, author = {Saikrishna Badrinarayanan and Aayush Jain and Nathan Manohar and Amit Sahai}, title = {Secure {MPC:} Laziness Leads to {GOD}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {580}, year = {2018}, url = {https://eprint.iacr.org/2018/580}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayananJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayananJ18a, author = {Saikrishna Badrinarayanan and Abhishek Jain and Rafail Ostrovsky and Ivan Visconti}, title = {Non-Interactive Secure Computation from One-Way Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1020}, year = {2018}, url = {https://eprint.iacr.org/2018/1020}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayananJ18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayananK18, author = {Saikrishna Badrinarayanan and Dakshita Khurana and Amit Sahai and Brent Waters}, title = {Upgrading to Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {281}, year = {2018}, url = {https://eprint.iacr.org/2018/281}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayananK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayananS18, author = {Saikrishna Badrinarayanan and Akshayaram Srinivasan}, title = {Revisiting Non-Malleable Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1144}, year = {2018}, url = {https://eprint.iacr.org/2018/1144}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayananS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaekSKC18, author = {Joonsang Baek and Willy Susilo and Jongkil Kim and Yang{-}Wai Chow}, title = {Subversion in Practice: How to Efficiently Undermine Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1201}, year = {2018}, url = {https://eprint.iacr.org/2018/1201}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaekSKC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaenaCEKV18, author = {John Baena and Daniel Cabarcas and Daniel E. Escudero and Karan Khathuria and Javier A. Verbel}, title = {Rank Analysis of Cubic Multivariate Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {110}, year = {2018}, url = {http://eprint.iacr.org/2018/110}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaenaCEKV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BagariaKTFV18, author = {Vivek Kumar Bagaria and Sreeram Kannan and David Tse and Giulia Fanti and Pramod Viswanath}, title = {Deconstructing the Blockchain to Approach Physical Limits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {992}, year = {2018}, url = {https://eprint.iacr.org/2018/992}, timestamp = {Wed, 20 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BagariaKTFV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BagherzadehA18, author = {Elnaz Bagherzadeh and Zahra Ahmadian}, title = {MILP-Based Automatic Differential Searches for {LEA} and {HIGHT}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {948}, year = {2018}, url = {https://eprint.iacr.org/2018/948}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BagherzadehA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaiCFW18, author = {Yanan Bai and Jingwei Chen and Yong Feng and Wenyuan Wu}, title = {Integer Matrices Homomorphic Encryption and Its application}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1025}, year = {2018}, url = {https://eprint.iacr.org/2018/1025}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaiCFW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaiSW18, author = {Shi Bai and Damien Stehl{\'{e}} and Weiqiang Wen}, title = {Measuring, simulating and exploiting the head concavity phenomenon in {BKZ}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {856}, year = {2018}, url = {https://eprint.iacr.org/2018/856}, timestamp = {Tue, 30 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaiSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaiZWXWK18, author = {Qianlan Bai and Xinyan Zhou and Xing Wang and Yuedong Xu and Xin Wang and Qingsheng Kong}, title = {A Deep Dive into Blockchain Selfish Mining}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1084}, year = {2018}, url = {https://eprint.iacr.org/2018/1084}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaiZWXWK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BajpaiK18, author = {Abhishek Bajpai and S. V. Kulgod}, title = {{FPGA} Cluster based high performance Cryptanalysis framework}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {656}, year = {2018}, url = {https://eprint.iacr.org/2018/656}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BajpaiK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaksiBBKP18, author = {Anubhab Baksi and Shivam Bhasin and Jakub Breier and Mustafa Khairallah and Thomas Peyrin}, title = {Protecting Block Ciphers against Differential Fault Attacks without Re-keying (Extended Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {85}, year = {2018}, url = {http://eprint.iacr.org/2018/085}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaksiBBKP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaldimtsiCY18, author = {Foteini Baldimtsi and Ran Canetti and Sophia Yakoubov}, title = {Universally Composable Accumulators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1241}, year = {2018}, url = {https://eprint.iacr.org/2018/1241}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaldimtsiCY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaldimtsiGRS18, author = {Foteini Baldimtsi and Sharon Goldberg and Leonid Reyzin and Omar Sagga}, title = {Certifying {RSA} Public Keys with an Efficient {NIZK}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {57}, year = {2018}, url = {http://eprint.iacr.org/2018/057}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaldimtsiGRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BallDGMT18, author = {Marshall Ball and Dana Dachman{-}Soled and Siyao Guo and Tal Malkin and Li{-}Yang Tan}, title = {Non-Malleable Codes for Small-Depth Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {207}, year = {2018}, url = {http://eprint.iacr.org/2018/207}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BallDGMT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BallDKLM18, author = {Marshall Ball and Dana Dachman{-}Soled and Mukul Kulkarni and Huijia Lin and Tal Malkin}, title = {Non-Malleable Codes Against Bounded Polynomial Time Tampering}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1015}, year = {2018}, url = {https://eprint.iacr.org/2018/1015}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BallDKLM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BallRSV18, author = {Marshall Ball and Alon Rosen and Manuel Sabin and Prashant Nalini Vasudevan}, title = {Proofs of Work from Worst-Case Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {559}, year = {2018}, url = {https://eprint.iacr.org/2018/559}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BallRSV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BanaCE18, author = {Gergei Bana and Rohit Chadha and Ajay Kumar Eeralla}, title = {Formal Analysis of Vote Privacy using Computationally Complete Symbolic Attacker}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {624}, year = {2018}, url = {https://eprint.iacr.org/2018/624}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BanaCE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BanegasBBCDGGHK18, author = {Gustavo Banegas and Paulo S. L. M. Barreto and Brice Odilon Boidje and Pierre{-}Louis Cayrel and Gilbert Ndollane Dione and Kris Gaj and Cheikh Thiecoumba Gueye and Richard Haeussler and Jean Belo Klamti and Ousmane Ndiaye and Duc Tri Nguyen and Edoardo Persichetti and Jefferson E. Ricardini}, title = {{DAGS:} Reloaded Revisiting Dyadic Key Encapsulation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1203}, year = {2018}, url = {https://eprint.iacr.org/2018/1203}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BanegasBBCDGGHK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BanegasBPS18, author = {Gustavo Banegas and Paulo S. L. M. Barreto and Edoardo Persichetti and Paolo Santini}, title = {Designing Efficient Dyadic Operations for Cryptographic Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {650}, year = {2018}, url = {https://eprint.iacr.org/2018/650}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BanegasBPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BanegasCP18, author = {Gustavo Banegas and Ricardo Felipe Cust{\'{o}}dio and Daniel Panario}, title = {A new class of irreducible pentanomials for polynomial based multipliers in binary fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {554}, year = {2018}, url = {https://eprint.iacr.org/2018/554}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BanegasCP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BangaloreCP18, author = {Laasya Bangalore and Ashish Choudhury and Arpita Patra}, title = {Almost-Surely Terminating Asynchronous Byzantine Agreement Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {394}, year = {2018}, url = {https://eprint.iacr.org/2018/394}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BangaloreCP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BanikRV18, author = {Subhadeep Banik and Francesco Regazzoni and Serge Vaudenay}, title = {Lightweight Circuits with Shift and Swap}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1114}, year = {2018}, url = {https://eprint.iacr.org/2018/1114}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BanikRV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BansarkhaniM18, author = {Rachid El Bansarkhani and Rafael Misoczki}, title = {G-Merkle: {A} Hash-Based Group Signature Scheme From Standard Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {274}, year = {2018}, url = {https://eprint.iacr.org/2018/274}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BansarkhaniM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BansodPP18, author = {Gaurav Bansod and Abhijit Patil and Narayan Pisharoty}, title = {{GRANULE:} An Ultra lightweight cipher design for embedded security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {600}, year = {2018}, url = {https://eprint.iacr.org/2018/600}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BansodPP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaoGW18, author = {Zhenzhen Bao and Jian Guo and Lei Wang}, title = {Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {374}, year = {2018}, url = {https://eprint.iacr.org/2018/374}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaoGW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bar-OnDKRS18, author = {Achiya Bar{-}On and Orr Dunkelman and Nathan Keller and Eyal Ronen and Adi Shamir}, title = {Improved Key Recovery Attacks on Reduced-Round {AES} with Practical Data and Memory Complexities}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {527}, year = {2018}, url = {https://eprint.iacr.org/2018/527}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bar-OnDKRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarakHJKS18, author = {Boaz Barak and Samuel B. Hopkins and Aayush Jain and Pravesh Kothari and Amit Sahai}, title = {Sum-of-Squares Meets Program Obfuscation, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1237}, year = {2018}, url = {https://eprint.iacr.org/2018/1237}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarakHJKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarakHKL18, author = {Assi Barak and Martin Hirt and Lior Koskas and Yehuda Lindell}, title = {An End-to-End System for Large Scale {P2P} MPC-as-a-Service and Low-Bandwidth {MPC} for Weak Participants}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {751}, year = {2018}, url = {https://eprint.iacr.org/2018/751}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarakHKL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarbosaF18, author = {Manuel Barbosa and Pooya Farshim}, title = {Indifferentiable Authenticated Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {547}, year = {2018}, url = {https://eprint.iacr.org/2018/547}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarbosaF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarcauP18, author = {Mugurel Barcau and Vicentiu Pasol}, title = {Ring Homomorphic Encryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {583}, year = {2018}, url = {https://eprint.iacr.org/2018/583}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarcauP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarcauP18a, author = {Mugurel Barcau and Vicentiu Pasol}, title = {Bounded Fully Homomorphic Encryption from Monoid Algebras}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {584}, year = {2018}, url = {https://eprint.iacr.org/2018/584}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarcauP18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarelliC18, author = {Elise Barelli and Alain Couvreur}, title = {An efficient structural attack on {NIST} submission {DAGS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {456}, year = {2018}, url = {https://eprint.iacr.org/2018/456}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarelliC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarretoOB18, author = {Paulo Barreto and Glaucio Oliveira and Waldyr Benits}, title = {Supersingular Isogeny Oblivious Transfer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {459}, year = {2018}, url = {https://eprint.iacr.org/2018/459}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarretoOB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarretoRSP18, author = {Paulo S. L. M. Barreto and Jefferson E. Ricardini and Marcos A. Simpl{\'{\i}}cio Jr. and Harsh Kupwade Patil}, title = {qSCMS: Post-quantum certificate provisioning process for {V2X}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1247}, year = {2018}, url = {https://eprint.iacr.org/2018/1247}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarretoRSP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BartheBDFGSS18, author = {Gilles Barthe and Sonia Bela{\"{\i}}d and Fran{\c{c}}ois Dupressoir and Pierre{-}Alain Fouque and Benjamin Gr{\'{e}}goire and Fran{\c{c}}ois{-}Xavier Standaert and Pierre{-}Yves Strub}, title = {Improved Parallel Mask Refreshing Algorithms: Generic Solutions with Parametrized Non-Interference {\&} Automated Optimizations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {505}, year = {2018}, url = {https://eprint.iacr.org/2018/505}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BartheBDFGSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BartheBEFGRT18, author = {Gilles Barthe and Sonia Bela{\"{\i}}d and Thomas Espitau and Pierre{-}Alain Fouque and Benjamin Gr{\'{e}}goire and M{\'{e}}lissa Rossi and Mehdi Tibouchi}, title = {Masking the {GLP} Lattice-Based Signature Scheme at Any Order}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {381}, year = {2018}, url = {https://eprint.iacr.org/2018/381}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BartheBEFGRT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BartheBFG18, author = {Gilles Barthe and Sonia Bela{\"{\i}}d and Pierre{-}Alain Fouque and Benjamin Gr{\'{e}}goire}, title = {maskVerif: a formal tool for analyzing software and hardware masked implementations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {562}, year = {2018}, url = {https://eprint.iacr.org/2018/562}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BartheBFG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BartheFGGJS18, author = {Gilles Barthe and Xiong Fan and Joshua Gancher and Benjamin Gr{\'{e}}goire and Charlie Jacomme and Elaine Shi}, title = {Symbolic Proofs for Lattice-Based Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {765}, year = {2018}, url = {https://eprint.iacr.org/2018/765}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BartheFGGJS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BartolettiCZ18, author = {Massimo Bartoletti and Tiziana Cimoli and Roberto Zunino}, title = {Fun with Bitcoin smart contracts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {398}, year = {2018}, url = {https://eprint.iacr.org/2018/398}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BartolettiCZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BartolettiZ18, author = {Massimo Bartoletti and Roberto Zunino}, title = {BitML: a calculus for Bitcoin smart contracts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {122}, year = {2018}, url = {http://eprint.iacr.org/2018/122}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BartolettiZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BartolettiZ18a, author = {Massimo Bartoletti and Roberto Zunino}, title = {Verifying liquidity of Bitcoin contracts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1125}, year = {2018}, url = {https://eprint.iacr.org/2018/1125}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BartolettiZ18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BartusekGMZ18, author = {James Bartusek and Jiaxin Guan and Fermi Ma and Mark Zhandry}, title = {Preventing Zeroizing Attacks on {GGH15}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {511}, year = {2018}, url = {https://eprint.iacr.org/2018/511}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BartusekGMZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BartusekLMZ18, author = {James Bartusek and Tancr{\`{e}}de Lepoint and Fermi Ma and Mark Zhandry}, title = {New Techniques for Obfuscating Conjunctions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {936}, year = {2018}, url = {https://eprint.iacr.org/2018/936}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BartusekLMZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BasilakisJ18, author = {Jim Basilakis and Bahman Javadi}, title = {Efficient Parallel Binary Operations on Homomorphic Encrypted Real Numbers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {201}, year = {2018}, url = {http://eprint.iacr.org/2018/201}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BasilakisJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BasuS18, author = {Atanu Basu and Indranil Sengupta}, title = {Secure Cloud Storage Scheme Based On Hybrid Cryptosystem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {287}, year = {2018}, url = {https://eprint.iacr.org/2018/287}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BasuS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BatinaBJP18, author = {Lejla Batina and Shivam Bhasin and Dirmanto Jap and Stjepan Picek}, title = {{CSI} Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {477}, year = {2018}, url = {https://eprint.iacr.org/2018/477}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BatinaBJP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BauerFM18, author = {Balthazar Bauer and Pooya Farshim and Sogol Mazaheri}, title = {Combiners for Backdoored Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {770}, year = {2018}, url = {https://eprint.iacr.org/2018/770}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BauerFM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BauerVW18, author = {Balthazar Bauer and Jevgenijs Vihrovs and Hoeteck Wee}, title = {On the Inner Product Predicate and a Generalization of Matching Vector Families}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {945}, year = {2018}, url = {https://eprint.iacr.org/2018/945}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BauerVW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaumBCPGL18, author = {Carsten Baum and Jonathan Bootle and Andrea Cerulli and Rafa{\"{e}}l Del Pino and Jens Groth and Vadim Lyubashevsky}, title = {Sub-Linear Lattice-Based Zero-Knowledge Arguments for Arithmetic Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {560}, year = {2018}, url = {https://eprint.iacr.org/2018/560}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaumBCPGL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaumDD18, author = {Carsten Baum and Bernardo David and Rafael Dowsley}, title = {Insured {MPC:} Efficient Secure Multiparty Computation with Punishable Abort}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {942}, year = {2018}, url = {https://eprint.iacr.org/2018/942}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaumDD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaumLO18, author = {Carsten Baum and Huang Lin and Sabine Oechsner}, title = {Towards Practical Lattice-Based One-Time Linkable Ring Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {107}, year = {2018}, url = {http://eprint.iacr.org/2018/107}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaumLO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BehniaOYR18, author = {Rouzbeh Behnia and Muslum Ozgur Ozmen and Attila A. Yavuz and Mike Rosulek}, title = {{TACHYON:} Fast Signatures from Compact Knapsack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {873}, year = {2018}, url = {https://eprint.iacr.org/2018/873}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BehniaOYR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeierleBU18, author = {Christof Beierle and Alex Biryukov and Aleksei Udovenko}, title = {On Degree-d Zero-Sum Sets of Full Rank}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1194}, year = {2018}, url = {https://eprint.iacr.org/2018/1194}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeierleBU18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeimelKN18, author = {Amos Beimel and Eyal Kushilevitz and Pnina Nissim}, title = {The Complexity of Multiparty {PSM} Protocols and Related Models}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {148}, year = {2018}, url = {http://eprint.iacr.org/2018/148}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeimelKN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeimelP18, author = {Amos Beimel and Naty Peter}, title = {Optimal Linear Multiparty Conditional Disclosure of Secrets Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {441}, year = {2018}, url = {https://eprint.iacr.org/2018/441}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeimelP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BelaidGR18, author = {Sonia Bela{\"{\i}}d and Dahmun Goudarzi and Matthieu Rivain}, title = {Tight Private Circuits: Achieving Probing Security with the Least Refreshing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {439}, year = {2018}, url = {https://eprint.iacr.org/2018/439}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BelaidGR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareD18, author = {Mihir Bellare and Wei Dai}, title = {Defending Against Key Exfiltration: Efficiency Improvements for Big-Key Cryptography via Large-Alphabet Subkey Prediction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {217}, year = {2018}, url = {http://eprint.iacr.org/2018/217}, timestamp = {Wed, 15 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareJL18, author = {Mihir Bellare and Joseph Jaeger and Julia Len}, title = {Better Than Advertised: Improved Collision-Resistance Guarantees for MD-Based Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {625}, year = {2018}, url = {https://eprint.iacr.org/2018/625}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareJL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellevilleCHC18, author = {Nicolas Belleville and Damien Courouss{\'{e}} and Karine Heydemann and Henri{-}Pierre Charles}, title = {Automated software protection for the masses against side-channel attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1197}, year = {2018}, url = {https://eprint.iacr.org/2018/1197}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellevilleCHC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BemmannBBBDEEHJ18, author = {Kai Bemmann and Johannes Bl{\"{o}}mer and Jan Bobolz and Henrik Br{\"{o}}cher and Denis Diemert and Fabian Eidens and Lukas Eilers and Jan Haltermann and Jakob Juhnke and Burhan Otour and Laurens Porzenheim and Simon Pukrop and Erik Schilling and Michael Schlichtig and Marcel Stienemeier}, title = {Fully-Featured Anonymous Credentials with Reputation System}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {835}, year = {2018}, url = {https://eprint.iacr.org/2018/835}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BemmannBBBDEEHJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ben-SassonBHR18, author = {Eli Ben{-}Sasson and Iddo Bentov and Yinon Horesh and Michael Riabzev}, title = {Scalable, transparent, and post-quantum secure computational integrity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {46}, year = {2018}, url = {http://eprint.iacr.org/2018/046}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ben-SassonBHR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ben-SassonCRSVW18, author = {Eli Ben{-}Sasson and Alessandro Chiesa and Michael Riabzev and Nicholas Spooner and Madars Virza and Nicholas P. Ward}, title = {Aurora: Transparent Succinct Arguments for {R1CS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {828}, year = {2018}, url = {https://eprint.iacr.org/2018/828}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ben-SassonCRSVW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BergerB18, author = {Ben Berger and Zvika Brakerski}, title = {Zero-Knowledge Protocols for Search Problems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {437}, year = {2018}, url = {https://eprint.iacr.org/2018/437}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BergerB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BermanDRV18, author = {Itay Berman and Akshay Degwekar and Ron D. Rothblum and Prashant Nalini Vasudevan}, title = {From Laconic Zero-Knowledge to Public-Key Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {548}, year = {2018}, url = {https://eprint.iacr.org/2018/548}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BermanDRV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernardDM18, author = {Olivier Bernard and Renaud Dubois and Simon Masson}, title = {Efficient four-dimensional {GLV} curve with high security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {305}, year = {2018}, url = {https://eprint.iacr.org/2018/305}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernardDM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BerndtL18, author = {Sebastian Berndt and Maciej Liskiewicz}, title = {On the Gold Standard for Security of Universal Steganography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {106}, year = {2018}, url = {http://eprint.iacr.org/2018/106}, timestamp = {Wed, 28 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BerndtL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernhardCGTW18, author = {David Bernhard and V{\'{e}}ronique Cortier and Pierrick Gaudry and Mathieu Turuani and Bogdan Warinschi}, title = {Verifiability Analysis of CHVote}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1052}, year = {2018}, url = {https://eprint.iacr.org/2018/1052}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernhardCGTW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinLMP18, author = {Daniel J. Bernstein and Tanja Lange and Chloe Martindale and Lorenz Panny}, title = {Quantum circuits for the {CSIDH:} optimizing quantum evaluation of isogenies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1059}, year = {2018}, url = {https://eprint.iacr.org/2018/1059}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinLMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinP18, author = {Daniel J. Bernstein and Edoardo Persichetti}, title = {Towards {KEM} Unification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {526}, year = {2018}, url = {https://eprint.iacr.org/2018/526}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BertiPP18, author = {Francesco Berti and Olivier Pereira and Thomas Peters}, title = {Reconsidering Generic Composition: the Tag-then-Encrypt case}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {991}, year = {2018}, url = {https://eprint.iacr.org/2018/991}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BertiPP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bertoni0M18, author = {Guido Marco Bertoni and Lorenzo Grassi and Filippo Melzani}, title = {Simulations of Optical Emissions for Attacking {AES} and Masked {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {291}, year = {2018}, url = {https://eprint.iacr.org/2018/291}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bertoni0M18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BertoniDHPAK18, author = {Guido Bertoni and Joan Daemen and Seth Hoffert and Micha{\"{e}}l Peeters and Gilles Van Assche and Ronny Van Keer}, title = {The authenticated encryption schemes Kravatte-SANE and Kravatte-SANSE}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1012}, year = {2018}, url = {https://eprint.iacr.org/2018/1012}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BertoniDHPAK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BettaleCZ18, author = {Luk Bettale and Jean{-}S{\'{e}}bastien Coron and Rina Zeitoun}, title = {Improved High-Order Conversion From Boolean to Arithmetic Masking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {328}, year = {2018}, url = {https://eprint.iacr.org/2018/328}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BettaleCZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeullensB18, author = {Ward Beullens and Simon R. Blackburn}, title = {Practical attacks against the Walnut digital signature scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {318}, year = {2018}, url = {https://eprint.iacr.org/2018/318}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeullensB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeullensPS18, author = {Ward Beullens and Bart Preneel and Alan Szepieniec}, title = {Public Key Compression for Constrained Linear Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {670}, year = {2018}, url = {https://eprint.iacr.org/2018/670}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeullensPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeunardeauCFGNV18, author = {Marc Beunardeau and Aisling Connolly and Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and David Naccache and Damien Vergnaud}, title = {Reusing Nonces in Schnorr Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {69}, year = {2018}, url = {http://eprint.iacr.org/2018/069}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeunardeauCFGNV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Beyne18, author = {Tim Beyne}, title = {Block Cipher Invariants as Eigenvectors of Correlation Matrices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {763}, year = {2018}, url = {https://eprint.iacr.org/2018/763}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Beyne18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhattacharyaGLR18, author = {Sauvik Bhattacharya and {\'{O}}scar Garc{\'{\i}}a{-}Morch{\'{o}}n and Thijs Laarhoven and Ronald Rietman and Markku{-}Juhani O. Saarinen and Ludo Tolhuizen and Zhenfei Zhang}, title = {Round5: Compact and Fast Post-Quantum Public-Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {725}, year = {2018}, url = {https://eprint.iacr.org/2018/725}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BhattacharyaGLR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhattacharyaN18, author = {Srimanta Bhattacharya and Mridul Nandi}, title = {Full Indifferentiable Security of the Xor of Two or More Random Permutations Using the {\(\chi\)}\({}^{\mbox{2}}\) Method}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {169}, year = {2018}, url = {http://eprint.iacr.org/2018/169}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BhattacharyaN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhaumikLN18, author = {Ritam Bhaumik and Eik List and Mridul Nandi}, title = {{ZCZ} - Achieving n-bit {SPRP} Security with a Minimal Number of Tweakable-block-cipher Calls}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {819}, year = {2018}, url = {https://eprint.iacr.org/2018/819}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BhaumikLN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BiDLZW18, author = {Wenquan Bi and Xiaoyang Dong and Zheng Li and Rui Zong and Xiaoyun Wang}, title = {MILP-aided Cube-attack-like Cryptanalysis on Keccak Keyed Modes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {75}, year = {2018}, url = {http://eprint.iacr.org/2018/075}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BiDLZW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BicerBK18, author = {Osman Bi{\c{c}}er and Muhammed Ali Bing{\"{o}}l and Mehmet Sabir Kiraz}, title = {Highly Efficient and Reusable Private Function Evaluation with Linear Complexity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {515}, year = {2018}, url = {https://eprint.iacr.org/2018/515}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BicerBK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BindelBFGS18, author = {Nina Bindel and Jacqueline Brendel and Marc Fischlin and Brian Goncalves and Douglas Stebila}, title = {Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {903}, year = {2018}, url = {https://eprint.iacr.org/2018/903}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BindelBFGS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BiryukovU18, author = {Alex Biryukov and Aleksei Udovenko}, title = {Attacks and Countermeasures for White-box Designs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {49}, year = {2018}, url = {http://eprint.iacr.org/2018/049}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BiryukovU18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BishopKMP0S18, author = {Allison Bishop and Lucas Kowalczyk and Tal Malkin and Valerio Pastro and Mariana Raykova and Kevin Shi}, title = {A Simple Obfuscation Scheme for Pattern-Matching with Wildcards}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {210}, year = {2018}, url = {http://eprint.iacr.org/2018/210}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BishopKMP0S18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BitanskyL18, author = {Nir Bitansky and Huijia Lin}, title = {One-Message Zero Knowledge and Non-Malleable Commitments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {613}, year = {2018}, url = {https://eprint.iacr.org/2018/613}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BitanskyL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BitanskyP18, author = {Nir Bitansky and Omer Paneth}, title = {Weak Zero-Knowledge Beyond the Black-Box Barrier}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {895}, year = {2018}, url = {https://eprint.iacr.org/2018/895}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BitanskyP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlantonJ18, author = {Marina Blanton and Myoungin Jeong}, title = {Improved Signature Schemes for Secure Multi-Party Computation with Certified Inputs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {736}, year = {2018}, url = {https://eprint.iacr.org/2018/736}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlantonJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlazyGP18, author = {Olivier Blazy and Paul Germouty and Duong Hieu Phan}, title = {Downgradable Identity-based Encryption and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1176}, year = {2018}, url = {https://eprint.iacr.org/2018/1176}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlazyGP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlockGMN18, author = {Alexander R. Block and Divya Gupta and Hemanta K. Maji and Hai H. Nguyen}, title = {Secure Computation using Leaky Correlations (Asymptotically Optimal Constructions)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {372}, year = {2018}, url = {https://eprint.iacr.org/2018/372}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlockGMN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlockMN18, author = {Alexander R. Block and Hemanta K. Maji and Hai H. Nguyen}, title = {Secure Computation with Constant Communication Overhead using Multiplication Embeddings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {395}, year = {2018}, url = {https://eprint.iacr.org/2018/395}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlockMN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Blocki0Z18, author = {Jeremiah Blocki and Ling Ren and Samson Zhou}, title = {Bandwidth-Hard Functions: Reductions and Lower Bounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {221}, year = {2018}, url = {http://eprint.iacr.org/2018/221}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Blocki0Z18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlockiHKLXZ18, author = {Jeremiah Blocki and Benjamin Harsha and Siteng Kang and Seunghoon Lee and Lu Xing and Samson Zhou}, title = {Data-Independent Memory Hard Functions: New Attacks and Stronger Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {944}, year = {2018}, url = {https://eprint.iacr.org/2018/944}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlockiHKLXZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BloemGIKM18, author = {Roderick Bloem and Hannes Gro{\ss} and Rinat Iusupov and Martin Krenn and Stefan Mangard}, title = {Sharing Independence {\&} Relabeling: Efficient Formal Verification of Higher-Order Masking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1031}, year = {2018}, url = {https://eprint.iacr.org/2018/1031}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BloemGIKM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlomerB18, author = {Johannes Bl{\"{o}}mer and Jan Bobolz}, title = {Delegatable Attribute-based Anonymous Credentials from Dynamically Malleable Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {340}, year = {2018}, url = {https://eprint.iacr.org/2018/340}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlomerB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlomerEJ18, author = {Johannes Bl{\"{o}}mer and Fabian Eidens and Jakob Juhnke}, title = {Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {29}, year = {2018}, url = {http://eprint.iacr.org/2018/029}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlomerEJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlomerEJ18a, author = {Johannes Bl{\"{o}}mer and Fabian Eidens and Jakob Juhnke}, title = {Enhanced Security of Attribute-Based Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {874}, year = {2018}, url = {https://eprint.iacr.org/2018/874}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlomerEJ18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BobowskiS18, author = {Adam Bobowski and Marcin Slowik}, title = {Reducing Complexity of Pairing Comparisons using Polynomial Evaluation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {523}, year = {2018}, url = {https://eprint.iacr.org/2018/523}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BobowskiS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BockBMT18, author = {Estuardo Alpirez Bock and Chris Brzuska and Wil Michiels and Alexander Treff}, title = {On the Ineffectiveness of Internal Encodings - Revisiting the {DCA} Attack on White-Box Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {301}, year = {2018}, url = {https://eprint.iacr.org/2018/301}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BockBMT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BogatovKR18, author = {Dmytro Bogatov and George Kollios and Leonid Reyzin}, title = {A Comparative Evaluation of Order-Preserving and Order-Revealing Schemes and Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {953}, year = {2018}, url = {https://eprint.iacr.org/2018/953}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BogatovKR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BogdanovRVW18, author = {Andrey Bogdanov and Matthieu Rivain and Philip S. Vejre and Junwei Wang}, title = {Higher-Order {DCA} against Standard Side-Channel Countermeasures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {869}, year = {2018}, url = {https://eprint.iacr.org/2018/869}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BogdanovRVW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoilovKN18, author = {Dusan Bozilov and Miroslav Knezevic and Ventzislav Nikov}, title = {Optimized Threshold Implementations: Securing Cryptographic Accelerators for Low-Energy and Low-Latency Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {922}, year = {2018}, url = {https://eprint.iacr.org/2018/922}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoilovKN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bolboceanu18, author = {Madalina Bolboceanu}, title = {Relating different Polynomial-LWE problems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1035}, year = {2018}, url = {https://eprint.iacr.org/2018/1035}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bolboceanu18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehBBF18, author = {Dan Boneh and Joseph Bonneau and Benedikt B{\"{u}}nz and Ben Fisch}, title = {Verifiable Delay Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {601}, year = {2018}, url = {https://eprint.iacr.org/2018/601}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehBBF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehBF18, author = {Dan Boneh and Benedikt B{\"{u}}nz and Ben Fisch}, title = {A Survey of Two Verifiable Delay Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {712}, year = {2018}, url = {https://eprint.iacr.org/2018/712}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehBF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehBF18a, author = {Dan Boneh and Benedikt B{\"{u}}nz and Ben Fisch}, title = {Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1188}, year = {2018}, url = {https://eprint.iacr.org/2018/1188}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehBF18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehDN18, author = {Dan Boneh and Manu Drijvers and Gregory Neven}, title = {Compact Multi-Signatures for Smaller Blockchains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {483}, year = {2018}, url = {https://eprint.iacr.org/2018/483}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehDN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehEF18, author = {Dan Boneh and Saba Eskandarian and Ben Fisch}, title = {Post-Quantum Group Signatures from Symmetric Primitives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {261}, year = {2018}, url = {http://eprint.iacr.org/2018/261}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehEF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehGKLSSTZ18, author = {Dan Boneh and Darren B. Glass and Daniel Krashen and Kristin E. Lauter and Shahed Sharif and Alice Silverberg and Mehdi Tibouchi and Mark Zhandry}, title = {Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {665}, year = {2018}, url = {https://eprint.iacr.org/2018/665}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehGKLSSTZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehIPSW18, author = {Dan Boneh and Yuval Ishai and Alain Passel{\`{e}}gue and Amit Sahai and David J. Wu}, title = {Exploring Crypto Dark Matter: New Simple {PRF} Candidates and Their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1218}, year = {2018}, url = {https://eprint.iacr.org/2018/1218}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehIPSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehISW18, author = {Dan Boneh and Yuval Ishai and Amit Sahai and David J. Wu}, title = {Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {133}, year = {2018}, url = {http://eprint.iacr.org/2018/133}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehISW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonnetainN18, author = {Xavier Bonnetain and Mar{\'{\i}}a Naya{-}Plasencia}, title = {Hidden Shift Quantum Cryptanalysis and Implications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {432}, year = {2018}, url = {https://eprint.iacr.org/2018/432}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonnetainN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonnetainNS18, author = {Xavier Bonnetain and Mar{\'{\i}}a Naya{-}Plasencia and Andr{\'{e}} Schrottenloher}, title = {On Quantum Slide Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1067}, year = {2018}, url = {https://eprint.iacr.org/2018/1067}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonnetainNS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonnetainS18, author = {Xavier Bonnetain and Andr{\'{e}} Schrottenloher}, title = {Quantum Security Analysis of {CSIDH} and Ordinary Isogeny-based Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {537}, year = {2018}, url = {https://eprint.iacr.org/2018/537}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonnetainS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonteV18, author = {Charlotte Bonte and Frederik Vercauteren}, title = {Privacy-Preserving Logistic Regression Training}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {233}, year = {2018}, url = {http://eprint.iacr.org/2018/233}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonteV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BootlandCIV18, author = {Carl Bootland and Wouter Castryck and Ilia Iliashenko and Frederik Vercauteren}, title = {Efficiently Processing Complex-Valued Data in Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {785}, year = {2018}, url = {https://eprint.iacr.org/2018/785}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BootlandCIV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BootlandCV18, author = {Carl Bootland and Wouter Castryck and Frederik Vercauteren}, title = {On the Security of the Multivariate Ring Learning with Errors Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {966}, year = {2018}, url = {https://eprint.iacr.org/2018/966}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BootlandCV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BootleCGJM18, author = {Jonathan Bootle and Andrea Cerulli and Jens Groth and Sune K. Jakobsen and Mary Maller}, title = {Nearly Linear-Time Zero-Knowledge Proofs for Correct Program Execution}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {380}, year = {2018}, url = {https://eprint.iacr.org/2018/380}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BootleCGJM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BootleDEFT18, author = {Jonathan Bootle and Claire Delaplace and Thomas Espitau and Pierre{-}Alain Fouque and Mehdi Tibouchi}, title = {{LWE} Without Modular Reduction and Improved Side-Channel Attacks Against {BLISS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {822}, year = {2018}, url = {https://eprint.iacr.org/2018/822}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BootleDEFT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BootleG18, author = {Jonathan Bootle and Jens Groth}, title = {Efficient Batch Zero-Knowledge Arguments for Low Degree Polynomials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {45}, year = {2018}, url = {http://eprint.iacr.org/2018/045}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BootleG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BorgaonkarHPS18, author = {Ravishankar Borgaonkar and Lucca Hirschi and Shinjo Park and Altaf Shaik}, title = {New Privacy Threat on 3G, 4G, and Upcoming 5G {AKA} Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1175}, year = {2018}, url = {https://eprint.iacr.org/2018/1175}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BorgaonkarHPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BorgesDFLOP18, author = {Guilherme Borges and Henrique Jo{\~{a}}o L. Domingos and Bernardo Ferreira and Jo{\~{a}}o Leit{\~{a}}o and Tiago Oliveira and Bernardo Portela}, title = {{BISEN:} Efficient Boolean Searchable Symmetric Encryption with Verifiability and Minimal Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {588}, year = {2018}, url = {https://eprint.iacr.org/2018/588}, timestamp = {Fri, 24 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BorgesDFLOP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosF18, author = {Joppe W. Bos and Simon Friedberger}, title = {Arithmetic Considerations for Isogeny Based Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {376}, year = {2018}, url = {https://eprint.iacr.org/2018/376}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosF18a, author = {Joppe W. Bos and Simon Friedberger}, title = {Faster Modular Arithmetic For Isogeny Based Crypto on Embedded Devices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {792}, year = {2018}, url = {https://eprint.iacr.org/2018/792}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosF18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosFMOS18, author = {Joppe W. Bos and Simon Friedberger and Marco Martinoli and Elisabeth Oswald and Martijn Stam}, title = {Assessing the Feasibility of Single Trace Power Analysis of Frodo}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {687}, year = {2018}, url = {https://eprint.iacr.org/2018/687}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosFMOS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosFMOS18a, author = {Joppe W. Bos and Simon Friedberger and Marco Martinoli and Elisabeth Oswald and Martijn Stam}, title = {Fly, you fool! Faster Frodo for the {ARM} Cortex-M4}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1116}, year = {2018}, url = {https://eprint.iacr.org/2018/1116}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosFMOS18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoschiniCN18, author = {Cecilia Boschini and Jan Camenisch and Gregory Neven}, title = {Floppy-Sized Group Signatures from Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {453}, year = {2018}, url = {https://eprint.iacr.org/2018/453}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoschiniCN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoseHT18, author = {Priyanka Bose and Viet Tung Hoang and Stefano Tessaro}, title = {Revisiting {AES-GCM-SIV:} Multi-user Security, Faster Key Derivation, and Better Bounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {136}, year = {2018}, url = {http://eprint.iacr.org/2018/136}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoseHT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoshrooyehKO18, author = {Sanaz Taheri Boshrooyeh and Alptekin K{\"{u}}p{\c{c}}{\"{u}} and {\"{O}}znur {\"{O}}zkasap}, title = {{PPAD:} Privacy Preserving Group-Based ADvertising in Online Social Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {323}, year = {2018}, url = {https://eprint.iacr.org/2018/323}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoshrooyehKO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoumanV18, author = {Niek J. Bouman and Niels de Vreede}, title = {New Protocols for Secure Linear Algebra: Pivoting-Free Elimination and Fast Block-Recursive Matrix Decomposition}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {703}, year = {2018}, url = {https://eprint.iacr.org/2018/703}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoumanV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BouraCJS18, author = {Christina Boura and Anne Canteaut and J{\'{e}}r{\'{e}}my Jean and Valentin Suder}, title = {Two Notions of Differential Equivalence on Sboxes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {617}, year = {2018}, url = {https://eprint.iacr.org/2018/617}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BouraCJS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BouraGG18, author = {Christina Boura and Nicolas Gama and Mariya Georgieva}, title = {Chimera: a unified framework for B/FV, {TFHE} and {HEAAN} fully homomorphic encryption and predictions for deep learning}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {758}, year = {2018}, url = {https://eprint.iacr.org/2018/758}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BouraGG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoureanuA18, author = {Ioana Boureanu and Anda Anda}, title = {Another Look at Relay and Distance-based Attacks in Contactless Payments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {402}, year = {2018}, url = {https://eprint.iacr.org/2018/402}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoureanuA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BouvierI18, author = {Cyril Bouvier and Laurent Imbert}, title = {Faster cofactorization with {ECM} using mixed representations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {669}, year = {2018}, url = {https://eprint.iacr.org/2018/669}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BouvierI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoweCGMMW18, author = {Sean Bowe and Alessandro Chiesa and Matthew Green and Ian Miers and Pratyush Mishra and Howard Wu}, title = {Zexe: Enabling Decentralized Private Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {962}, year = {2018}, url = {https://eprint.iacr.org/2018/962}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoweCGMMW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoweG18, author = {Sean Bowe and Ariel Gabizon}, title = {Making Groth's zk-SNARK Simulation Extractable in the Random Oracle Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {187}, year = {2018}, url = {http://eprint.iacr.org/2018/187}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoweG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoydDGJ18, author = {Colin Boyd and Gareth T. Davies and Kristian Gj{\o}steen and Yao Jiang}, title = {Offline Assisted Group Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {114}, year = {2018}, url = {http://eprint.iacr.org/2018/114}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoydDGJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoydDGRT18, author = {Colin Boyd and Gareth T. Davies and Kristian Gj{\o}steen and H{\aa}vard Raddum and Mohsen Toorani}, title = {Definitions for Plaintext-Existence Hiding in Cloud Storage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {748}, year = {2018}, url = {https://eprint.iacr.org/2018/748}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoydDGRT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyleCDH18, author = {Elette Boyle and Ran Cohen and Deepesh Data and Pavel Hub{\'{a}}cek}, title = {Must the Communication Graph of {MPC} Protocols be an Expander?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {540}, year = {2018}, url = {https://eprint.iacr.org/2018/540}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyleCDH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyleCGIO18, author = {Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai and Michele Orr{\`{u}}}, title = {Homomorphic Secret Sharing: Optimizations and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {419}, year = {2018}, url = {https://eprint.iacr.org/2018/419}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyleCGIO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyleGI18, author = {Elette Boyle and Niv Gilboa and Yuval Ishai}, title = {Function Secret Sharing: Improvements and Extensions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {707}, year = {2018}, url = {https://eprint.iacr.org/2018/707}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyleGI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyleIP18, author = {Elette Boyle and Yuval Ishai and Antigoni Polychroniadou}, title = {Limits of Practical Sublinear Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {571}, year = {2018}, url = {https://eprint.iacr.org/2018/571}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyleIP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyleLV18, author = {Elette Boyle and Rio LaVigne and Vinod Vaikuntanathan}, title = {Adversarially Robust Property Preserving Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1158}, year = {2018}, url = {https://eprint.iacr.org/2018/1158}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyleLV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Boztas18, author = {Serdar Boztas}, title = {On Renyi Entropies and their Applications to Guessing Attacks in Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {455}, year = {2018}, url = {https://eprint.iacr.org/2018/455}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Boztas18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Brakerski18, author = {Zvika Brakerski}, title = {Quantum {FHE} (Almost) As Secure as Classical}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {338}, year = {2018}, url = {https://eprint.iacr.org/2018/338}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Brakerski18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiD18, author = {Zvika Brakerski and Nico D{\"{o}}ttling}, title = {Two-Message Statistical Sender-Private {OT} from {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {530}, year = {2018}, url = {https://eprint.iacr.org/2018/530}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiK18, author = {Zvika Brakerski and Yael Tauman Kalai}, title = {Monotone Batch NP-Delegation with Applications to Access Control}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {375}, year = {2018}, url = {https://eprint.iacr.org/2018/375}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiLVW18, author = {Zvika Brakerski and Vadim Lyubashevsky and Vinod Vaikuntanathan and Daniel Wichs}, title = {Worst-Case Hardness for {LPN} and Cryptographic Hashing via Code Smoothing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {279}, year = {2018}, url = {https://eprint.iacr.org/2018/279}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiLVW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiP18, author = {Zvika Brakerski and Renen Perlman}, title = {Order-LWE and the Hardness of Ring-LWE with Entropic Secrets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {494}, year = {2018}, url = {https://eprint.iacr.org/2018/494}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrancoDGM18, author = {Pedro Branco and Jintai Ding and Manuel Goul{\~{a}}o and Paulo Mateus}, title = {Universally Composable Oblivious Transfer Protocol based on the {RLWE} Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1155}, year = {2018}, url = {https://eprint.iacr.org/2018/1155}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrancoDGM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BreierHL18, author = {Jakub Breier and Xiaolu Hou and Yang Liu}, title = {Fault Resilient Encoding Schemes in Software: How Far Can We Go?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {218}, year = {2018}, url = {http://eprint.iacr.org/2018/218}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BreierHL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BreierJHB18, author = {Jakub Breier and Dirmanto Jap and Xiaolu Hou and Shivam Bhasin}, title = {On Side-Channel Vulnerabilities of Bit Permutations: Key Recovery and Reverse Engineering}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {219}, year = {2018}, url = {http://eprint.iacr.org/2018/219}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BreierJHB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Breitner18, author = {Joachim Breitner}, title = {More on sliding right}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1163}, year = {2018}, url = {https://eprint.iacr.org/2018/1163}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Breitner18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BreunesseKMS18, author = {Cees{-}Bart Breunesse and Ilya Kizhvatov and Ruben Muijrers and Albert Spruyt}, title = {Towards Fully Automated Analysis of Whiteboxes: Perfect Dimensionality Reduction for Perfect Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {95}, year = {2018}, url = {http://eprint.iacr.org/2018/095}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BreunesseKMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BroadbentGZ18, author = {Anne Broadbent and Sevag Gharibian and Hong{-}Sheng Zhou}, title = {Towards Quantum One-Time Memories from Stateless Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {960}, year = {2018}, url = {https://eprint.iacr.org/2018/960}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BroadbentGZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BroadnaxKMMMN18, author = {Brandon Broadnax and Alexander Koch and Jeremias Mechler and Tobias M{\"{u}}ller and J{\"{o}}rn M{\"{u}}ller{-}Quade and Matthias Nagel}, title = {Fortified Universal Composability: Taking Advantage of Simple Secure Hardware Modules}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {519}, year = {2018}, url = {https://eprint.iacr.org/2018/519}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BroadnaxKMMMN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Brown18, author = {Daniel R. L. Brown}, title = {{ECC} mod 891+5}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {121}, year = {2018}, url = {http://eprint.iacr.org/2018/121}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Brown18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Brown18a, author = {Daniel R. L. Brown}, title = {{RKHD} ElGamal signing and 1-way sums}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {186}, year = {2018}, url = {http://eprint.iacr.org/2018/186}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Brown18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BruinderinkP18, author = {Leon Groot Bruinderink and Peter Pessl}, title = {Differential Fault Attacks on Deterministic Lattice Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {355}, year = {2018}, url = {https://eprint.iacr.org/2018/355}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BruinderinkP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrzuskaDKK18, author = {Chris Brzuska and Antoine Delignat{-}Lavaud and Konrad Kohbrok and Markulf Kohlweiss}, title = {State-Separating Proofs: {A} Reduction Methodology for Real-World Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {306}, year = {2018}, url = {https://eprint.iacr.org/2018/306}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrzuskaDKK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BudaghyanCCCV18, author = {Lilya Budaghyan and Marco Calderini and Claude Carlet and Robert S. Coulter and Irene Villa}, title = {Constructing {APN} functions through isotopic shifts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {769}, year = {2018}, url = {https://eprint.iacr.org/2018/769}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BudaghyanCCCV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BudaghyanCHK18, author = {Lilya Budaghyan and Claude Carlet and Tor Helleseth and Nikolay S. Kaleyski}, title = {Changing Points in {APN} Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1217}, year = {2018}, url = {https://eprint.iacr.org/2018/1217}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BudaghyanCHK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BudaghyanCV18, author = {Lilya Budaghyan and Marco Calderini and Irene Villa}, title = {On relations between {CCZ-} and EA-equivalences}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {796}, year = {2018}, url = {https://eprint.iacr.org/2018/796}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BudaghyanCV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BujaAA18, author = {Alya Geogiana Buja and Shekh Faisal Abdul{-}Latip and Rabiah Ahmad}, title = {Fault Analysis of the {KTANTAN} Family of Block Ciphers: {A} Revisited Work of Fault Analysis of the {KATAN} Family of Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {258}, year = {2018}, url = {http://eprint.iacr.org/2018/258}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BujaAA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BunnKKO18, author = {Paul Bunn and Jonathan Katz and Eyal Kushilevitz and Rafail Ostrovsky}, title = {Efficient 3-Party Distributed {ORAM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {706}, year = {2018}, url = {https://eprint.iacr.org/2018/706}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BunnKKO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ByaliJPR18, author = {Megha Byali and Arun Joseph and Arpita Patra and Divya Ravi}, title = {Fast Secure Computation for Small Population over the Internet}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {710}, year = {2018}, url = {https://eprint.iacr.org/2018/710}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ByaliJPR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CalikTP18, author = {{\c{C}}agdas {\c{C}}alik and Meltem S{\"{o}}nmez Turan and Ren{\'{e}} Peralta}, title = {The Multiplicative Complexity of 6-variable Boolean Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {2}, year = {2018}, url = {http://eprint.iacr.org/2018/002}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CalikTP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CamenischDGLN18, author = {Jan Camenisch and Manu Drijvers and Tommaso Gagliardoni and Anja Lehmann and Gregory Neven}, title = {The Wonderful World of Global Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {165}, year = {2018}, url = {http://eprint.iacr.org/2018/165}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CamenischDGLN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CampanelliG18, author = {Matteo Campanelli and Rosario Gennaro}, title = {Fine-Grained Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {297}, year = {2018}, url = {https://eprint.iacr.org/2018/297}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CampanelliG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanardPST18, author = {S{\'{e}}bastien Canard and David Pointcheval and Quentin Santos and Jacques Traor{\'{e}}}, title = {Practical Strategy-Resistant Privacy-Preserving Elections}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {827}, year = {2018}, url = {https://eprint.iacr.org/2018/827}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanardPST18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiCHLRR18, author = {Ran Canetti and Yilei Chen and Justin Holmgren and Alex Lombardi and Guy N. Rothblum and Ron D. Rothblum}, title = {Fiat-Shamir From Simpler Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1004}, year = {2018}, url = {https://eprint.iacr.org/2018/1004}, timestamp = {Wed, 23 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiCHLRR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiCRR18, author = {Ran Canetti and Yilei Chen and Leonid Reyzin and Ron D. Rothblum}, title = {Fiat-Shamir and Correlation Intractability from Strong KDM-Secure Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {131}, year = {2018}, url = {http://eprint.iacr.org/2018/131}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiCRR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiLW18, author = {Ran Canetti and Alex Lombardi and Daniel Wichs}, title = {Non-Interactive Zero Knowledge and Correlation Intractability from Circular-Secure {FHE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1248}, year = {2018}, url = {https://eprint.iacr.org/2018/1248}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiLW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiPP18, author = {Ran Canetti and Sunoo Park and Oxana Poburinnaya}, title = {Fully Bideniable Interactive Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1244}, year = {2018}, url = {https://eprint.iacr.org/2018/1244}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiPP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanteautLLNW18, author = {Anne Canteaut and Virginie Lallemand and Gregor Leander and Patrick Neumann and Friedrich Wiemer}, title = {{BISON} - Instantiating the Whitened Swap-Or-Not Construction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1011}, year = {2018}, url = {https://eprint.iacr.org/2018/1011}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CanteautLLNW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanteautP18, author = {Anne Canteaut and L{\'{e}}o Perrin}, title = {On CCZ-Equivalence, Extended-Affine Equivalence, and Function Twisting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {713}, year = {2018}, url = {https://eprint.iacr.org/2018/713}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanteautP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanteautPT18, author = {Anne Canteaut and L{\'{e}}o Perrin and Shizhu Tian}, title = {If a Generalised Butterfly is {APN} then it Operates on 6 Bits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1036}, year = {2018}, url = {https://eprint.iacr.org/2018/1036}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanteautPT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CaoL18, author = {Zhengjun Cao and Lihua Liu}, title = {Remarks on Bell's Inequality}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {231}, year = {2018}, url = {http://eprint.iacr.org/2018/231}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CaoL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CaoL18a, author = {Zhengjun Cao and Lihua Liu}, title = {A Note On Groth-Ostrovsky-Sahai Non-Interactive Zero-Knowledge Proof System}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {327}, year = {2018}, url = {https://eprint.iacr.org/2018/327}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CaoL18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CaoL18b, author = {Zhengjun Cao and Lihua Liu}, title = {A Note On Clauser-Horne-Shimony-Holt Inequality}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {410}, year = {2018}, url = {https://eprint.iacr.org/2018/410}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CaoL18b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CaoOZ18, author = {Nairen Cao and Adam O'Neill and Mohammad Zaheri}, title = {Towards {RSA-OAEP} without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1170}, year = {2018}, url = {https://eprint.iacr.org/2018/1170}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CaoOZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CaoUL18, author = {Zhengjun Cao and Jeffrey Uhlmann and Lihua Liu}, title = {Analysis of Deutsch-Jozsa Quantum Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {249}, year = {2018}, url = {http://eprint.iacr.org/2018/249}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CaoUL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletC18, author = {Claude Carlet and Xi Chen}, title = {Constructing low-weight dth-order correlation-immune Boolean functions through the Fourier-Hadamard transform}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {86}, year = {2018}, url = {http://eprint.iacr.org/2018/086}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletCQ18, author = {Claude Carlet and Xi Chen and Longjiang Qu}, title = {Constructing Infinite Families of Low Differential Uniformity (n, m)-Functions with m{\textgreater}n/2}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1046}, year = {2018}, url = {https://eprint.iacr.org/2018/1046}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletCQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletDGT18, author = {Claude Carlet and Abderrahman Daif and Sylvain Guilley and C{\'{e}}dric Tavernier}, title = {Polynomial direct sum masking to protect against both {SCA} and {FIA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {531}, year = {2018}, url = {https://eprint.iacr.org/2018/531}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletDGT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarltonEK18, author = {Rhys Carlton and Aleksander Essex and Krzysztof Kapulkin}, title = {Threshold Properties of Prime Power Subgroups with Application to Secure Integer Comparisons}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {224}, year = {2018}, url = {http://eprint.iacr.org/2018/224}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarltonEK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarpovFLS18, author = {Sergiu Carpov and Caroline Fontaine and Damien Ligier and Renaud Sirdey}, title = {Illuminating the Dark or how to recover what should not be seen}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1001}, year = {2018}, url = {https://eprint.iacr.org/2018/1001}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarpovFLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarpovIM18, author = {Sergiu Carpov and Malika Izabach{\`{e}}ne and Victor Mollimard}, title = {New techniques for multi-value homomorphic evaluation and applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {622}, year = {2018}, url = {https://eprint.iacr.org/2018/622}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarpovIM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarpovS18, author = {Sergiu Carpov and Oana Stan}, title = {Efficient Evaluation of Low Degree Multivariate Polynomials in Ring-LWE Homomorphic Encryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {626}, year = {2018}, url = {https://eprint.iacr.org/2018/626}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarpovS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarpovT18, author = {Sergiu Carpov and Thibaud Tortech}, title = {Secure top most significant genome variants search: iDASH 2017 competition}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {314}, year = {2018}, url = {https://eprint.iacr.org/2018/314}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarpovT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarrCDG018, author = {Christopher Carr and Anamaria Costache and Gareth T. Davies and Kristian Gj{\o}steen and Martin Strand}, title = {Zero-Knowledge Proof of Decryption for {FHE} Ciphertexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {26}, year = {2018}, url = {http://eprint.iacr.org/2018/026}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarrCDG018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarstensETU18, author = {Tore Vincent Carstens and Ehsan Ebrahimi and Gelo Noel Tabia and Dominique Unruh}, title = {On Quantum Indifferentiability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {257}, year = {2018}, url = {http://eprint.iacr.org/2018/257}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarstensETU18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CartlidgeSA18, author = {John Cartlidge and Nigel P. Smart and Younes Talibi Alaoui}, title = {{MPC} Joins the Dark Side}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1045}, year = {2018}, url = {https://eprint.iacr.org/2018/1045}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CartlidgeSA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CascudoCG18, author = {Ignacio Cascudo and Ren{\'{e}} B{\o}dker Christensen and Jaron Skovsted Gundersen}, title = {Actively Secure OT-Extension from q-ary Linear Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {603}, year = {2018}, url = {https://eprint.iacr.org/2018/603}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CascudoCG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CascudoCXY18, author = {Ignacio Cascudo and Ronald Cramer and Chaoping Xing and Chen Yuan}, title = {Amortized Complexity of Information-Theoretically Secure {MPC} Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {429}, year = {2018}, url = {https://eprint.iacr.org/2018/429}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CascudoCXY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CascudoDDDDG18, author = {Ignacio Cascudo and Ivan Damg{\aa}rd and Bernardo David and Nico D{\"{o}}ttling and Rafael Dowsley and Irene Giacomelli}, title = {Efficient {UC} Commitment Extension with Homomorphism for Free (and Applications)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {983}, year = {2018}, url = {https://eprint.iacr.org/2018/983}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CascudoDDDDG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CascudoGR18, author = {Ignacio Cascudo and Jaron Skovsted Gundersen and Diego Ruano}, title = {Improved Bounds on the Threshold Gap in Ramp Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {99}, year = {2018}, url = {http://eprint.iacr.org/2018/099}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CascudoGR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CashLOZZ18, author = {David Cash and Feng{-}Hao Liu and Adam O'Neill and Mark Zhandry and Cong Zhang}, title = {Parameter-Hiding Order Revealing Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {698}, year = {2018}, url = {https://eprint.iacr.org/2018/698}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CashLOZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CassiersS18, author = {Ga{\"{e}}tan Cassiers and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Improved Bitslice Masking: from Optimized Non-Interference to Probe Isolation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {438}, year = {2018}, url = {https://eprint.iacr.org/2018/438}, timestamp = {Tue, 04 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CassiersS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CastagnosLT18, author = {Guilhem Castagnos and Fabien Laguillaumie and Ida Tucker}, title = {Practical Fully Secure Unrestricted Inner Product Functional Encryption modulo p}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {791}, year = {2018}, url = {https://eprint.iacr.org/2018/791}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CastagnosLT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CastelnoviMP18, author = {Laurent Castelnovi and Ange Martinelli and Thomas Prest}, title = {Grafting Trees: a Fault Attack against the {SPHINCS} framework}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {102}, year = {2018}, url = {http://eprint.iacr.org/2018/102}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CastelnoviMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CastryckLMPR18, author = {Wouter Castryck and Tanja Lange and Chloe Martindale and Lorenz Panny and Joost Renes}, title = {{CSIDH:} An Efficient Post-Quantum Commutative Group Action}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {383}, year = {2018}, url = {https://eprint.iacr.org/2018/383}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CastryckLMPR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CecchettiMJ18, author = {Ethan Cecchetti and Ian Miers and Ari Juels}, title = {PIEs: Public Incompressible Encodings for Decentralized Storage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {684}, year = {2018}, url = {https://eprint.iacr.org/2018/684}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CecchettiMJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CerulliCS18, author = {Andrea Cerulli and Emiliano De Cristofaro and Claudio Soriente}, title = {Nothing Refreshes Like a RePSI: Reactive Private Set Intersection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {344}, year = {2018}, url = {https://eprint.iacr.org/2018/344}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CerulliCS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CetinS18, author = {Gizem S. {\c{C}}etin and Berk Sunar}, title = {Homomorphic Rank Sort Using Surrogate Polynomials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {283}, year = {2018}, url = {https://eprint.iacr.org/2018/283}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CetinS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaidosFKZ18, author = {Pyrros Chaidos and Olga Fourtounelli and Aggelos Kiayias and Thomas Zacharias}, title = {A Universally Composable Framework for the Privacy of Email Ecosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {848}, year = {2018}, url = {https://eprint.iacr.org/2018/848}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaidosFKZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChakrabortiACMR18, author = {Anrin Chakraborti and Adam J. Aviv and Seung Geol Choi and Travis Mayberry and Daniel S. Roche and Radu Sion}, title = {Efficient Range {ORAM} with {\unicode{54598}}(log\({}^{\mbox{2}}\)N) Locality}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {471}, year = {2018}, url = {https://eprint.iacr.org/2018/471}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChakrabortiACMR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChakrabortiDNY18, author = {Avik Chakraborti and Nilanjan Datta and Mridul Nandi and Kan Yasuda}, title = {Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {805}, year = {2018}, url = {https://eprint.iacr.org/2018/805}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChakrabortiDNY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChakrabortyR18, author = {Suvradip Chakraborty and C. Pandu Rangan}, title = {Public Key Encryption Resilient to Post-Challenge Leakage and Tampering Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {883}, year = {2018}, url = {https://eprint.iacr.org/2018/883}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChakrabortyR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChalkiasBHLNS18, author = {Konstantinos Chalkias and James Brown and Mike Hearn and Tommy Lillehagen and Igor Nitto and Thomas Schroeter}, title = {Blockchained Post-Quantum Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {658}, year = {2018}, url = {https://eprint.iacr.org/2018/658}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChalkiasBHLNS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChanKNPS18, author = {T.{-}H. Hubert Chan and Jonathan Katz and Kartik Nayak and Antigoni Polychroniadou and Elaine Shi}, title = {More is Less: Perfectly Secure Oblivious Algorithms in the Multi-Server Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {851}, year = {2018}, url = {https://eprint.iacr.org/2018/851}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChanKNPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChanNS18, author = {T.{-}H. Hubert Chan and Kartik Nayak and Elaine Shi}, title = {Perfectly Secure Oblivious Parallel {RAM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {364}, year = {2018}, url = {https://eprint.iacr.org/2018/364}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChanNS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChanPS18, author = {T.{-}H. Hubert Chan and Rafael Pass and Elaine Shi}, title = {PiLi: An Extremely Simple Synchronous Blockchain}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {980}, year = {2018}, url = {https://eprint.iacr.org/2018/980}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChanPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChanPS18a, author = {T.{-}H. Hubert Chan and Rafael Pass and Elaine Shi}, title = {PaLa: {A} Simple Partially Synchronous Blockchain}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {981}, year = {2018}, url = {https://eprint.iacr.org/2018/981}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChanPS18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChandV18, author = {Ronal Pranil Chand and Maheswara Rao Valluri}, title = {Elliptic Curves in Generalized Huff's Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1179}, year = {2018}, url = {https://eprint.iacr.org/2018/1179}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChandV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChangCKS18, author = {Donghoon Chang and Amit Kumar Chauhan and Sandeep Kumar and Somitra Kumar Sanadhya}, title = {Revocable Identity-based Encryption from Codes with Rank Metric}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {382}, year = {2018}, url = {https://eprint.iacr.org/2018/382}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChangCKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaseDG18, author = {Melissa Chase and Apoorvaa Deshpande and Esha Ghosh}, title = {Privacy Preserving Verifiable Key Directories}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {607}, year = {2018}, url = {https://eprint.iacr.org/2018/607}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaseDG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaseDIKLOV18, author = {Melissa Chase and Yevgeniy Dodis and Yuval Ishai and Daniel Kraschewski and Tianren Liu and Rafail Ostrovsky and Vinod Vaikuntanathan}, title = {Reusable Non-Interactive Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {940}, year = {2018}, url = {https://eprint.iacr.org/2018/940}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaseDIKLOV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChatterjeeK18, author = {Sanjit Chatterjee and R. Kabaleeshwaran}, title = {Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of D{\'{e}}j{\`{a}}Q and Dual-Form Signature}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {738}, year = {2018}, url = {https://eprint.iacr.org/2018/738}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChatterjeeK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChatterjeeM18, author = {Sanjit Chatterjee and Sayantan Mukherjee}, title = {Large Universe Subset Predicate Encryption Based on Static Assumption (without Random Oracle)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1190}, year = {2018}, url = {https://eprint.iacr.org/2018/1190}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChatterjeeM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChattopadhyayKO18, author = {Eshan Chattopadhyay and Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar}, title = {Privacy Amplification from Non-malleable Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {293}, year = {2018}, url = {https://eprint.iacr.org/2018/293}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChattopadhyayKO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChattopadhyayL18, author = {Eshan Chattopadhyay and Xin Li}, title = {Non-Malleable Extractors and Codes for Composition of Tampering, Interleaved Tampering and More}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1069}, year = {2018}, url = {https://eprint.iacr.org/2018/1069}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChattopadhyayL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenCL18, author = {Yi{-}Hsiu Chen and Kai{-}Min Chung and Jyun{-}Jie Liao}, title = {On the Complexity of Simulating Auxiliary Input}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {171}, year = {2018}, url = {http://eprint.iacr.org/2018/171}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenCS18, author = {Hao Chen and Ilaria Chillotti and Yongsoo Song}, title = {Improved Bootstrapping for Approximate Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1043}, year = {2018}, url = {https://eprint.iacr.org/2018/1043}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenCS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenG18, author = {Yu{-}Ao Chen and Xiao{-}Shan Gao}, title = {Quantum Algorithms for Boolean Equation Solving and Quantum Algebraic Attack on Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {8}, year = {2018}, url = {http://eprint.iacr.org/2018/008}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenGHHJLL18, author = {Hao Chen and Ran Gilad{-}Bachrach and Kyoohyung Han and Zhicong Huang and Amir Jalali and Kim Laine and Kristin E. Lauter}, title = {Logistic regression over encrypted data from fully homomorphic encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {462}, year = {2018}, url = {https://eprint.iacr.org/2018/462}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenGHHJLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenGMPR18, author = {Cheng Chen and Nicholas Genise and Daniele Micciancio and Yuriy Polyakov and Kurt Rohloff}, title = {Implementing Token-Based Obfuscation under (Ring) {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1222}, year = {2018}, url = {https://eprint.iacr.org/2018/1222}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenGMPR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenGMV18, author = {Jing Chen and Sergey Gorbunov and Silvio Micali and Georgios Vlachos}, title = {{ALGORAND} {AGREEMENT:} Super Fast and Partition Resilient Byzantine Agreement}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {377}, year = {2018}, url = {https://eprint.iacr.org/2018/377}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenGMV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenGW18, author = {Jie Chen and Junqing Gong and Hoeteck Wee}, title = {Improved Inner-product Encryption with Adaptive Security and Full Attribute-hiding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {833}, year = {2018}, url = {https://eprint.iacr.org/2018/833}, timestamp = {Thu, 07 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenGW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenH18, author = {Hao Chen and Kyoohyung Han}, title = {Homomorphic Lower Digits Removal and Improved {FHE} Bootstrapping}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {67}, year = {2018}, url = {http://eprint.iacr.org/2018/067}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenHKCC18, author = {Tai{-}Yuan Chen and Wei{-}Ning Huang and Po{-}Chun Kuo and Hao Chung and Tzu{-}Wei Chao}, title = {{DEXON:} {A} Highly Scalable, Decentralized DAG-Based Consensus Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1112}, year = {2018}, url = {https://eprint.iacr.org/2018/1112}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenHKCC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenHLR18, author = {Hao Chen and Zhicong Huang and Kim Laine and Peter Rindal}, title = {Labeled {PSI} from Fully Homomorphic Encryption with Malicious Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {787}, year = {2018}, url = {https://eprint.iacr.org/2018/787}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenHLR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenMN18, author = {Yu Long Chen and Bart Mennink and Mridul Nandi}, title = {Short Variable Length Domain Extenders With Beyond Birthday Bound Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {783}, year = {2018}, url = {https://eprint.iacr.org/2018/783}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenMN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenRK18, author = {Huili Chen and Bita Darvish Rohani and Farinaz Koushanfar}, title = {DeepMarks: {A} Digital Fingerprinting Framework for Deep Neural Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {322}, year = {2018}, url = {https://eprint.iacr.org/2018/322}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenRK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenT18, author = {Long Chen and Qiang Tang}, title = {People Who Live in Glass Houses Should not Throw Stones: Targeted Opening Message Franking Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {994}, year = {2018}, url = {https://eprint.iacr.org/2018/994}, timestamp = {Wed, 20 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChenT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenVW18, author = {Yilei Chen and Vinod Vaikuntanathan and Hoeteck Wee}, title = {{GGH15} Beyond Permutation Branching Programs: Proofs, Attacks, and Candidates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {360}, year = {2018}, url = {https://eprint.iacr.org/2018/360}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenVW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenVWWW18, author = {Yilei Chen and Vinod Vaikuntanathan and Brent Waters and Hoeteck Wee and Daniel Wichs}, title = {Traitor-Tracing from {LWE} Made Simple and Attribute-Based}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {897}, year = {2018}, url = {https://eprint.iacr.org/2018/897}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenVWWW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenWZ18, author = {Yu Chen and Yuyu Wang and Hong{-}Sheng Zhou}, title = {Leakage-Resilient Cryptography from Puncturable Primitives and Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {781}, year = {2018}, url = {https://eprint.iacr.org/2018/781}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenY18, author = {Xiaoming Chen and Weiqing You}, title = {The Twin Conjugacy Search Problem and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {590}, year = {2018}, url = {https://eprint.iacr.org/2018/590}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenZZ18, author = {Long Chen and Zhenfeng Zhang and Zhenfei Zhang}, title = {On the Hardness of the Computational Ring-LWR Problem and its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {536}, year = {2018}, url = {https://eprint.iacr.org/2018/536}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChengC18, author = {Zhaohui Cheng and Liqun Chen}, title = {Certificateless Public Key Signature Schemes from Standard Algorithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {386}, year = {2018}, url = {https://eprint.iacr.org/2018/386}, timestamp = {Sat, 28 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChengC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChengGZ18, author = {Leixiao Cheng and Boru Gong and Yunlei Zhao}, title = {Lattice-Based Signature from Key Consensus}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1180}, year = {2018}, url = {https://eprint.iacr.org/2018/1180}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChengGZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CheonCHKL18, author = {Jung Hee Cheon and Wonhee Cho and Minki Hhan and Jiseung Kim and Changmin Lee}, title = {Statistical Zeroizing Attack: Cryptanalysis of Candidates of {BP} Obfuscation over {GGH15} Multilinear Map}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1081}, year = {2018}, url = {https://eprint.iacr.org/2018/1081}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CheonCHKL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CheonHH18, author = {Jung Hee Cheon and Kyoohyung Han and Minki Hhan}, title = {Faster Homomorphic Discrete Fourier Transforms and Improved {FHE} Bootstrapping}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1073}, year = {2018}, url = {https://eprint.iacr.org/2018/1073}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CheonHH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CheonHKKS18, author = {Jung Hee Cheon and Kyoohyung Han and Andrey Kim and Miran Kim and Yongsoo Song}, title = {Bootstrapping for Approximate Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {153}, year = {2018}, url = {http://eprint.iacr.org/2018/153}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CheonHKKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CheonHKKS18a, author = {Jung Hee Cheon and Kyoohyung Han and Andrey Kim and Miran Kim and Yongsoo Song}, title = {A Full {RNS} Variant of Approximate Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {931}, year = {2018}, url = {https://eprint.iacr.org/2018/931}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CheonHKKS18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CheonHKL18, author = {Jung Hee Cheon and Minki Hhan and Jiseung Kim and Changmin Lee}, title = {Cryptanalysis on the {HHSS} Obfuscation Arising from Absence of Safeguards}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {397}, year = {2018}, url = {https://eprint.iacr.org/2018/397}, timestamp = {Fri, 26 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CheonHKL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CheonHKL18a, author = {Jung Hee Cheon and Minki Hhan and Jiseung Kim and Changmin Lee}, title = {Cryptanalyses of Branching Program Obfuscations over {GGH13} Multilinear Map from {NTRU} Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {408}, year = {2018}, url = {https://eprint.iacr.org/2018/408}, timestamp = {Fri, 26 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CheonHKL18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CheonHLS18, author = {Jung Hee Cheon and Seungwan Hong and Changmin Lee and Yongha Son}, title = {Polynomial Functional Encryption Scheme with Linear Ciphertext Size}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {585}, year = {2018}, url = {https://eprint.iacr.org/2018/585}, timestamp = {Fri, 26 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CheonHLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CheonJKL18, author = {Jung Hee Cheon and Jinhyuck Jeong and Dongwoo Kim and Jongchan Lee}, title = {A Reusable Fuzzy Extractor with Practical Storage Size}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {681}, year = {2018}, url = {https://eprint.iacr.org/2018/681}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CheonJKL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CheonKY18, author = {Jung Hee Cheon and Andrey Kim and Donggeon Yhee}, title = {Multi-dimensional Packing for {HEAAN} for Approximate Matrix Arithmetics}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1245}, year = {2018}, url = {https://eprint.iacr.org/2018/1245}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CheonKY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChepurnoyKM18, author = {Alexander Chepurnoy and Vasily Kharin and Dmitry Meshkov}, title = {A Systematic Approach To Cryptocurrency Fees}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {78}, year = {2018}, url = {http://eprint.iacr.org/2018/078}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChepurnoyKM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChepurnoyPZ18, author = {Alexander Chepurnoy and Charalampos Papamanthou and Yupeng Zhang}, title = {Edrax: {A} Cryptocurrency with Stateless Transaction Validation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {968}, year = {2018}, url = {https://eprint.iacr.org/2018/968}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChepurnoyPZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChialvaD18, author = {Diego Chialva and Ann Dooms}, title = {Conditionals in Homomorphic Encryption and Machine Learning Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1032}, year = {2018}, url = {https://eprint.iacr.org/2018/1032}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChialvaD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChidaGHIKLN18, author = {Koji Chida and Daniel Genkin and Koki Hamada and Dai Ikarashi and Ryo Kikuchi and Yehuda Lindell and Ariel Nof}, title = {Fast Large-Scale Honest-Majority {MPC} for Malicious Adversaries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {570}, year = {2018}, url = {https://eprint.iacr.org/2018/570}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChidaGHIKLN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChielleMTM18, author = {Eduardo Chielle and Oleg Mazonka and Nektarios Georgios Tsoutsos and Michail Maniatakos}, title = {E\({}^{\mbox{3}}\): {A} Framework for Compiling {C++} Programs with Encrypted Operands}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1013}, year = {2018}, url = {https://eprint.iacr.org/2018/1013}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChielleMTM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChillottiGGI18, author = {Ilaria Chillotti and Nicolas Gama and Mariya Georgieva and Malika Izabach{\`{e}}ne}, title = {{TFHE:} Fast Fully Homomorphic Encryption over the Torus}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {421}, year = {2018}, url = {https://eprint.iacr.org/2018/421}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChillottiGGI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChongchitmateO18, author = {Wutichai Chongchitmate and Rafail Ostrovsky}, title = {Information-Theoretic Broadcast with Dishonest Majority for Long Messages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {829}, year = {2018}, url = {https://eprint.iacr.org/2018/829}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChongchitmateO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChotardSGPP18, author = {J{\'{e}}r{\'{e}}my Chotard and Edouard Dufour Sans and Romain Gay and Duong Hieu Phan and David Pointcheval}, title = {Multi-Client Functional Encryption with Repetition for Inner Product}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1021}, year = {2018}, url = {https://eprint.iacr.org/2018/1021}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChotardSGPP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoudhuryGPRS18, author = {Ashish Choudhury and Gayathri Garimella and Arpita Patra and Divya Ravi and Pratik Sarkar}, title = {Crash-tolerant Consensus in Directed Graph Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {436}, year = {2018}, url = {https://eprint.iacr.org/2018/436}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoudhuryGPRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chuengsatiansup18, author = {Chitchanok Chuengsatiansup and Chloe Martindale}, title = {Pairing-Friendly Twisted Hessian Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1026}, year = {2018}, url = {https://eprint.iacr.org/2018/1026}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Chuengsatiansup18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChungGLPS18, author = {Kai{-}Min Chung and Yue Guo and Wei{-}Kai Lin and Rafael Pass and Elaine Shi}, title = {Game Theoretic Notions of Fairness in Multi-Party Coin Toss}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1076}, year = {2018}, url = {https://eprint.iacr.org/2018/1076}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChungGLPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChungGLZ18, author = {Kai{-}Min Chung and Marios Georgiou and Ching{-}Yi Lai and Vassilis Zikas}, title = {Cryptography with Dispensable Backdoors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {352}, year = {2018}, url = {https://eprint.iacr.org/2018/352}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChungGLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CiampiO18, author = {Michele Ciampi and Claudio Orlandi}, title = {Combining Private Set-Intersection with Secure Two-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {105}, year = {2018}, url = {http://eprint.iacr.org/2018/105}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CiampiO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CianciulloG18, author = {Louis Cianciullo and Hossein Ghodosi}, title = {Efficient Information Theoretic Multi-Party Computation from Oblivious Linear Evaluation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1227}, year = {2018}, url = {https://eprint.iacr.org/2018/1227}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CianciulloG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CidHPSS18, author = {Carlos Cid and Tao Huang and Thomas Peyrin and Yu Sasaki and Ling Song}, title = {Boomerang Connectivity Table: {A} New Cryptanalysis Tool}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {161}, year = {2018}, url = {http://eprint.iacr.org/2018/161}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CidHPSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ClarisseS18, author = {Remi Clarisse and Olivier Sanders}, title = {Short Group Signature in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1115}, year = {2018}, url = {https://eprint.iacr.org/2018/1115}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ClarisseS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CogliatiL18, author = {Beno{\^{\i}}t Cogliati and Jooyoung Lee}, title = {Wide Tweakable Block Ciphers Based on Substitution-Permutation Networks: Security Beyond the Birthday Bound}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {488}, year = {2018}, url = {https://eprint.iacr.org/2018/488}, timestamp = {Mon, 06 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CogliatiL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CohenP18, author = {Bram Cohen and Krzysztof Pietrzak}, title = {Simple Proofs of Sequential Work}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {183}, year = {2018}, url = {http://eprint.iacr.org/2018/183}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CohenP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CohenSW18, author = {Ran Cohen and Abhi Shelat and Daniel Wichs}, title = {Adaptively Secure {MPC} with Sublinear Communication Complexity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1161}, year = {2018}, url = {https://eprint.iacr.org/2018/1161}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CohenSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ColombierMDMRD18, author = {Brice Colombier and Alexandre Menu and Jean{-}Max Dutertre and Pierre{-}Alain Mo{\"{e}}llic and Jean{-}Baptiste Rigaud and Jean{-}Luc Danger}, title = {Laser-induced Single-bit Faults in Flash Memory: Instructions Corruption on a 32-bit Microcontroller}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1042}, year = {2018}, url = {https://eprint.iacr.org/2018/1042}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ColombierMDMRD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CorettiDG18, author = {Sandro Coretti and Yevgeniy Dodis and Siyao Guo}, title = {Non-Uniform Bounds in the Random-Permutation, Ideal-Cipher, and Generic-Group Models}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {226}, year = {2018}, url = {http://eprint.iacr.org/2018/226}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CorettiDG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronP18, author = {Jean{-}S{\'{e}}bastien Coron and Hilder V. L. Pereira}, title = {On Kilian's Randomization of Multilinear Map Encodings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1129}, year = {2018}, url = {https://eprint.iacr.org/2018/1129}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CostacheFLMP18, author = {Anamaria Costache and Brooke Feigon and Kristin E. Lauter and Maike Massierer and Anna Pusk{\'{a}}s}, title = {Ramanujan graphs in cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {593}, year = {2018}, url = {https://eprint.iacr.org/2018/593}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CostacheFLMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CosteaCGTR18, author = {Sergiu Costea and Marios O. Choudary and Doru Gucea and Bj{\"{o}}rn Tackmann and Costin Raiciu}, title = {Secure Opportunistic Multipath Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1124}, year = {2018}, url = {https://eprint.iacr.org/2018/1124}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CosteaCGTR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Costello18, author = {Craig Costello}, title = {Computing supersingular isogenies on Kummer surfaces}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {850}, year = {2018}, url = {https://eprint.iacr.org/2018/850}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Costello18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Courtois18, author = {Nicolas T. Courtois}, title = {On the Existence of Non-Linear Invariants and Algebraic Polynomial Constructive Approach to Backdoors in Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {807}, year = {2018}, url = {https://eprint.iacr.org/2018/807}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Courtois18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Courtois18a, author = {Nicolas T. Courtois}, title = {Structural Nonlinear Invariant Attacks on {T-310:} Attacking Arbitrary Boolean Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1242}, year = {2018}, url = {https://eprint.iacr.org/2018/1242}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Courtois18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CourtoisAB18, author = {J{\'{e}}r{\^{o}}me Courtois and Lokman A. Abbas{-}Turki and Jean{-}Claude Bajard}, title = {Evaluation of Resilience of randomized {RNS} implementation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {9}, year = {2018}, url = {http://eprint.iacr.org/2018/009}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CourtoisAB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Couteau18, author = {Geoffroy Couteau}, title = {A Note on the Communication Complexity of Multiparty Computation in the Correlated Randomness Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {465}, year = {2018}, url = {https://eprint.iacr.org/2018/465}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Couteau18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CouteauDMRR18, author = {Geoffroy Couteau and Aur{\'{e}}lien Dupin and Pierrick M{\'{e}}aux and M{\'{e}}lissa Rossi and Yann Rotella}, title = {On the Concrete Security of Goldreich's Pseudorandom Generator}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1162}, year = {2018}, url = {https://eprint.iacr.org/2018/1162}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CouteauDMRR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CouvreurLT18, author = {Alain Couvreur and Matthieu Lequesne and Jean{-}Pierre Tillich}, title = {Recovering short secret keys of {RLCE} in polynomial time}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {528}, year = {2018}, url = {https://eprint.iacr.org/2018/528}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CouvreurLT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CraciunMS18, author = {Vlad Constantin Craciun and Andrei Mogage and Emil Simion}, title = {Trends in design of ransomware viruses}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {598}, year = {2018}, url = {https://eprint.iacr.org/2018/598}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CraciunMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerDESX18, author = {Ronald Cramer and Ivan Damg{\aa}rd and Daniel Escudero and Peter Scholl and Chaoping Xing}, title = {SPD{\(\mathbb{Z}\)}\({}_{\mbox{2\({}^{\mbox{k}}\)}}\): Efficient {MPC} mod 2\({}^{\mbox{k}}\) for Dishonest Majority}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {482}, year = {2018}, url = {https://eprint.iacr.org/2018/482}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerDESX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CrawfordGHPS18, author = {Jack L. H. Crawford and Craig Gentry and Shai Halevi and Daniel Platt and Victor Shoup}, title = {Doing Real Work with {FHE:} The Case of Logistic Regression}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {202}, year = {2018}, url = {http://eprint.iacr.org/2018/202}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CrawfordGHPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CrepeauY18, author = {Claude Cr{\'{e}}peau and Nan Yang}, title = {New Perspectives on Multi-Prover Interactive Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {65}, year = {2018}, url = {http://eprint.iacr.org/2018/065}, timestamp = {Mon, 29 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CrepeauY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CritesL18, author = {Elizabeth C. Crites and Anna Lysyanskaya}, title = {Delegatable Anonymous Credentials from Mercurial Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {923}, year = {2018}, url = {https://eprint.iacr.org/2018/923}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CritesL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CrowleyB18, author = {Paul Crowley and Eric Biggers}, title = {HPolyC: length-preserving encryption for entry-level processors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {720}, year = {2018}, url = {https://eprint.iacr.org/2018/720}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CrowleyB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Cuevas-FarfanMC18, author = {Eduardo Cuevas{-}Farfan and Miguel Morales{-}Sandoval and Ren{\'{e}} Cumplido}, title = {An FPGA-based programmable processor for bilinear pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1014}, year = {2018}, url = {https://eprint.iacr.org/2018/1014}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Cuevas-FarfanMC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CuiHHLY18, author = {Yuzhao Cui and Qiong Huang and Jianye Huang and Hongbo Li and Guomin Yang}, title = {Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1058}, year = {2018}, url = {https://eprint.iacr.org/2018/1058}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CuiHHLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CulnanePRT18, author = {Chris Culnane and Olivier Pereira and Kim Ramchen and Vanessa Teague}, title = {Universally Verifiable {MPC} with Applications to {IRV} Ballot Counting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {246}, year = {2018}, url = {http://eprint.iacr.org/2018/246}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CulnanePRT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DAnversKRV18, author = {Jan{-}Pieter D'Anvers and Angshuman Karmakar and Sujoy Sinha Roy and Frederik Vercauteren}, title = {Saber: Module-LWR based key exchange, CPA-secure encryption and CCA-secure {KEM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {230}, year = {2018}, url = {http://eprint.iacr.org/2018/230}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DAnversKRV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DAnversVV18, author = {Jan{-}Pieter D'Anvers and Frederik Vercauteren and Ingrid Verbauwhede}, title = {On the impact of decryption failures on the security of {LWE/LWR} based schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1089}, year = {2018}, url = {https://eprint.iacr.org/2018/1089}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DAnversVV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DAnversVV18a, author = {Jan{-}Pieter D'Anvers and Frederik Vercauteren and Ingrid Verbauwhede}, title = {The impact of error dependencies on Ring/Mod-LWE/LWR based schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1172}, year = {2018}, url = {https://eprint.iacr.org/2018/1172}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DAnversVV18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledGK18, author = {Dana Dachman{-}Soled and Huijing Gong and Mukul Kulkarni and Aria Shahverdi}, title = {Partial Key Exposure in Ring-LWE-Based Cryptosystems: Attacks and Resilience}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1068}, year = {2018}, url = {https://eprint.iacr.org/2018/1068}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledGK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledK18, author = {Dana Dachman{-}Soled and Mukul Kulkarni}, title = {Upper and Lower Bounds for Continuous Non-Malleable Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {517}, year = {2018}, url = {https://eprint.iacr.org/2018/517}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaemenHAK18, author = {Joan Daemen and Seth Hoffert and Gilles Van Assche and Ronny Van Keer}, title = {Xoodoo cookbook}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {767}, year = {2018}, url = {https://eprint.iacr.org/2018/767}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DaemenHAK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaiWZ18, author = {Wei Dai and William Whyte and Zhenfei Zhang}, title = {Optimizing polynomial convolution for NTRUEncrypt}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {229}, year = {2018}, url = {http://eprint.iacr.org/2018/229}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DaiWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardGO18, author = {Ivan Damg{\aa}rd and Chaya Ganesh and Claudio Orlandi}, title = {Proofs of Replicated Storage Without Timing Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {654}, year = {2018}, url = {https://eprint.iacr.org/2018/654}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardGO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardKORS18, author = {Ivan Damg{\aa}rd and Tomasz Kazana and Maciej Obremski and Varun Raj and Luisa Siniscalchi}, title = {Continuous {NMC} Secure Against Permutations and Overwrites, with Applications to {CCA} Secure Commitments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {596}, year = {2018}, url = {https://eprint.iacr.org/2018/596}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardKORS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DasNCGS18, author = {Debayan Das and Mayukh Nath and Baibhab Chatterjee and Santosh Ghosh and Shreyas Sen}, title = {Ground-up Root-cause Analysis guided Low-Overhead Generic Countermeasure for Electro-Magnetic Side-Channel Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {620}, year = {2018}, url = {https://eprint.iacr.org/2018/620}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DasNCGS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DattaDNP18, author = {Nilanjan Datta and Avijit Dutta and Mridul Nandi and Goutam Paul}, title = {Double-block Hash-then-Sum: {A} Paradigm for Constructing {BBB} Secure {PRF}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {804}, year = {2018}, url = {https://eprint.iacr.org/2018/804}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DattaDNP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DattaDNY18, author = {Nilanjan Datta and Avijit Dutta and Mridul Nandi and Kan Yasuda}, title = {Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based {MAC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {500}, year = {2018}, url = {https://eprint.iacr.org/2018/500}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DattaDNY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DattaOT18, author = {Pratish Datta and Tatsuaki Okamoto and Junichi Tomida}, title = {Full-Hiding (Unbounded) Multi-Input Inner Product Functional Encryption from the k-Linear Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {61}, year = {2018}, url = {http://eprint.iacr.org/2018/061}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DattaOT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DattaOT18a, author = {Pratish Datta and Tatsuaki Okamoto and Katsuyuki Takashima}, title = {Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1093}, year = {2018}, url = {https://eprint.iacr.org/2018/1093}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DattaOT18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DavidDL18, author = {Bernardo David and Rafael Dowsley and Mario Larangeira}, title = {{ROYALE:} {A} Framework for Universally Composable Card Games with Financial Rewards and Penalties Enforcement}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {157}, year = {2018}, url = {http://eprint.iacr.org/2018/157}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DavidDL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DavidDL18a, author = {Bernardo David and Rafael Dowsley and Mario Larangeira}, title = {21 - Bringing Down the Complexity: Fast Composable Protocols for Card Games Without Secret State}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {303}, year = {2018}, url = {https://eprint.iacr.org/2018/303}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DavidDL18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DavidW18, author = {Liron David and Avishai Wool}, title = {PRank: Fast Analytical Rank Estimation via Pareto Distributions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {550}, year = {2018}, url = {https://eprint.iacr.org/2018/550}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DavidW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DavidW18a, author = {Liron David and Avishai Wool}, title = {Poly-Logarithmic Side Channel Rank Estimation via Exponential Sampling}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {867}, year = {2018}, url = {https://eprint.iacr.org/2018/867}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DavidW18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DavidsonKNY18, author = {Alex Davidson and Shuichi Katsumata and Ryo Nishimaki and Shota Yamada}, title = {Constrained PRFs for Bit-fixing from OWFs with Constant Collusion Resistance}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {982}, year = {2018}, url = {https://eprint.iacr.org/2018/982}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DavidsonKNY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DavidsonN18, author = {Alex Davidson and Ryo Nishimaki}, title = {A Bit-fixing {PRF} with {O(1)} Collusion-Resistance from {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {890}, year = {2018}, url = {https://eprint.iacr.org/2018/890}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DavidsonN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Debris-AlazardS18, author = {Thomas Debris{-}Alazard and Nicolas Sendrier and Jean{-}Pierre Tillich}, title = {Wave: {A} New Code-Based Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {996}, year = {2018}, url = {https://eprint.iacr.org/2018/996}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Debris-AlazardS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Debris-AlazardS18a, author = {Thomas Debris{-}Alazard and Nicolas Sendrier and Jean{-}Pierre Tillich}, title = {This is Not an Attack on Wave}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1216}, year = {2018}, url = {https://eprint.iacr.org/2018/1216}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Debris-AlazardS18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Debris-AlazardT18, author = {Thomas Debris{-}Alazard and Jean{-}Pierre Tillich}, title = {A polynomial attack on a {NIST} proposal: RankSign, a code-based signature in rank metric}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {339}, year = {2018}, url = {https://eprint.iacr.org/2018/339}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Debris-AlazardT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DecruPV18, author = {Thomas Decru and Lorenz Panny and Frederik Vercauteren}, title = {Faster SeaSign signatures through improved rejection sampling}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1109}, year = {2018}, url = {https://eprint.iacr.org/2018/1109}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DecruPV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DegabrieleF18, author = {Jean Paul Degabriele and Marc Fischlin}, title = {Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {844}, year = {2018}, url = {https://eprint.iacr.org/2018/844}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DegabrieleF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DegabrieleS18, author = {Jean Paul Degabriele and Martijn Stam}, title = {Untagging Tor: {A} Formal Treatment of Onion Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {162}, year = {2018}, url = {http://eprint.iacr.org/2018/162}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DegabrieleS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dehnavi18, author = {Seyed Mojtaba Dehnavi}, title = {Further observations on {SIMON} and {SPECK} families of block ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1107}, year = {2018}, url = {https://eprint.iacr.org/2018/1107}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dehnavi18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DelcourtKLNPS18, author = {Marguerite Delcourt and Thorsten Kleinjung and Arjen K. Lenstra and Shubhojyoti Nath and Dan Page and Nigel P. Smart}, title = {Using the Cloud to Determine Key Strengths - Triennial Update}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1221}, year = {2018}, url = {https://eprint.iacr.org/2018/1221}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DelcourtKLNPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DemarestFR18, author = {Luke Demarest and Benjamin Fuller and Alexander Russell}, title = {Handling Correlated Errors: Hardness of {LWE} in the Exponent}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1005}, year = {2018}, url = {https://eprint.iacr.org/2018/1005}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DemarestFR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DemmlerRRT18, author = {Daniel Demmler and Peter Rindal and Mike Rosulek and Ni Trieu}, title = {{PIR-PSI:} Scaling Private Contact Discovery}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {579}, year = {2018}, url = {https://eprint.iacr.org/2018/579}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DemmlerRRT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DeneuvilleG18, author = {Jean{-}Christophe Deneuville and Philippe Gaborit}, title = {Cryptanalysis of a code-based one-time signature}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1205}, year = {2018}, url = {https://eprint.iacr.org/2018/1205}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DeneuvilleG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Deng18, author = {Lunzhi Deng}, title = {Insecurity of a provably secure and lightweight certificateless signature scheme for IIoT environments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1101}, year = {2018}, url = {https://eprint.iacr.org/2018/1101}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Deng18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DengLX18, author = {Yingpu Deng and Lixia Luo and Guanju Xiao}, title = {On Some Computational Problems in Local Fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1229}, year = {2018}, url = {https://eprint.iacr.org/2018/1229}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DengLX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DerlerJSS18, author = {David Derler and Kai Gellert and Tibor Jager and Daniel Slamanig and Christoph Striecks}, title = {Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {199}, year = {2018}, url = {http://eprint.iacr.org/2018/199}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DerlerJSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DerlerKLRSS18, author = {David Derler and Stephan Krenn and Thomas Lor{\"{u}}nser and Sebastian Ramacher and Daniel Slamanig and Christoph Striecks}, title = {Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {321}, year = {2018}, url = {https://eprint.iacr.org/2018/321}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DerlerKLRSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DerlerRS18, author = {David Derler and Sebastian Ramacher and Daniel Slamanig}, title = {Generic Double-Authentication Preventing Signatures and a Post-Quantum Instantiation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {790}, year = {2018}, url = {https://eprint.iacr.org/2018/790}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DerlerRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DeshpandeK18, author = {Apoorvaa Deshpande and Yael Kalai}, title = {Proofs of Ignorance and Applications to 2-Message Witness Hiding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {896}, year = {2018}, url = {https://eprint.iacr.org/2018/896}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DeshpandeK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DessoukyKSSZZ18, author = {Ghada Dessouky and Farinaz Koushanfar and Ahmad{-}Reza Sadeghi and Thomas Schneider and Shaza Zeitouni and Michael Zohner}, title = {Pushing the Communication Barrier in Secure Computation using Lookup Tables}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {486}, year = {2018}, url = {https://eprint.iacr.org/2018/486}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DessoukyKSSZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DeuberDMMT18, author = {Dominic Deuber and Nico D{\"{o}}ttling and Bernardo Magri and Giulio Malavolta and Sri Aravinda Krishnan Thyagarajan}, title = {Minting Mechanisms for Blockchain - or - Moving from Cryptoassets to Cryptocurrencies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1110}, year = {2018}, url = {https://eprint.iacr.org/2018/1110}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DeuberDMMT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DeyG18, author = {Sankhanil Dey and Ranjan Ghosh}, title = {A review of cryptographic properties of S-boxes with Generation and Analysis of crypto secure S-boxes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {405}, year = {2018}, url = {https://eprint.iacr.org/2018/405}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DeyG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DeyG18a, author = {Sankhanil Dey and Ranjan Ghosh}, title = {4-bit crypto S-boxes: Generation with irreducible polynomials over Galois field {GF(24)} and cryptanalysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {591}, year = {2018}, url = {https://eprint.iacr.org/2018/591}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DeyG18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DharPKC18, author = {Aritra Dhar and Ivan Puddu and Kari Kostiainen and Srdjan Capkun}, title = {ProximiTEE: Hardened {SGX} Attestation and Trusted Path through Proximity Verification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {902}, year = {2018}, url = {https://eprint.iacr.org/2018/902}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DharPKC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DiehlAFKG18, author = {William Diehl and Abubakr Abdulgadir and Farnoud Farahmand and Jens{-}Peter Kaps and Kris Gaj}, title = {Comparison of Cost of Protection Against Differential Power Analysis of Selected Authenticated Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {341}, year = {2018}, url = {https://eprint.iacr.org/2018/341}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DiehlAFKG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DingRAC18, author = {Jintai Ding and Saraswathy RV and Saed Alsayigh and Crystal Clough}, title = {How to validate the secret of a Ring Learning with Errors {(RLWE)} key}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {81}, year = {2018}, url = {http://eprint.iacr.org/2018/081}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DingRAC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DinuK18, author = {Daniel Dinu and Ilya Kizhvatov}, title = {{EM} Analysis in the IoT Context: Lessons Learned from an Attack on Thread}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {76}, year = {2018}, url = {http://eprint.iacr.org/2018/076}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DinuK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dinur18, author = {Itai Dinur}, title = {An Improved Affine Equivalence Algorithm for Random Permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {115}, year = {2018}, url = {http://eprint.iacr.org/2018/115}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dinur18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dinur18a, author = {Itai Dinur}, title = {An Algorithmic Framework for the Generalized Birthday Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {575}, year = {2018}, url = {https://eprint.iacr.org/2018/575}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dinur18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dinur18b, author = {Itai Dinur}, title = {Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {772}, year = {2018}, url = {https://eprint.iacr.org/2018/772}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dinur18b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DinurKK18, author = {Itai Dinur and Nathan Keller and Ohad Klein}, title = {An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {731}, year = {2018}, url = {https://eprint.iacr.org/2018/731}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DinurKK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DinurN18, author = {Itai Dinur and Niv Nadler}, title = {Multi-Target Attacks on the Picnic Signature Scheme and Related Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1212}, year = {2018}, url = {https://eprint.iacr.org/2018/1212}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DinurN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DiopSDS18, author = {Soda Diop and Bernard Ousmane San{\'{e}} and Nafissatou Diarra and Michel Seck}, title = {{NTRU-LPR} {IND-CPA:} {A} New Ideal Lattices-based Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {109}, year = {2018}, url = {http://eprint.iacr.org/2018/109}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DiopSDS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DoMC18, author = {Quang Do and Ben Martini and Kim{-}Kwang Raymond Choo}, title = {The Role of the Adversary Model in Applied Security Research}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1189}, year = {2018}, url = {https://eprint.iacr.org/2018/1189}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DoMC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigE0LLLM18, author = {Christoph Dobraunig and Maria Eichlseder and Lorenzo Grassi and Virginie Lallemand and Gregor Leander and Eik List and Florian Mendel and Christian Rechberger}, title = {Rasta: {A} cipher with low ANDdepth and few ANDs per bit}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {181}, year = {2018}, url = {http://eprint.iacr.org/2018/181}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigE0LLLM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEGMMP18, author = {Christoph Dobraunig and Maria Eichlseder and Hannes Gro{\ss} and Stefan Mangard and Florian Mendel and Robert Primas}, title = {Statistical Ineffective Fault Attacks on Masked {AES} with Fault Countermeasures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {357}, year = {2018}, url = {https://eprint.iacr.org/2018/357}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEGMMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEKMMP18, author = {Christoph Dobraunig and Maria Eichlseder and Thomas Korak and Stefan Mangard and Florian Mendel and Robert Primas}, title = {Exploiting Ineffective Fault Inductions on Symmetric Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {71}, year = {2018}, url = {http://eprint.iacr.org/2018/071}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEKMMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEMS18, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Markus Schofnegger}, title = {Algebraic Cryptanalysis of Frit}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {809}, year = {2018}, url = {https://eprint.iacr.org/2018/809}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigMMP18, author = {Christoph Dobraunig and Stefan Mangard and Florian Mendel and Robert Primas}, title = {Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {852}, year = {2018}, url = {https://eprint.iacr.org/2018/852}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigMMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DoernerKLS18, author = {Jack Doerner and Yashvanth Kondi and Eysa Lee and Abhi Shelat}, title = {Secure Two-party Threshold {ECDSA} from {ECDSA} Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {499}, year = {2018}, url = {https://eprint.iacr.org/2018/499}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DoernerKLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DongDW18, author = {Xiaoyang Dong and Bingyou Dong and Xiaoyun Wang}, title = {Quantum Attacks on Some Feistel Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {504}, year = {2018}, url = {https://eprint.iacr.org/2018/504}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DongDW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DongL18, author = {Changyu Dong and Grigorios Loukides}, title = {Approximating Private Set Union/Intersection Cardinality with Logarithmic Complexity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {495}, year = {2018}, url = {https://eprint.iacr.org/2018/495}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DongL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DongWAMM18, author = {Changyu Dong and Yilei Wang and Amjad Aldweesh and Patrick McCorry and Aad van Moorsel}, title = {Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {489}, year = {2018}, url = {https://eprint.iacr.org/2018/489}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DongWAMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DongY18, author = {Hua Dong and Li Yang}, title = {A voting scheme with post-quantum security based on physical laws}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {446}, year = {2018}, url = {https://eprint.iacr.org/2018/446}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DongY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DopmannRT18, author = {Christoph D{\"{o}}pmann and Sebastian Rust and Florian Tschorsch}, title = {Exploring Deployment Strategies for the Tor Network}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {661}, year = {2018}, url = {https://eprint.iacr.org/2018/661}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DopmannRT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingN18, author = {Nico D{\"{o}}ttling and Ryo Nishimaki}, title = {Universal Proxy Re-Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {840}, year = {2018}, url = {https://eprint.iacr.org/2018/840}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DowlingP18, author = {Benjamin Dowling and Kenneth G. Paterson}, title = {A Cryptographic Analysis of the WireGuard Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {80}, year = {2018}, url = {http://eprint.iacr.org/2018/080}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DowlingP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DraganGM18, author = {Constantin Catalin Dragan and Daniel Gardham and Mark Manulis}, title = {Hierarchical Attribute-based Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {610}, year = {2018}, url = {https://eprint.iacr.org/2018/610}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DraganGM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DrijversEFN18, author = {Manu Drijvers and Kasra Edalatnejad and Bryan Ford and Gregory Neven}, title = {Okamoto Beats Schnorr: On the Provable Security of Multi-Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {417}, year = {2018}, url = {https://eprint.iacr.org/2018/417}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DrijversEFN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DruckerG18, author = {Nir Drucker and Shay Gueron}, title = {Fast modular squaring with {AVX512IFMA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {335}, year = {2018}, url = {https://eprint.iacr.org/2018/335}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DruckerG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DruckerGK18, author = {Nir Drucker and Shay Gueron and Vlad Krasnov}, title = {Making {AES} great again: the forthcoming vectorized {AES} instruction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {392}, year = {2018}, url = {https://eprint.iacr.org/2018/392}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DruckerGK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DryjaLP18, author = {Thaddeus Dryja and Quanquan C. Liu and Sunoo Park}, title = {Static-Memory-Hard Functions and Nonlinear Space-Time Tradeoffs via Pebbling}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {205}, year = {2018}, url = {http://eprint.iacr.org/2018/205}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DryjaLP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DucasP18, author = {L{\'{e}}o Ducas and C{\'{e}}cile Pierrot}, title = {Polynomial Time Bounded Distance Decoding near Minkowski's Bound in Discrete Logarithm Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {146}, year = {2018}, url = {http://eprint.iacr.org/2018/146}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DucasP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dunkelman18, author = {Orr Dunkelman}, title = {Efficient Construction of the Boomerang Connection Table}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {631}, year = {2018}, url = {https://eprint.iacr.org/2018/631}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dunkelman18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DunkelmanH18, author = {Orr Dunkelman and Senyang Huang}, title = {Reconstructing an S-box from its Difference Distribution Table}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {811}, year = {2018}, url = {https://eprint.iacr.org/2018/811}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DunkelmanH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuongCZ18, author = {Tuyet Duong and Alexander Chepurnoy and Hong{-}Sheng Zhou}, title = {Multi-mode Cryptocurrency Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {129}, year = {2018}, url = {http://eprint.iacr.org/2018/129}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuongCZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DupinPB18, author = {Aur{\'{e}}lien Dupin and David Pointcheval and Christophe Bidan}, title = {On the Leakage of Corrupted Garbled Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {743}, year = {2018}, url = {https://eprint.iacr.org/2018/743}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DupinPB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DupinRB18, author = {Aur{\'{e}}lien Dupin and Jean{-}Marc Robert and Christophe Bidan}, title = {Location-Proof System based on Secure Multi-Party Computations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {525}, year = {2018}, url = {https://eprint.iacr.org/2018/525}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DupinRB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DupuisFLS18, author = {Fr{\'{e}}d{\'{e}}ric Dupuis and Serge Fehr and Philippe Lamontagne and Louis Salvail}, title = {Secure Certification of Mixed Quantum States with Application to Two-Party Randomness Generation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {910}, year = {2018}, url = {https://eprint.iacr.org/2018/910}, timestamp = {Fri, 22 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DupuisFLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DurakV18, author = {F. Bet{\"{u}}l Durak and Serge Vaudenay}, title = {Generic Round-Function Recovery for Feistel Networks over Small Domains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {108}, year = {2018}, url = {http://eprint.iacr.org/2018/108}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DurakV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DurakV18a, author = {F. Bet{\"{u}}l Durak and Serge Vaudenay}, title = {Bidirectional Asynchronous Ratcheted Key Agreement without Key-Update Primitives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {889}, year = {2018}, url = {https://eprint.iacr.org/2018/889}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DurakV18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuttaV18, author = {Arijit Dutta and Saravanan Vijayakumaran}, title = {MProve: {A} Proof of Assets Protocol for Monero Exchanges}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1210}, year = {2018}, url = {https://eprint.iacr.org/2018/1210}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuttaV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuvalL18, author = {S{\'{e}}bastien Duval and Ga{\"{e}}tan Leurent}, title = {{MDS} Matrices with Lightweight Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {260}, year = {2018}, url = {http://eprint.iacr.org/2018/260}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuvalL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DwivediM18, author = {Ashutosh Dhar Dwivedi and Pawel Morawiecki}, title = {Differential cryptanalysis in {ARX} ciphers, Application to {SPECK}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {899}, year = {2018}, url = {https://eprint.iacr.org/2018/899}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DwivediM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DwivediS18, author = {Ashutosh Dhar Dwivedi and Gautam Srivastava}, title = {Differential Cryptanalysis in {ARX} Ciphers, Applications to {LEA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {898}, year = {2018}, url = {https://eprint.iacr.org/2018/898}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DwivediS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DziembowskiEF18, author = {Stefan Dziembowski and Lisa Eckey and Sebastian Faust}, title = {FairSwap: How to fairly exchange digital goods}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {740}, year = {2018}, url = {https://eprint.iacr.org/2018/740}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DziembowskiEF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DziembowskiFH18, author = {Stefan Dziembowski and Sebastian Faust and Kristina Host{\'{a}}kov{\'{a}}}, title = {Foundations of State Channel Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {320}, year = {2018}, url = {https://eprint.iacr.org/2018/320}, timestamp = {Tue, 23 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DziembowskiFH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EatonLPS18, author = {Edward Eaton and Matthieu Lequesne and Alex Parent and Nicolas Sendrier}, title = {{QC-MDPC:} {A} Timing Attack and a {CCA2} {KEM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {256}, year = {2018}, url = {http://eprint.iacr.org/2018/256}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EatonLPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EisentragerHLMP18, author = {Kirsten Eisentr{\"{a}}ger and Sean Hallgren and Kristin E. Lauter and Travis Morrison and Christophe Petit}, title = {Supersingular isogeny graphs and endomorphism rings: reductions and solutions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {371}, year = {2018}, url = {https://eprint.iacr.org/2018/371}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/EisentragerHLMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EkdahlJMY18, author = {Patrik Ekdahl and Thomas Johansson and Alexander Maximov and Jing Yang}, title = {A new {SNOW} stream cipher called {SNOW-V}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1143}, year = {2018}, url = {https://eprint.iacr.org/2018/1143}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EkdahlJMY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ekera18, author = {Martin Eker{\aa}}, title = {Quantum algorithms for computing general discrete logarithms and orders with tradeoffs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {797}, year = {2018}, url = {https://eprint.iacr.org/2018/797}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ekera18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EsginSSLL18, author = {Muhammed F. Esgin and Ron Steinfeld and Amin Sakzad and Joseph K. Liu and Dongxi Liu}, title = {Short Lattice-based One-out-of-Many Proofs and Applications to Ring Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {773}, year = {2018}, url = {https://eprint.iacr.org/2018/773}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EsginSSLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EskandariKKT18, author = {Zahra Eskandari and Andreas B. Kidmose and Stefan K{\"{o}}lbl and Tyge Tiessen}, title = {Finding Integral Distinguishers with Ease}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {688}, year = {2018}, url = {https://eprint.iacr.org/2018/688}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/EskandariKKT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EsserHKMS18, author = {Andre Esser and Felix Heuer and Robert K{\"{u}}bler and Alexander May and Christian Sohler}, title = {Dissection-BKW}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {569}, year = {2018}, url = {https://eprint.iacr.org/2018/569}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EsserHKMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EtemadM018, author = {Mohammad Etemad and Mohammad Mahmoody and David Evans}, title = {Optimizing Trees for Static Searchable Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {52}, year = {2018}, url = {http://eprint.iacr.org/2018/052}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EtemadM018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FabsicHZ18, author = {Tom{\'{a}}s Fabsic and Viliam Hromada and Pavol Zajac}, title = {A Reaction Attack on LEDApkc}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {140}, year = {2018}, url = {http://eprint.iacr.org/2018/140}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FabsicHZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FalkNO18, author = {Brett Hemenway Falk and Daniel Noble and Rafail Ostrovsky}, title = {Private Set Intersection with Linear Communication from General Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {238}, year = {2018}, url = {http://eprint.iacr.org/2018/238}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FalkNO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Fan018, author = {Xiong Fan and Qiang Tang}, title = {Making Public Key Functional Encryption Function Private, Distributively}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {250}, year = {2018}, url = {http://eprint.iacr.org/2018/250}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Fan018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Faonio18, author = {Antonio Faonio}, title = {Efficient Fully-Leakage Resilient One-More Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1140}, year = {2018}, url = {https://eprint.iacr.org/2018/1140}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Faonio18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaonioNSV18, author = {Antonio Faonio and Jesper Buus Nielsen and Mark Simkin and Daniele Venturi}, title = {Continuously Non-Malleable Codes with Split-State Refresh}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {606}, year = {2018}, url = {https://eprint.iacr.org/2018/606}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FaonioNSV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FarahmandDAKG18, author = {Farnoud Farahmand and William Diehl and Abubakr Abdulgadir and Jens{-}Peter Kaps and Kris Gaj}, title = {Improved Lightweight Implementations of {CAESAR} Authenticated Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {573}, year = {2018}, url = {https://eprint.iacr.org/2018/573}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FarahmandDAKG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Farrell18, author = {Stephen Farrell}, title = {Clusters of Re-used Keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {299}, year = {2018}, url = {https://eprint.iacr.org/2018/299}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Farrell18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FarshimFP18, author = {Pooya Farshim and Georg Fuchsbauer and Alain Passel{\`{e}}gue}, title = {Simpler Constructions of Asymmetric Primitives from Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {576}, year = {2018}, url = {https://eprint.iacr.org/2018/576}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FarshimFP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FarshimHHL18, author = {Pooya Farshim and Julia Hesse and Dennis Hofheinz and Enrique Larraia}, title = {Graded Encoding Schemes from Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {11}, year = {2018}, url = {http://eprint.iacr.org/2018/011}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FarshimHHL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaugereKMPP18, author = {Jean{-}Charles Faug{\`{e}}re and Eliane Koussa and Gilles Macario{-}Rat and Jacques Patarin and Ludovic Perret}, title = {PKP-Based Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {714}, year = {2018}, url = {https://eprint.iacr.org/2018/714}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaugereKMPP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FauziMMO18, author = {Prastudy Fauzi and Sarah Meiklejohn and Rebekah Mercer and Claudio Orlandi}, title = {QuisQuis: {A} New Design for Anonymous Cryptocurrencies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {990}, year = {2018}, url = {https://eprint.iacr.org/2018/990}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FauziMMO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Fehr18, author = {Serge Fehr}, title = {Classical Proofs for the Quantum Collapsing Property of Classical Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {887}, year = {2018}, url = {https://eprint.iacr.org/2018/887}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Fehr18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FehrKM18, author = {Serge Fehr and Pierre Karpman and Bart Mennink}, title = {Short Non-Malleable Codes from Related-Key Secure Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {204}, year = {2018}, url = {http://eprint.iacr.org/2018/204}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FehrKM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FenteanyF18, author = {Peter Fenteany and Benjamin Fuller}, title = {Non-malleable Digital Lockers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {957}, year = {2018}, url = {https://eprint.iacr.org/2018/957}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FenteanyF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FeoG18, author = {Luca De Feo and Steven D. Galbraith}, title = {SeaSign: Compact isogeny signatures from class group actions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {824}, year = {2018}, url = {https://eprint.iacr.org/2018/824}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FeoG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FeoKS18, author = {Luca De Feo and Jean Kieffer and Benjamin Smith}, title = {Towards practical key exchange from ordinary isogeny graphs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {485}, year = {2018}, url = {https://eprint.iacr.org/2018/485}, timestamp = {Wed, 15 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FeoKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FerradiGGNT18, author = {Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and Sylvain Guilley and David Naccache and Mehdi Tibouchi}, title = {Recovering Secrets From Prefix-Dependent Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {798}, year = {2018}, url = {https://eprint.iacr.org/2018/798}, timestamp = {Wed, 03 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FerradiGGNT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FioreP18, author = {Dario Fiore and Elena Pagnin}, title = {Matrioska: {A} Compiler for Multi-Key Homomorphic Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {616}, year = {2018}, url = {https://eprint.iacr.org/2018/616}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FioreP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Fisch18, author = {Ben Fisch}, title = {PoReps: Proofs of Space on Useful Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {678}, year = {2018}, url = {https://eprint.iacr.org/2018/678}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Fisch18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Fisch18a, author = {Ben Fisch}, title = {Tight Proofs of Space and Replication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {702}, year = {2018}, url = {https://eprint.iacr.org/2018/702}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Fisch18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FischS18, author = {Ben Fisch and Shashwat Silas}, title = {Weak Compression and (In)security of Rational Proofs of Storage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {514}, year = {2018}, url = {https://eprint.iacr.org/2018/514}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FischS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FischlinH18, author = {Marc Fischlin and Patrick Harasser}, title = {Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {337}, year = {2018}, url = {https://eprint.iacr.org/2018/337}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FischlinH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FischlinJM18, author = {Marc Fischlin and Christian Janson and Sogol Mazaheri}, title = {Backdoored Hash Functions: Immunizing {HMAC} and {HKDF}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {362}, year = {2018}, url = {https://eprint.iacr.org/2018/362}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FischlinJM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FitziGKR18, author = {Matthias Fitzi and Peter Gazi and Aggelos Kiayias and Alexander Russell}, title = {Parallel Chains: Improving Throughput and Latency of Blockchain Protocols via Parallel Composition}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1119}, year = {2018}, url = {https://eprint.iacr.org/2018/1119}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FitziGKR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FledelW18, author = {Dor Fledel and Avishai Wool}, title = {Sliding-Window Correlation Attacks Against Encryption Devices with an Unstable Clock}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {317}, year = {2018}, url = {https://eprint.iacr.org/2018/317}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FledelW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FleischhackerG018, author = {Nils Fleischhacker and Vipul Goyal and Abhishek Jain}, title = {On the Existence of Three Round Zero-Knowledge Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {167}, year = {2018}, url = {http://eprint.iacr.org/2018/167}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FleischhackerG018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FotiadisK18, author = {Georgios Fotiadis and Elisavet Konstantinou}, title = {{TNFS} Resistant Families of Pairing-Friendly Elliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1017}, year = {2018}, url = {https://eprint.iacr.org/2018/1017}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FotiadisK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FotiadisM18, author = {Georgios Fotiadis and Chloe Martindale}, title = {Optimal TNFS-secure pairings on elliptic curves with even embedding degree}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {969}, year = {2018}, url = {https://eprint.iacr.org/2018/969}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FotiadisM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FouqueHK18, author = {Pierre{-}Alain Fouque and Benjamin Hadjibeyli and Paul Kirchner}, title = {Homomorphic Evaluation of Lattice-Based Symmetric Encryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {653}, year = {2018}, url = {https://eprint.iacr.org/2018/653}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FouqueHK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FranklePSGW18, author = {Jonathan Frankle and Sunoo Park and Daniel Shaar and Shafi Goldwasser and Daniel J. Weitzner}, title = {Practical Accountability of Secret Processes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {697}, year = {2018}, url = {https://eprint.iacr.org/2018/697}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FranklePSGW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FrederiksenLOP18, author = {Tore Kasper Frederiksen and Yehuda Lindell and Valery Osheter and Benny Pinkas}, title = {Fast Distributed {RSA} Key Generation for Semi-Honest and Malicious Adversaries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {577}, year = {2018}, url = {https://eprint.iacr.org/2018/577}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FrederiksenLOP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FrioloMV18, author = {Daniele Friolo and Daniel Masny and Daniele Venturi}, title = {Secure Multi-Party Computation from Strongly Uniform Key Agreement}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {473}, year = {2018}, url = {https://eprint.iacr.org/2018/473}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FrioloMV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FritzmannPS18, author = {Tim Fritzmann and Thomas P{\"{o}}ppelmann and Johanna Sep{\'{u}}lveda}, title = {Analysis of Error-Correcting Codes for Lattice-Based Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {150}, year = {2018}, url = {http://eprint.iacr.org/2018/150}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FritzmannPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuWDM18, author = {Ximing Fu and Xiaoyun Wang and Xiaoyang Dong and Willi Meier}, title = {A Key-recovery Attack on 855-round Trivium}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {198}, year = {2018}, url = {http://eprint.iacr.org/2018/198}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuWDM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuWDMHZ18, author = {Ximing Fu and Xiaoyun Wang and Xiaoyang Dong and Willi Meier and Yonglin Hao and Boxin Zhao}, title = {A Refinement of "A Key-recovery Attack on 855-round Trivium" From {CRYPTO} 2018}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {999}, year = {2018}, url = {https://eprint.iacr.org/2018/999}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuWDMHZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuchsbauerG18, author = {Georg Fuchsbauer and Romain Gay}, title = {Weakly Secure Equivalence-Class Signatures from Standard Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {37}, year = {2018}, url = {http://eprint.iacr.org/2018/037}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuchsbauerG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuchsbauerKKP18, author = {Georg Fuchsbauer and Chethan Kamath and Karen Klein and Krzysztof Pietrzak}, title = {Adaptively Secure Proxy Re-encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {426}, year = {2018}, url = {https://eprint.iacr.org/2018/426}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuchsbauerKKP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuchsbauerO18, author = {Georg Fuchsbauer and Michele Orr{\`{u}}}, title = {Non-interactive zaps of knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {228}, year = {2018}, url = {http://eprint.iacr.org/2018/228}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuchsbauerO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuchsbauerOS18, author = {Georg Fuchsbauer and Michele Orr{\`{u}} and Yannick Seurin}, title = {Aggregate Cash Systems: {A} Cryptographic Investigation of Mimblewimble}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1039}, year = {2018}, url = {https://eprint.iacr.org/2018/1039}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuchsbauerOS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FujiokaTTY18, author = {Atsushi Fujioka and Katsuyuki Takashima and Shintaro Terada and Kazuki Yoneyama}, title = {Supersingular Isogeny Diffie-Hellman Authenticated Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {730}, year = {2018}, url = {https://eprint.iacr.org/2018/730}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FujiokaTTY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FujiokaTY18, author = {Atsushi Fujioka and Katsuyuki Takashima and Kazuki Yoneyama}, title = {One-Round Authenticated Group Key Exchange from Isogenies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1033}, year = {2018}, url = {https://eprint.iacr.org/2018/1033}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FujiokaTY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FullerP18, author = {Benjamin Fuller and Lowen Peng}, title = {When are Continuous-Source Fuzzy Extractors Possible?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {461}, year = {2018}, url = {https://eprint.iacr.org/2018/461}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FullerP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalalY18, author = {Hisham S. Galal and Amr M. Youssef}, title = {Verifiable Sealed-Bid Auction on the Ethereum Blockchain}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {704}, year = {2018}, url = {https://eprint.iacr.org/2018/704}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalalY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Galbraith18, author = {Steven D. Galbraith}, title = {Authenticated key exchange for {SIDH}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {266}, year = {2018}, url = {http://eprint.iacr.org/2018/266}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Galbraith18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithPSV18, author = {Steven D. Galbraith and Lorenz Panny and Benjamin Smith and Frederik Vercauteren}, title = {Quantum Equivalence of the {DLP} and {CDHP} for Group Actions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1199}, year = {2018}, url = {https://eprint.iacr.org/2018/1199}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithPSV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaneshKPS18, author = {Chaya Ganesh and Yashvanth Kondi and Arpita Patra and Pratik Sarkar}, title = {Efficient Adaptively Secure Zero-knowledge from Garbled Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {43}, year = {2018}, url = {http://eprint.iacr.org/2018/043}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaneshKPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaneshOT18, author = {Chaya Ganesh and Claudio Orlandi and Daniel Tschudi}, title = {Proof-of-Stake Protocols for Privacy-Aware Blockchains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1105}, year = {2018}, url = {https://eprint.iacr.org/2018/1105}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaneshOT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gao18, author = {Shuhong Gao}, title = {Efficient Fully Homomorphic Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {637}, year = {2018}, url = {https://eprint.iacr.org/2018/637}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gao18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaoJKNXBKDRR18, author = {Yansong Gao and Chenglu Jin and Jeeson Kim and Hussein Nili and Xiaolin Xu and Wayne P. Burleson and Omid Kavehei and Marten van Dijk and Damith Chinthana Ranasinghe and Ulrich R{\"{u}}hrmair}, title = {Efficient Erasable PUFs from Programmable Logic and Memristors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {358}, year = {2018}, url = {https://eprint.iacr.org/2018/358}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaoJKNXBKDRR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaoOCX18, author = {Si Gao and Elisabeth Oswald and Hua Chen and Wei Xi}, title = {Non-profiled Mask Recovery: the impact of Independent Component Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {871}, year = {2018}, url = {https://eprint.iacr.org/2018/871}, timestamp = {Fri, 04 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaoOCX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaoRO18, author = {Si Gao and Arnab Roy and Elisabeth Oswald}, title = {Constructing TI-friendly Substitution Boxes using Shift-Invariant Permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {949}, year = {2018}, url = {https://eprint.iacr.org/2018/949}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaoRO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaoZC18, author = {Yiwen Gao and Yongbin Zhou and Wei Cheng}, title = {How Does Strict Parallelism Affect Security? {A} Case Study on the Side-Channel Attacks against GPU-based Bitsliced {AES} Implementation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1080}, year = {2018}, url = {https://eprint.iacr.org/2018/1080}, timestamp = {Fri, 11 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GaoZC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarayK18, author = {Juan A. Garay and Aggelos Kiayias}, title = {SoK: {A} Consensus Taxonomy in the Blockchain Era}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {754}, year = {2018}, url = {https://eprint.iacr.org/2018/754}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarayK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargGH18, author = {Sanjam Garg and Romain Gay and Mohammad Hajiabadi}, title = {New Techniques for Efficient Trapdoor Functions and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {872}, year = {2018}, url = {https://eprint.iacr.org/2018/872}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargGH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargH18, author = {Sanjam Garg and Mohammad Hajiabadi}, title = {Trapdoor Functions from the Computational Diffie-Hellman Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {529}, year = {2018}, url = {https://eprint.iacr.org/2018/529}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargHMM18, author = {Sanjam Garg and Mohammad Hajiabadi and Mohammad Mahmoody and Ameer Mohammed}, title = {Limits on the Power of Garbling Techniques for Public-Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {555}, year = {2018}, url = {https://eprint.iacr.org/2018/555}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargHMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargHMR18, author = {Sanjam Garg and Mohammad Hajiabadi and Mohammad Mahmoody and Ahmadreza Rahimi}, title = {Registration-Based Encryption: Removing Private-Key Generator from {IBE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {919}, year = {2018}, url = {https://eprint.iacr.org/2018/919}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargHMR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargHMRS18, author = {Sanjam Garg and Mohammad Hajiabadi and Mohammad Mahmoody and Ahmadreza Rahimi and Sruthi Sekar}, title = {Registration-Based Encryption from Standard Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1030}, year = {2018}, url = {https://eprint.iacr.org/2018/1030}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargHMRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargIS18, author = {Sanjam Garg and Yuval Ishai and Akshayaram Srinivasan}, title = {Two-Round {MPC:} Information-Theoretic and Black-Box}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {909}, year = {2018}, url = {https://eprint.iacr.org/2018/909}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargIS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargKP18, author = {Sanjam Garg and Susumu Kiyoshima and Omkant Pandey}, title = {A New Approach to Black-Box Concurrent Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {156}, year = {2018}, url = {http://eprint.iacr.org/2018/156}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargKP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargMS18, author = {Sanjam Garg and Peihan Miao and Akshayaram Srinivasan}, title = {Two-Round Multiparty Secure Computation Minimizing Public Key Operations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {180}, year = {2018}, url = {http://eprint.iacr.org/2018/180}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargOS18, author = {Sanjam Garg and Rafail Ostrovsky and Akshayaram Srinivasan}, title = {Adaptive Garbled {RAM} from Laconic Oblivious Transfer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {549}, year = {2018}, url = {https://eprint.iacr.org/2018/549}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargOS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargS18, author = {Sanjam Garg and Akshayaram Srinivasan}, title = {Adaptively Secure Garbling with Near Optimal Online Complexity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {151}, year = {2018}, url = {http://eprint.iacr.org/2018/151}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargS18a, author = {Sanjam Garg and Akshayaram Srinivasan}, title = {A Simple Construction of iO for Turing Machines}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {771}, year = {2018}, url = {https://eprint.iacr.org/2018/771}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargS18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GayHKP18, author = {Romain Gay and Dennis Hofheinz and Lisa Kohl and Jiaxin Pan}, title = {More Efficient (Almost) Tightly Secure Structure-Preserving Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {54}, year = {2018}, url = {http://eprint.iacr.org/2018/054}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GayHKP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GayKW18, author = {Romain Gay and Lucas Kowalczyk and Hoeteck Wee}, title = {Tight Adaptively Secure Broadcast Encryption with Short Ciphertexts and Keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {391}, year = {2018}, url = {https://eprint.iacr.org/2018/391}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GayKW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaziKR18, author = {Peter Gazi and Aggelos Kiayias and Alexander Russell}, title = {Stake-Bleeding Attacks on Proof-of-Stake Blockchains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {248}, year = {2018}, url = {http://eprint.iacr.org/2018/248}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaziKR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaziKZ18, author = {Peter Gazi and Aggelos Kiayias and Dionysis Zindros}, title = {Proof-of-Stake Sidechains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1239}, year = {2018}, url = {https://eprint.iacr.org/2018/1239}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaziKZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GellesPZ18, author = {Ran Gelles and Anat Paskin{-}Cherniavsky and Vassilis Zikas}, title = {Secure Two-Party Computation over Unreliable Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {506}, year = {2018}, url = {https://eprint.iacr.org/2018/506}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GellesPZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Geltink18, author = {Gerben Geltink}, title = {Concealing Ketje: {A} Lightweight PUF-Based Privacy Preserving Authentication Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1016}, year = {2018}, url = {https://eprint.iacr.org/2018/1016}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Geltink18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GenetKPM18, author = {Aymeric Gen{\^{e}}t and Matthias J. Kannwischer and Herv{\'{e}} Pelletier and Andrew McLauchlan}, title = {Practical Fault Injection Attacks on {SPHINCS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {674}, year = {2018}, url = {https://eprint.iacr.org/2018/674}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GenetKPM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GeniseMP18, author = {Nicholas Genise and Daniele Micciancio and Yuriy Polyakov}, title = {Building an Efficient Lattice Gadget Toolkit: Subgaussian Sampling and More}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {946}, year = {2018}, url = {https://eprint.iacr.org/2018/946}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GeniseMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GenkinPTY18, author = {Daniel Genkin and Lev Pachmanov and Eran Tromer and Yuval Yarom}, title = {Drive-by Key-Extraction Cache Attacks from Portable Code}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {119}, year = {2018}, url = {http://eprint.iacr.org/2018/119}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GenkinPTY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GennaroMNO18, author = {Rosario Gennaro and Michele Minelli and Anca Nitulescu and Michele Orr{\`{u}}}, title = {Lattice-Based zk-SNARKs from Square Span Programs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {275}, year = {2018}, url = {https://eprint.iacr.org/2018/275}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GennaroMNO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryJ18, author = {Craig Gentry and Charanjit S. Jutla}, title = {Obfuscation Using Tensor Products}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {756}, year = {2018}, url = {https://eprint.iacr.org/2018/756}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryOR18, author = {Craig Gentry and Adam O'Neill and Leonid Reyzin}, title = {A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {70}, year = {2018}, url = {http://eprint.iacr.org/2018/070}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryOR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gerard18, author = {Fran{\c{c}}ois G{\'{e}}rard}, title = {Module-lattice {KEM} Over a Ring of Dimension 128 for Embedded Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {677}, year = {2018}, url = {https://eprint.iacr.org/2018/677}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gerard18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GerardM18, author = {Fran{\c{c}}ois G{\'{e}}rard and Keno Merckx}, title = {Post-Quantum Signcryption From Lattice-Based Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {56}, year = {2018}, url = {http://eprint.iacr.org/2018/056}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GerardM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GeraudN18, author = {R{\'{e}}mi G{\'{e}}raud and David Naccache}, title = {Mixed-radix Naccache-Stern encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {278}, year = {2018}, url = {https://eprint.iacr.org/2018/278}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GeraudN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ghadafi18, author = {Essam Ghadafi}, title = {Further Lower Bounds for Structure-Preserving Signatures in Asymmetric Bilinear Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1224}, year = {2018}, url = {https://eprint.iacr.org/2018/1224}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ghadafi18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhoshalPM18, author = {Ashrujit Ghoshal and Sikhar Patranabis and Debdeep Mukhopadhyay}, title = {Template-based Fault Injection Analysis of Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {72}, year = {2018}, url = {http://eprint.iacr.org/2018/072}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GhoshalPM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhoshalSPDPM18, author = {Ashrujit Ghoshal and Rajat Sadhukhan and Sikhar Patranabis and Nilanjan Datta and Stjepan Picek and Debdeep Mukhopadhyay}, title = {Lightweight and Side-channel Secure 4x4 S-Boxes from Cellular Automata Rules}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {832}, year = {2018}, url = {https://eprint.iacr.org/2018/832}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GhoshalSPDPM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GiaconHP18, author = {Federico Giacon and Felix Heuer and Bertram Poettering}, title = {{KEM} Combiners}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {24}, year = {2018}, url = {http://eprint.iacr.org/2018/024}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GiaconHP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GjosteenJ18, author = {Kristian Gj{\o}steen and Tibor Jager}, title = {Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {543}, year = {2018}, url = {https://eprint.iacr.org/2018/543}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GjosteenJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GodiV18, author = {Murali Godi and Roopa Vishwanathan}, title = {New Techniques for Public Key Encryption with Sender Recovery}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {16}, year = {2018}, url = {http://eprint.iacr.org/2018/016}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GodiV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldwasserP18, author = {Shafi Goldwasser and Sunoo Park}, title = {Public Accountability vs. Secret Laws: Can They Coexist?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {664}, year = {2018}, url = {https://eprint.iacr.org/2018/664}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoldwasserP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GologluJ18, author = {Faruk G{\"{o}}loglu and Antoine Joux}, title = {A Simplified Approach to Rigorous Degree 2 Elimination in Discrete Logarithm Algorithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {430}, year = {2018}, url = {https://eprint.iacr.org/2018/430}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GologluJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoodellN18, author = {Brandon Goodell and Sarang Noether}, title = {Thring Signatures and their Applications to Spender-Ambiguous Digital Currencies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {774}, year = {2018}, url = {https://eprint.iacr.org/2018/774}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoodellN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GordonR018, author = {S. Dov Gordon and Samuel Ranellucci and Xiao Wang}, title = {Secure Computation with Low Communication from Cross-checking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {216}, year = {2018}, url = {http://eprint.iacr.org/2018/216}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GordonR018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GossJ18, author = {Ken Goss and Wei Jiang}, title = {Efficient and Constant-Rounds Secure Comparison through Dynamic Groups and Asymmetric Computations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {179}, year = {2018}, url = {http://eprint.iacr.org/2018/179}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GossJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GotaishiT18, author = {Masahito Gotaishi and Shigeo Tsujii}, title = {Organizational Cryptography for Access Control}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1120}, year = {2018}, url = {https://eprint.iacr.org/2018/1120}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GotaishiT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoubinMRP18, author = {Louis Goubin and Geraldine Monsalve and Juan L. Reutter and Francisco Jos{\'{e}} Vial Prado}, title = {Excalibur Key-Generation Protocols For {DAG} Hierarchic Decryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1177}, year = {2018}, url = {https://eprint.iacr.org/2018/1177}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoubinMRP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoubinP18, author = {Louis Goubin and Francisco Jos{\'{e}} Vial Prado}, title = {Blending {FHE-NTRU} keys - The Excalibur Property}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {794}, year = {2018}, url = {https://eprint.iacr.org/2018/794}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoubinP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoubinPRW18, author = {Louis Goubin and Pascal Paillier and Matthieu Rivain and Junwei Wang}, title = {How to Reveal the Secrets of an Obscure White-Box Implementation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {98}, year = {2018}, url = {http://eprint.iacr.org/2018/098}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoubinPRW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoudarziJRS18, author = {Dahmun Goudarzi and Anthony Journault and Matthieu Rivain and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {315}, year = {2018}, url = {https://eprint.iacr.org/2018/315}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoudarziJRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Goyal018, author = {Vipul Goyal and Ashutosh Kumar}, title = {Non-Malleable Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {316}, year = {2018}, url = {https://eprint.iacr.org/2018/316}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Goyal018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Goyal18, author = {Rishab Goyal}, title = {Quantum Multi-Key Homomorphic Encryption for Polynomial-Sized Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {443}, year = {2018}, url = {https://eprint.iacr.org/2018/443}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Goyal18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalK18, author = {Vipul Goyal and Ashutosh Kumar}, title = {Non-Malleable Secret Sharing for General Access Structures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {750}, year = {2018}, url = {https://eprint.iacr.org/2018/750}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalKW18, author = {Rishab Goyal and Venkata Koppula and Brent Waters}, title = {Collusion Resistant Traitor Tracing from Learning with Errors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {346}, year = {2018}, url = {https://eprint.iacr.org/2018/346}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalKW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Grebnev18, author = {Sergey Grebnev}, title = {On the Feasibility of an {ECDLP} Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {399}, year = {2018}, url = {https://eprint.iacr.org/2018/399}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Grebnev18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GreenRO18, author = {Joey Green and Arnab Roy and Elisabeth Oswald}, title = {A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {671}, year = {2018}, url = {https://eprint.iacr.org/2018/671}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GreenRO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GregoirePSS18, author = {Benjamin Gr{\'{e}}goire and Kostas Papagiannopoulos and Peter Schwabe and Ko Stoffelen}, title = {Vectorizing Higher-Order Masking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {173}, year = {2018}, url = {http://eprint.iacr.org/2018/173}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GregoirePSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gremy18, author = {Laurent Gr{\'{e}}my}, title = {Higher dimensional sieving for the number field sieve algorithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {967}, year = {2018}, url = {https://eprint.iacr.org/2018/967}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gremy18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrigorievS18, author = {Dima Grigoriev and Vladimir Shpilrain}, title = {Tropical cryptography {II:} extensions by homomorphisms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1104}, year = {2018}, url = {https://eprint.iacr.org/2018/1104}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrigorievS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrittiOM18, author = {Cl{\'{e}}mentine Gritti and Melek {\"{O}}nen and Refik Molva}, title = {{CHARIOT:} Cloud-Assisted Access Control for the Internet of Things}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {632}, year = {2018}, url = {https://eprint.iacr.org/2018/632}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrittiOM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrontasPZZ18, author = {Panagiotis Grontas and Aris Pagourtzis and Alexandros Zacharakis and Bingsheng Zhang}, title = {Towards everlasting privacy and efficient coercion resistance in remote electronic voting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {215}, year = {2018}, url = {http://eprint.iacr.org/2018/215}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrontasPZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrossMKM18, author = {Hannes Gro{\ss} and Lauren De Meyer and Martin Krenn and Stefan Mangard}, title = {Masking the {AES} with Only Two Random Bits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1007}, year = {2018}, url = {https://eprint.iacr.org/2018/1007}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrossMKM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Grosso18, author = {Vincent Grosso}, title = {Scalable Key Rank Estimation (and Key Enumeration) Algorithm for Large Keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {175}, year = {2018}, url = {http://eprint.iacr.org/2018/175}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Grosso18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrothKMMM18, author = {Jens Groth and Markulf Kohlweiss and Mary Maller and Sarah Meiklejohn and Ian Miers}, title = {Updatable and Universal Common Reference Strings with Applications to zk-SNARKs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {280}, year = {2018}, url = {https://eprint.iacr.org/2018/280}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrothKMMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrubbsLMP18, author = {Paul Grubbs and Marie{-}Sarah Lacharit{\'{e}} and Brice Minaud and Kenny Paterson}, title = {Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {965}, year = {2018}, url = {https://eprint.iacr.org/2018/965}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrubbsLMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gu18, author = {Chunsheng Gu}, title = {Multilinear maps via secret ring}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {312}, year = {2018}, url = {https://eprint.iacr.org/2018/312}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gu18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuW18, author = {Ke Gu and Na Wu}, title = {Constant Size Traceable Ring Signature Scheme without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {288}, year = {2018}, url = {https://eprint.iacr.org/2018/288}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuY18, author = {Ke Gu and Bo Yin}, title = {Efficient Group Signature Scheme without Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {879}, year = {2018}, url = {https://eprint.iacr.org/2018/879}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuilhemOPS18, author = {Cyprien Delpech de Saint Guilhem and Emmanuela Orsini and Christophe Petit and Nigel P. Smart}, title = {Secure Oblivious Transfer from Semi-Commutative Masking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {648}, year = {2018}, url = {https://eprint.iacr.org/2018/648}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GuilhemOPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GunluKISKS18, author = {Onur G{\"{u}}nl{\"{u}} and Tasnad Kernetzky and Onurcan Iscan and Vladimir Sidorenko and Gerhard Kramer and Rafael F. Schaefer}, title = {Secure and Reliable Key Agreement with Physical Unclonable Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {518}, year = {2018}, url = {https://eprint.iacr.org/2018/518}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GunluKISKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GunnPA18, author = {Lachlan J. Gunn and Ricardo Vieitez Parra and N. Asokan}, title = {On The Use of Remote Attestation to Break and Repair Deniability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {424}, year = {2018}, url = {https://eprint.iacr.org/2018/424}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GunnPA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoGS18, author = {Qian Guo and Vincent Grosso and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {498}, year = {2018}, url = {https://eprint.iacr.org/2018/498}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoGS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoPPS18, author = {Chun Guo and Olivier Pereira and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Leakage-Resilient Authenticated Encryption with Misuse in the Leveled Leakage Setting: Definitions, Separation Results, and Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {484}, year = {2018}, url = {https://eprint.iacr.org/2018/484}, timestamp = {Thu, 04 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GuoPPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoW18, author = {Chun Guo and Lei Wang}, title = {Revisiting Key-alternating Feistel Ciphers for Shorter Keys and Multi-user Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {816}, year = {2018}, url = {https://eprint.iacr.org/2018/816}, timestamp = {Thu, 04 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GuoW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gyu-CholS18, author = {Gyu{-}Chol Kim and Su{-}Chol Li}, title = {A study on the fast ElGamal encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {930}, year = {2018}, url = {https://eprint.iacr.org/2018/930}, timestamp = {Wed, 03 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gyu-CholS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaaghKOSS18, author = {Helene Haagh and Aleksandr Karbyshev and Sabine Oechsner and Bas Spitters and Pierre{-}Yves Strub}, title = {Computer-aided proofs for multiparty computation with active security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {502}, year = {2018}, url = {https://eprint.iacr.org/2018/502}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaaghKOSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaaseL18, author = {Bj{\"{o}}rn Haase and Beno{\^{\i}}t Labrique}, title = {AuCPace: Efficient verifier-based {PAKE} protocol tailored for the IIoT}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {286}, year = {2018}, url = {https://eprint.iacr.org/2018/286}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaaseL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Haider18, author = {Faraz Haider}, title = {Compact Sparse Merkle Trees}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {955}, year = {2018}, url = {https://eprint.iacr.org/2018/955}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Haider18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaitnerMO18, author = {Iftach Haitner and Nikolaos Makriyannis and Eran Omri}, title = {On the Complexity of Fair Coin Flipping}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {901}, year = {2018}, url = {https://eprint.iacr.org/2018/901}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaitnerMO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hajiabadi18, author = {Mohammad Hajiabadi}, title = {Enhancements Are Blackbox Non-Trivial: Impossibility of Enhanced Trapdoor Permutations from Standard Trapdoor Permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {900}, year = {2018}, url = {https://eprint.iacr.org/2018/900}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hajiabadi18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleviIKR18, author = {Shai Halevi and Yuval Ishai and Eyal Kushilevitz and Tal Rabin}, title = {Best Possible Information-Theoretic {MPC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {913}, year = {2018}, url = {https://eprint.iacr.org/2018/913}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleviIKR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleviPS18, author = {Shai Halevi and Yuriy Polyakov and Victor Shoup}, title = {An Improved {RNS} Variant of the {BFV} Homomorphic Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {117}, year = {2018}, url = {http://eprint.iacr.org/2018/117}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleviPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleviS18, author = {Shai Halevi and Victor Shoup}, title = {Faster Homomorphic Linear Transformations in HElib}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {244}, year = {2018}, url = {http://eprint.iacr.org/2018/244}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleviS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hall-AndersenV18, author = {Mathias Hall{-}Andersen and Philip S. Vejre}, title = {Generating Graphs Packed with Paths}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {764}, year = {2018}, url = {https://eprint.iacr.org/2018/764}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hall-AndersenV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HalunenL18, author = {Kimmo Halunen and Outi{-}Marja Latvala}, title = {Cryptography for Human Senses}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {757}, year = {2018}, url = {https://eprint.iacr.org/2018/757}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HalunenL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HamlinOWW18, author = {Ariel Hamlin and Rafail Ostrovsky and Mor Weiss and Daniel Wichs}, title = {Private Anonymous Data Access}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {363}, year = {2018}, url = {https://eprint.iacr.org/2018/363}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HamlinOWW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HamlinSWW18, author = {Ariel Hamlin and Abhi Shelat and Mor Weiss and Daniel Wichs}, title = {Multi-Key Searchable Encryption, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {18}, year = {2018}, url = {http://eprint.iacr.org/2018/018}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HamlinSWW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HanHCP18, author = {Kyoohyung Han and Seungwan Hong and Jung Hee Cheon and Daejun Park}, title = {Efficient Logistic Regression on Large Encrypted Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {662}, year = {2018}, url = {https://eprint.iacr.org/2018/662}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HanHCP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaoJLMTW18, author = {Yonglin Hao and Lin Jiao and Chaoyun Li and Willi Meier and Yosuke Todo and Qingju Wang}, title = {Observations on the Dynamic Cube Attack of 855-Round {TRIVIUM} from Crypto'18}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {972}, year = {2018}, url = {https://eprint.iacr.org/2018/972}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaoJLMTW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaraKMHT18, author = {Keisuke Hara and Fuyuki Kitagawa and Takahiro Matsuda and Goichiro Hanaoka and Keisuke Tanaka}, title = {Simulation-based Receiver Selective Opening {CCA} Secure {PKE} from Standard Computational Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1091}, year = {2018}, url = {https://eprint.iacr.org/2018/1091}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaraKMHT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HarcholAP18, author = {Yotam Harchol and Ittai Abraham and Benny Pinkas}, title = {Distributed {SSH} Key Management with Proactive {RSA} Threshold Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {389}, year = {2018}, url = {https://eprint.iacr.org/2018/389}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HarcholAP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HarshaB18, author = {Benjamin Harsha and Jeremiah Blocki}, title = {Just in Time Hashing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {112}, year = {2018}, url = {http://eprint.iacr.org/2018/112}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HarshaB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hashimoto18, author = {Yasufumi Hashimoto}, title = {On the security of Circulant UOV/Rainbow}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {947}, year = {2018}, url = {https://eprint.iacr.org/2018/947}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hashimoto18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HashimotoIT18, author = {Yasufumi Hashimoto and Yasuhiko Ikematsu and Tsuyoshi Takagi}, title = {Chosen Message Attack on Multivariate Signature {ELSA} at Asiacrypt 2017}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {310}, year = {2018}, url = {https://eprint.iacr.org/2018/310}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HashimotoIT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HastingsHW18, author = {Marcella Hastings and Nadia Heninger and Eric Wustrow}, title = {The Proof is in the Pudding: Proofs of Work for Solving Discrete Logarithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {939}, year = {2018}, url = {https://eprint.iacr.org/2018/939}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HastingsHW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HayashiK18, author = {Masahito Hayashi and Takeshi Koshiba}, title = {Secure Modulo Zero-Sum Randomness as Cryptographic Resource}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {802}, year = {2018}, url = {https://eprint.iacr.org/2018/802}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HayashiK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HazayOSS18, author = {Carmit Hazay and Emmanuela Orsini and Peter Scholl and Eduardo Soria{-}Vazquez}, title = {TinyKeys: {A} New Approach to Efficient Multi-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {208}, year = {2018}, url = {http://eprint.iacr.org/2018/208}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HazayOSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HazayOSS18a, author = {Carmit Hazay and Emmanuela Orsini and Peter Scholl and Eduardo Soria{-}Vazquez}, title = {Concretely Efficient Large-Scale {MPC} with Active Security (or, TinyKeys for TinyOT)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {843}, year = {2018}, url = {https://eprint.iacr.org/2018/843}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HazayOSS18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HazayV18, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam}, title = {Round-Optimal Fully Black-Box Zero-Knowledge Arguments from One-Way Permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {912}, year = {2018}, url = {https://eprint.iacr.org/2018/912}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HazayV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HebantPP18, author = {Chlo{\'{e}} H{\'{e}}bant and Duong Hieu Phan and David Pointcheval}, title = {Decentralized Evaluation of Quadratic Polynomials on Encrypted Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1019}, year = {2018}, url = {https://eprint.iacr.org/2018/1019}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HebantPP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeibergKSW18, author = {Sven Heiberg and Ivo Kubjas and Janno Siim and Jan Willemson}, title = {On Trade-offs of Applying Block Chains for Electronic Voting Bulletin Boards}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {685}, year = {2018}, url = {https://eprint.iacr.org/2018/685}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeibergKSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HelslootTE18, author = {Leon J. Helsloot and Gamze Tillem and Zekeriya Erkin}, title = {BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {744}, year = {2018}, url = {https://eprint.iacr.org/2018/744}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HelslootTE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HesseHK18, author = {Julia Hesse and Dennis Hofheinz and Lisa Kohl}, title = {On Tightly Secure Non-Interactive Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {237}, year = {2018}, url = {http://eprint.iacr.org/2018/237}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HesseHK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Heys18, author = {Howard M. Heys}, title = {Distributed Time-Memory Tradeoff Attacks on Ciphers (with Application to Stream Ciphers and Counter Mode)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {123}, year = {2018}, url = {http://eprint.iacr.org/2018/123}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Heys18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HiroseS18, author = {Shoichi Hirose and Junji Shikata}, title = {Non-adaptive Group-Testing Aggregate {MAC} Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {448}, year = {2018}, url = {https://eprint.iacr.org/2018/448}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HiroseS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HisilR18, author = {H{\"{u}}seyin Hisil and Joost Renes}, title = {On Kummer Lines With Full Rational 2-torsion and Their Usage in Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {839}, year = {2018}, url = {https://eprint.iacr.org/2018/839}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HisilR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoangOJY18, author = {Thang Hoang and Muslum Ozgur Ozmen and Yeongjin Jang and Attila A. Yavuz}, title = {Hardware-Supported {ORAM} in Effect: Practical Oblivious Search and Update on Very Large Dataset}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {247}, year = {2018}, url = {http://eprint.iacr.org/2018/247}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HoangOJY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoangTT18, author = {Viet Tung Hoang and Stefano Tessaro and Ni Trieu}, title = {The Curse of Small Domains: New Attacks on Format-Preserving Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {556}, year = {2018}, url = {https://eprint.iacr.org/2018/556}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HoangTT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoangTT18a, author = {Viet Tung Hoang and Stefano Tessaro and Aishwarya Thiruvengadam}, title = {The Multi-user Security of GCM, Revisited: Tight Bounds for Nonce Randomization}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {993}, year = {2018}, url = {https://eprint.iacr.org/2018/993}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HoangTT18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoffmannFNRS18, author = {Max Hoffmann and Valerie Fetzer and Matthias Nagel and Andy Rupp and Rebecca Schwerdt}, title = {{P4TC} - Provably-Secure yet Practical Privacy-Preserving Toll Collection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1106}, year = {2018}, url = {https://eprint.iacr.org/2018/1106}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HoffmannFNRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoffsteinSWZ18, author = {Jeffrey Hoffstein and Joseph H. Silverman and William Whyte and Zhenfei Zhang}, title = {A signature scheme from the finite field isomorphism problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {675}, year = {2018}, url = {https://eprint.iacr.org/2018/675}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HoffsteinSWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HofheinzJP18, author = {Dennis Hofheinz and Dingding Jia and Jiaxin Pan}, title = {Identity-based Encryption Tightly Secure under Chosen-ciphertext Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {834}, year = {2018}, url = {https://eprint.iacr.org/2018/834}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HofheinzJP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HofheinzN18, author = {Dennis Hofheinz and Ngoc Khanh Nguyen}, title = {On Tightly Secure Primitives in the Multi-Instance Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {958}, year = {2018}, url = {https://eprint.iacr.org/2018/958}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HofheinzN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoganMRCDHVZ18, author = {Kyle Hogan and Hoda Maleki and Reza Rahaeimehr and Ran Canetti and Marten van Dijk and Jason Hennessey and Mayank Varia and Haibin Zhang}, title = {On the Universally Composable Security of OpenStack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {602}, year = {2018}, url = {https://eprint.iacr.org/2018/602}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HoganMRCDHVZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HohenbergerW18, author = {Susan Hohenberger and Brent Waters}, title = {Synchronized Aggregate Signatures from the {RSA} Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {82}, year = {2018}, url = {http://eprint.iacr.org/2018/082}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HohenbergerW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HolmgrenL18, author = {Justin Holmgren and Alex Lombardi}, title = {Cryptographic Hashing From Strong One-Way Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {385}, year = {2018}, url = {https://eprint.iacr.org/2018/385}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HolmgrenL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HolmgrenR18, author = {Justin Holmgren and Ron D. Rothblum}, title = {Delegating Computations with (almost) Minimal Time and Space Overhead}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {861}, year = {2018}, url = {https://eprint.iacr.org/2018/861}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HolmgrenR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Homer18, author = {Miloslav Homer}, title = {A Chosen Plaintext Attack on Offset Public Permutation Mode}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {351}, year = {2018}, url = {https://eprint.iacr.org/2018/351}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Homer18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HongKKLW18, author = {Cheng Hong and Jonathan Katz and Vladimir Kolesnikov and Wen{-}jie Lu and Xiao Wang}, title = {Covert Security with Public Verifiability: Faster, Leaner, and Simpler}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1108}, year = {2018}, url = {https://eprint.iacr.org/2018/1108}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HongKKLW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HorelPRV18, author = {Thibaut Horel and Sunoo Park and Silas Richelson and Vinod Vaikuntanathan}, title = {How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt All Ciphertexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {212}, year = {2018}, url = {http://eprint.iacr.org/2018/212}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HorelPRV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HosoyamadaSTX18, author = {Akinori Hosoyamada and Yu Sasaki and Seiichiro Tani and Keita Xagawa}, title = {Improved Quantum Multicollision-Finding Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1122}, year = {2018}, url = {https://eprint.iacr.org/2018/1122}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HosoyamadaSTX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HosoyamadaY18, author = {Akinori Hosoyamada and Kan Yasuda}, title = {Building Quantum-One-Way Functions from Block Ciphers: Davies-Meyer and Merkle-Damg{\aa}rd Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {841}, year = {2018}, url = {https://eprint.iacr.org/2018/841}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HosoyamadaY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HosoyamadaY18a, author = {Akinori Hosoyamada and Takashi Yamakawa}, title = {Finding Collisions in a Quantum World: Quantum Black-Box Separation of Collision-Resistance and One-Wayness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1066}, year = {2018}, url = {https://eprint.iacr.org/2018/1066}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HosoyamadaY18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HouBZL18, author = {Xiaolu Hou and Jakub Breier and Fuyuan Zhang and Yang Liu}, title = {Fully Automated Differential Fault Analysis on Software Implementations of Cryptographic Algorithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {545}, year = {2018}, url = {https://eprint.iacr.org/2018/545}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HouBZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HovelmannsKSU18, author = {Kathrin H{\"{o}}velmanns and Eike Kiltz and Sven Sch{\"{a}}ge and Dominique Unruh}, title = {Generic Authenticated Key Exchange in the Quantum Random Oracle Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {928}, year = {2018}, url = {https://eprint.iacr.org/2018/928}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HovelmannsKSU18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoweOKG18, author = {James Howe and Tobias Oder and Markus Krausz and Tim G{\"{u}}neysu}, title = {Standard Lattice-Based Key Encapsulation on Embedded Devices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {686}, year = {2018}, url = {https://eprint.iacr.org/2018/686}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HoweOKG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuCA18, author = {Peizhao Hu and Sherman S. M. Chow and Asma Aloufi}, title = {Geosocial Query with User-Controlled Privacy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {304}, year = {2018}, url = {https://eprint.iacr.org/2018/304}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuCA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuCGW18, author = {Kai Hu and Tingting Cui and Chao Gao and Meiqin Wang}, title = {Towards Key-Dependent Integral and Impossible Differential Distinguishers on 5-Round {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {726}, year = {2018}, url = {https://eprint.iacr.org/2018/726}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HuCGW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuW18, author = {Kai Hu and Meiqin Wang}, title = {Automatic Search for {A} Variant of Division Property Using Three Subsets (Full Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1187}, year = {2018}, url = {https://eprint.iacr.org/2018/1187}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HuW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuZG18, author = {Kexin Hu and Zhenfeng Zhang and Kaiwen Guo}, title = {Breaking the Binding: Attacks on the Merkle Approach to Prove Liabilities and its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1139}, year = {2018}, url = {https://eprint.iacr.org/2018/1139}, timestamp = {Wed, 24 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HuZG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuangL18, author = {Qiong Huang and Hongbo Li}, title = {An Efficient Public-Key Searchable Encryption Scheme Secure against Inside Keyword Guessing Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {7}, year = {2018}, url = {http://eprint.iacr.org/2018/007}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuangL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuangLCAPL18, author = {Zhengan Huang and Junzuo Lai and Wenbin Chen and Man Ho Au and Zhen Peng and Jin Li}, title = {Hedged Nonce-Based Public-Key Encryption: Adaptive Security under Randomness Failures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {25}, year = {2018}, url = {http://eprint.iacr.org/2018/025}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuangLCAPL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuangLCAPL18a, author = {Zhengan Huang and Junzuo Lai and Wenbin Chen and Man Ho Au and Zhen Peng and Jin Li}, title = {Simulation-Based Selective Opening Security for Receivers under Chosen-Ciphertext Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {755}, year = {2018}, url = {https://eprint.iacr.org/2018/755}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuangLCAPL18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HubacekRV18, author = {Pavel Hub{\'{a}}cek and Alon Rosen and Margarita Vald}, title = {An Efficiency-Preserving Transformation from Honest-Verifier Statistical Zero-Knowledge to Statistical Zero-Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {164}, year = {2018}, url = {http://eprint.iacr.org/2018/164}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HubacekRV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Huguenin-Dumittan18, author = {Lo{\"{\i}}s Huguenin{-}Dumittan and Iraklis Leontiadis}, title = {A Message Franking Channel}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {920}, year = {2018}, url = {https://eprint.iacr.org/2018/920}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Huguenin-Dumittan18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HulsingBB18, author = {Andreas H{\"{u}}lsing and Christoph Busold and Johannes Buchmann}, title = {Forward Secure Signatures on Smart Cards}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {924}, year = {2018}, url = {https://eprint.iacr.org/2018/924}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HulsingBB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/InoueM18, author = {Akiko Inoue and Kazuhiko Minematsu}, title = {Cryptanalysis of {OCB2}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1040}, year = {2018}, url = {https://eprint.iacr.org/2018/1040}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/InoueM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiMO18, author = {Yuval Ishai and Manika Mittal and Rafail Ostrovsky}, title = {On the Message Complexity of Secure Multiparty Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {38}, year = {2018}, url = {http://eprint.iacr.org/2018/038}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiMO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshizakaM18, author = {Masahito Ishizaka and Kanta Matsuura}, title = {Strongly Unforgeable Signatures Resilient to Polynomially Hard-to-Invert Leakage under Standard Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1044}, year = {2018}, url = {https://eprint.iacr.org/2018/1044}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshizakaM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IslerK18, author = {Devri\c{s} \.{I}\c{s}ler and Alptekin K{\"{u}}p{\c{c}}{\"{u}}}, title = {Distributed Single Password Protocol Framework}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {976}, year = {2018}, url = {https://eprint.iacr.org/2018/976}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IslerK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IslerK18a, author = {Devri\c{s} \.{I}\c{s}ler and Alptekin K{\"{u}}p{\c{c}}{\"{u}}}, title = {Threshold Single Password Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {977}, year = {2018}, url = {https://eprint.iacr.org/2018/977}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IslerK18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IslerKC18, author = {Devri\c{s} \.{I}\c{s}ler and Alptekin K{\"{u}}p{\c{c}}{\"{u}} and Aykut Coskun}, title = {User Study on Single Password Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {975}, year = {2018}, url = {https://eprint.iacr.org/2018/975}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IslerKC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IsobeM18, author = {Takanori Isobe and Kazuhiko Minematsu}, title = {Breaking Message Integrity of an End-to-End Encryption Scheme of {LINE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {668}, year = {2018}, url = {https://eprint.iacr.org/2018/668}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IsobeM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ItoHMSI18, author = {Gembu Ito and Akinori Hosoyamada and Ryutaroh Matsumoto and Yu Sasaki and Tetsu Iwata}, title = {Quantum Chosen-Ciphertext Attacks against Feistel Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1193}, year = {2018}, url = {https://eprint.iacr.org/2018/1193}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ItoHMSI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Iwata18, author = {Tetsu Iwata}, title = {Plaintext Recovery Attack of {OCB2}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1090}, year = {2018}, url = {https://eprint.iacr.org/2018/1090}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Iwata18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IwataLLS18, author = {Tetsu Iwata and Virginie Lallemand and Gregor Leander and Yu Sasaki}, title = {Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {793}, year = {2018}, url = {https://eprint.iacr.org/2018/793}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IwataLLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JacquetM18, author = {Philippe Jacquet and Bernard Mans}, title = {Green Mining: toward a less energetic impact of cryptocurrencies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {197}, year = {2018}, url = {http://eprint.iacr.org/2018/197}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JacquetM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JaegerS18, author = {Joseph Jaeger and Igors Stepanovs}, title = {Optimal Channel Security Against Fine-Grained State Compromise: The Safety of Messaging}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {553}, year = {2018}, url = {https://eprint.iacr.org/2018/553}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JaegerS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JagerKM18, author = {Tibor Jager and Saqib A. Kakvi and Alexander May}, title = {On the Security of the PKCS{\#}1 v1.5 Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {855}, year = {2018}, url = {https://eprint.iacr.org/2018/855}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JagerKM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JagerKP18, author = {Tibor Jager and Rafael Kurek and Jiaxin Pan}, title = {Simple and More Efficient PRFs with Tight Security from {LWE} and Matrix-DDH}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {826}, year = {2018}, url = {https://eprint.iacr.org/2018/826}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JagerKP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JainS18, author = {Aayush Jain and Amit Sahai}, title = {How to leverage hardness of constant-degree expanding polynomials over {\(\mathbb{R}\)} to build iO}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {973}, year = {2018}, url = {https://eprint.iacr.org/2018/973}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JainS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Jakobsson18, author = {Markus Jakobsson}, title = {Secure Remote Attestation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {31}, year = {2018}, url = {http://eprint.iacr.org/2018/031}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Jakobsson18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JareckiKR18, author = {Stanislaw Jarecki and Hugo Krawczyk and Jason K. Resch}, title = {Threshold Partially-Oblivious PRFs with Applications to Key Management}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {733}, year = {2018}, url = {https://eprint.iacr.org/2018/733}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JareckiKR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JareckiKSS18, author = {Stanislaw Jarecki and Hugo Krawczyk and Maliheh Shirvanian and Nitesh Saxena}, title = {Two-Factor Authentication with End-to-End Password Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {33}, year = {2018}, url = {http://eprint.iacr.org/2018/033}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JareckiKSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JareckiKX18, author = {Stanislaw Jarecki and Hugo Krawczyk and Jiayu Xu}, title = {{OPAQUE:} An Asymmetric {PAKE} Protocol Secure Against Pre-Computation Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {163}, year = {2018}, url = {http://eprint.iacr.org/2018/163}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JareckiKX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JareckiW18, author = {Stanislaw Jarecki and Boyang Wei}, title = {3PC {ORAM} with Low Latency, Low Bandwidth, and Fast Batch Retrieval}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {347}, year = {2018}, url = {https://eprint.iacr.org/2018/347}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JareckiW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JarvinenKSTY18, author = {Kimmo J{\"{a}}rvinen and {\'{A}}gnes Kiss and Thomas Schneider and Oleksandr Tkachenko and Zheng Yang}, title = {Faster Privacy-Preserving Location Proximity Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {694}, year = {2018}, url = {https://eprint.iacr.org/2018/694}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JarvinenKSTY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JaschkeA18, author = {Angela J{\"{a}}schke and Frederik Armknecht}, title = {Unsupervised Machine Learning on Encrypted Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {411}, year = {2018}, url = {https://eprint.iacr.org/2018/411}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JaschkeA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JayasankaranSSH18, author = {Nithyashankari Gummidipoondi Jayasankaran and Adriana C. Sanabria{-}Borbon and Edgar S{\'{a}}nchez{-}Sinencio and Jiang Hu and Jeyavijayan Rajendran}, title = {Towards Provably-Secure Analog and Mixed-Signal Locking Against Overproduction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1064}, year = {2018}, url = {https://eprint.iacr.org/2018/1064}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JayasankaranSSH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JhaN18, author = {Ashwin Jha and Mridul Nandi}, title = {Applications of H-Technique: Revisiting Symmetric Key Security Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1130}, year = {2018}, url = {https://eprint.iacr.org/2018/1130}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JhaN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JiLS18, author = {Zhengfeng Ji and Yi{-}Kai Liu and Fang Song}, title = {Pseudorandom Quantum States}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {544}, year = {2018}, url = {https://eprint.iacr.org/2018/544}, timestamp = {Mon, 30 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/JiLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JiangKLS18, author = {Xiaoqian Jiang and Miran Kim and Kristin E. Lauter and Yongsoo Song}, title = {Secure Outsourced Matrix Computation and Application to Neural Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1041}, year = {2018}, url = {https://eprint.iacr.org/2018/1041}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JiangKLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Jimenez18, author = {Reynier Antonio de la Cruz Jim{\'{e}}nez}, title = {On some methods for constructing almost optimal S-Boxes and their resilience against side-channel attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {618}, year = {2018}, url = {https://eprint.iacr.org/2018/618}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Jimenez18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JinDRZ18, author = {Chenglu Jin and Marten van Dijk and Michael K. Reiter and Haibin Zhang}, title = {PwoP: Intrusion-Tolerant and Privacy-Preserving Sensor Fusion}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1171}, year = {2018}, url = {https://eprint.iacr.org/2018/1171}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JinDRZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JostBB18, author = {Daniel Jost and Christian Badertscher and Fabio Banfi}, title = {A note on the equivalence of {IND-CCA} {\&} {INT-PTXT} and {IND-CCA} {\&} {INT-CTXT}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {135}, year = {2018}, url = {http://eprint.iacr.org/2018/135}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JostBB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JostMM18, author = {Daniel Jost and Ueli Maurer and Marta Mularczyk}, title = {Efficient Ratcheting: Almost-Optimal Guarantees for Secure Messaging}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {954}, year = {2018}, url = {https://eprint.iacr.org/2018/954}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JostMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JoyeM18, author = {Marc Joye and Yan Michalevsky}, title = {{RSA} Signatures Under Hardware Restrictions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {878}, year = {2018}, url = {https://eprint.iacr.org/2018/878}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JoyeM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JudmayerSSW18, author = {Aljosha Judmayer and Nicholas Stifter and Philipp Schindler and Edgar R. Weippl}, title = {Pitchforks in Cryptocurrencies: Enforcing rule changes through offensive forking- and consensus techniques}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {836}, year = {2018}, url = {https://eprint.iacr.org/2018/836}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JudmayerSSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JungkPS18, author = {Bernhard Jungk and Richard Petri and Marc St{\"{o}}ttinger}, title = {Efficient Side-Channel Protections of {ARX} Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {693}, year = {2018}, url = {https://eprint.iacr.org/2018/693}, timestamp = {Tue, 05 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JungkPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Jutla18, author = {Charanjit S. Jutla}, title = {Authenticated Encryption Mode {IAPM} using SHA-3's Public Random Permutation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {128}, year = {2018}, url = {http://eprint.iacr.org/2018/128}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Jutla18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JutlaO018, author = {Charanjit S. Jutla and Miyako Ohkubo and Arnab Roy}, title = {Improved (Almost) Tightly-Secure Structure-Preserving Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {42}, year = {2018}, url = {http://eprint.iacr.org/2018/042}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JutlaO018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JuvekarVC18, author = {Chiraag Juvekar and Vinod Vaikuntanathan and Anantha P. Chandrakasan}, title = {{GAZELLE:} {A} Low Latency Framework for Secure Neural Network Inference}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {73}, year = {2018}, url = {http://eprint.iacr.org/2018/073}, timestamp = {Mon, 27 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JuvekarVC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ka18, author = {Ahmad Khoureich Ka}, title = {{R-MAC} - {A} lightwheight authentication protocol for {RFID} Tags}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {214}, year = {2018}, url = {http://eprint.iacr.org/2018/214}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ka18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KaafaraniK18, author = {Ali {El Kaafarani} and Shuichi Katsumata}, title = {Attribute-based Signatures for Unbounded Circuits in the {ROM} and Efficient Instantiations from Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {22}, year = {2018}, url = {http://eprint.iacr.org/2018/022}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KaafaraniK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KalaiK18, author = {Yael Tauman Kalai and Dakshita Khurana}, title = {Non-Interactive Non-Malleability from Quantum Supremacy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1118}, year = {2018}, url = {https://eprint.iacr.org/2018/1118}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KalaiK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KalaiKS18, author = {Yael Tauman Kalai and Dakshita Khurana and Amit Sahai}, title = {Statistical Witness Indistinguishability (and more) in Two Messages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {168}, year = {2018}, url = {http://eprint.iacr.org/2018/168}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KalaiKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KalaiPY18, author = {Yael Kalai and Omer Paneth and Lisa Yang}, title = {On Publicly Verifiable Delegation From Standard Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {776}, year = {2018}, url = {https://eprint.iacr.org/2018/776}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KalaiPY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KamaraM18, author = {Seny Kamara and Tarik Moataz}, title = {Encrypted Multi-Maps with Computationally-Secure Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {978}, year = {2018}, url = {https://eprint.iacr.org/2018/978}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KamaraM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KamaraMO18, author = {Seny Kamara and Tarik Moataz and Olga Ohrimenko}, title = {Structured Encryption and Leakage Suppression}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {551}, year = {2018}, url = {https://eprint.iacr.org/2018/551}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KamaraMO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KammadanamSH18, author = {Vamshi Krishna Kammadanam and Virendra R. Sule and Yi Hong}, title = {A Public Key Exchange Cryptosystem Based on Ideal Secrecy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1133}, year = {2018}, url = {https://eprint.iacr.org/2018/1133}, timestamp = {Fri, 01 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KammadanamSH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KampPEJ18, author = {Tim van de Kamp and Andreas Peter and Maarten H. Everts and Willem Jonker}, title = {Multi-client Predicate-only Encryption for Conjunctive Equality Tests}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {563}, year = {2018}, url = {https://eprint.iacr.org/2018/563}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KampPEJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KampanakisPDG18, author = {Panos Kampanakis and Peter Panburana and Ellie Daw and Daniel Van Geest}, title = {The Viability of Post-quantum {X.509} Certificates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {63}, year = {2018}, url = {http://eprint.iacr.org/2018/063}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KampanakisPDG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KandeleP18, author = {Suyash Kandele and Souradyuti Paul}, title = {Message-locked Encryption with File Update}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {422}, year = {2018}, url = {https://eprint.iacr.org/2018/422}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KandeleP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KandeleP18a, author = {Suyash Kandele and Souradyuti Paul}, title = {Key Assignment Scheme with Authenticated Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1233}, year = {2018}, url = {https://eprint.iacr.org/2018/1233}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KandeleP18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KannwischerGBKB18, author = {Matthias J. Kannwischer and Aymeric Gen{\^{e}}t and Denis Butin and Juliane Kr{\"{a}}mer and Johannes Buchmann}, title = {Differential Power Analysis of {XMSS} and {SPHINCS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {673}, year = {2018}, url = {https://eprint.iacr.org/2018/673}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KannwischerGBKB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KannwischerRS18, author = {Matthias J. Kannwischer and Joost Rijneveld and Peter Schwabe}, title = {Faster multiplication in {\(\mathbb{Z}\)}\({}_{\mbox{2\({}^{\mbox{m}}\)}}\)[x] on Cortex-M4 to speed up {NIST} {PQC} candidates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1018}, year = {2018}, url = {https://eprint.iacr.org/2018/1018}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KannwischerRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KarmakarMRV18, author = {Angshuman Karmakar and Jose Maria Bermudo Mera and Sujoy Sinha Roy and Ingrid Verbauwhede}, title = {Saber on {ARM} CCA-secure module lattice-based key encapsulation on {ARM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {682}, year = {2018}, url = {https://eprint.iacr.org/2018/682}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KarmakarMRV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KarpmanR18, author = {Pierre Karpman and Daniel S. Roche}, title = {New Instantiations of the {CRYPTO} 2017 Masking Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {492}, year = {2018}, url = {https://eprint.iacr.org/2018/492}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KarpmanR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KassemCBKCH18, author = {Nada El Kassem and Liqun Chen and Rachid El Bansarkhani and Ali {El Kaafarani} and Jan Camenisch and Patrick Hough}, title = {{L-DAA:} Lattice-Based Direct Anonymous Attestation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {401}, year = {2018}, url = {https://eprint.iacr.org/2018/401}, timestamp = {Sat, 28 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KassemCBKCH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KatsumataMT18, author = {Shuichi Katsumata and Takahiro Matsuda and Atsushi Takayasu}, title = {Lattice-based Revocable (Hierarchical) {IBE} with Decryption Key Exposure Resistance}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {420}, year = {2018}, url = {https://eprint.iacr.org/2018/420}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KatsumataMT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KatsumataY18, author = {Shuichi Katsumata and Shota Yamada}, title = {Note on Constructing Constrained PRFs from OWFs with Constant Collusion Resistance}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {914}, year = {2018}, url = {https://eprint.iacr.org/2018/914}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KatsumataY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KatsumataYY18, author = {Shuichi Katsumata and Shota Yamada and Takashi Yamakawa}, title = {Tighter Security Proofs for {GPV-IBE} in the Quantum Random Oracle Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {451}, year = {2018}, url = {https://eprint.iacr.org/2018/451}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KatsumataYY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KatzKW18, author = {Jonathan Katz and Vladimir Kolesnikov and Xiao Wang}, title = {Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {475}, year = {2018}, url = {https://eprint.iacr.org/2018/475}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KatzKW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KatzRRW18, author = {Jonathan Katz and Samuel Ranellucci and Mike Rosulek and Xiao Wang}, title = {Optimizing Authenticated Garbling for Faster Secure Two-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {578}, year = {2018}, url = {https://eprint.iacr.org/2018/578}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KatzRRW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KerberKKZ18, author = {Thomas Kerber and Markulf Kohlweiss and Aggelos Kiayias and Vassilis Zikas}, title = {Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1132}, year = {2018}, url = {https://eprint.iacr.org/2018/1132}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KerberKKZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhairallahCMM18, author = {Mustafa Khairallah and Anupam Chattopadhyay and Bimal Mandal and Subhamoy Maitra}, title = {On Hardware Implementation of Tang-Maitra Boolean Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {667}, year = {2018}, url = {https://eprint.iacr.org/2018/667}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhairallahCMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhalidHRRO18, author = {Ayesha Khalid and James Howe and Ciara Rafferty and Francesco Regazzoni and M{\'{a}}ire O'Neill}, title = {Compact, Scalable, and Efficient Discrete Gaussian Samplers for Lattice-Based Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {265}, year = {2018}, url = {http://eprint.iacr.org/2018/265}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhalidHRRO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhalilG18, author = {Rami Khalil and Arthur Gervais}, title = {{NOCUST} - {A} Non-Custodial 2nd-Layer Financial Intermediary}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {642}, year = {2018}, url = {https://eprint.iacr.org/2018/642}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhalilG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhanDM18, author = {Haibat Khan and Benjamin Dowling and Keith M. Martin}, title = {Identity Confidentiality in 5G Mobile Telephony Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {876}, year = {2018}, url = {https://eprint.iacr.org/2018/876}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhanDM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Khazaei18, author = {Shahram Khazaei}, title = {Conjecturally Superpolynomial Lower Bound for Share Size}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {143}, year = {2018}, url = {http://eprint.iacr.org/2018/143}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Khazaei18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhuranaOS18, author = {Dakshita Khurana and Rafail Ostrovsky and Akshayaram Srinivasan}, title = {Round Optimal Black-Box {\textquotedblleft}Commit-and-Prove{\textquotedblright}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {921}, year = {2018}, url = {https://eprint.iacr.org/2018/921}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhuranaOS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasKLSZ18, author = {Aggelos Kiayias and Annabell Kuldmaa and Helger Lipmaa and Janno Siim and Thomas Zacharias}, title = {On the Security Properties of e-Voting Bulletin Boards}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {567}, year = {2018}, url = {https://eprint.iacr.org/2018/567}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasKLSZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasLT18, author = {Aggelos Kiayias and Feng{-}Hao Liu and Yiannis Tselekounis}, title = {Non-Malleable Codes for Partial Functions with Manipulation Detection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {538}, year = {2018}, url = {https://eprint.iacr.org/2018/538}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasLT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasORT18, author = {Aggelos Kiayias and Murat Osmanoglu and Alexander Russell and Qiang Tang}, title = {Space Efficient Computational Multi-Secret Sharing and Its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1010}, year = {2018}, url = {https://eprint.iacr.org/2018/1010}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasORT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasR18, author = {Aggelos Kiayias and Alexander Russell}, title = {Ouroboros-BFT: {A} Simple Byzantine Fault Tolerant Consensus Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1049}, year = {2018}, url = {https://eprint.iacr.org/2018/1049}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasZ18, author = {Aggelos Kiayias and Dionysis Zindros}, title = {Proof-of-Work Sidechains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1048}, year = {2018}, url = {https://eprint.iacr.org/2018/1048}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KikuchiIMHC18, author = {Ryo Kikuchi and Dai Ikarashi and Takahiro Matsuda and Koki Hamada and Koji Chida}, title = {Efficient Bit-Decomposition and Modulus-Conversion Protocols with an Honest Majority}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {387}, year = {2018}, url = {https://eprint.iacr.org/2018/387}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KikuchiIMHC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KilincV18, author = {Handan Kilin{\c{c}} and Serge Vaudenay}, title = {Formal Analysis of Distance Bounding with Secure Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {440}, year = {2018}, url = {https://eprint.iacr.org/2018/440}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KilincV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimJH18, author = {Panjin Kim and Kyung Chul Jeong and Daewan Han}, title = {Time-Space Complexity of Quantum Search Algorithms in Symmetric Cryptanalysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {452}, year = {2018}, url = {https://eprint.iacr.org/2018/452}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimJH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimLKOHJO18, author = {Jihye Kim and Jiwon Lee and Hankyung Ko and Donghwan Oh and Semin Han and Kwonho Jeong and Hyunok Oh}, title = {AuthCropper: Authenticated Image Cropper for Privacy Preserving Surveillance Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1202}, year = {2018}, url = {https://eprint.iacr.org/2018/1202}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimLKOHJO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimLP18, author = {Eunkyung Kim and Hyang{-}Sook Lee and Jeongeun Park}, title = {Towards Round-Optimal Secure Multiparty Computations: Multikey {FHE} without a {CRS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1156}, year = {2018}, url = {https://eprint.iacr.org/2018/1156}, timestamp = {Tue, 26 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimLP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimPHBH18, author = {Jaehun Kim and Stjepan Picek and Annelie Heuser and Shivam Bhasin and Alan Hanjalic}, title = {Make Some Noise: Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1023}, year = {2018}, url = {https://eprint.iacr.org/2018/1023}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimPHBH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimS0XJ18, author = {Miran Kim and Yongsoo Song and Shuang Wang and Yuhou Xia and Xiaoqian Jiang}, title = {Secure Logistic Regression based on Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {74}, year = {2018}, url = {http://eprint.iacr.org/2018/074}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimS0XJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimS18, author = {Duhyeong Kim and Yongsoo Song}, title = {Approximate Homomorphic Encryption over the Conjugate-invariant Ring}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {952}, year = {2018}, url = {https://eprint.iacr.org/2018/952}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimSKLC18, author = {Andrey Kim and Yongsoo Song and Miran Kim and Keewoo Lee and Jung Hee Cheon}, title = {Logistic Regression Model Training based on the Approximate Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {254}, year = {2018}, url = {http://eprint.iacr.org/2018/254}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimSKLC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimW18, author = {Sam Kim and David J. Wu}, title = {Multi-Theorem Preprocessing NIZKs from Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {272}, year = {2018}, url = {https://eprint.iacr.org/2018/272}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimW18a, author = {Sam Kim and David J. Wu}, title = {Watermarking PRFs from Lattices: Stronger Security via Extractable PRFs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {986}, year = {2018}, url = {https://eprint.iacr.org/2018/986}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimW18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimYKPH18, author = {Suhri Kim and Kisoon Yoon and Jihoon Kwon and Young{-}Ho Park and Seokhie Hong}, title = {New Hybrid Method for Isogeny-based Cryptosystems using Edwards Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1215}, year = {2018}, url = {https://eprint.iacr.org/2018/1215}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimYKPH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KirianskyLADE18, author = {Vladimir Kiriansky and Ilia A. Lebedev and Saman P. Amarasinghe and Srinivas Devadas and Joel S. Emer}, title = {{DAWG:} {A} Defense Against Cache Timing Attacks in Speculative Execution Processors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {418}, year = {2018}, url = {https://eprint.iacr.org/2018/418}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KirianskyLADE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kiryukhin18, author = {Vitaly Kiryukhin}, title = {Exact maximum expected differential and linear probability for 2-round Kuznyechik}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1085}, year = {2018}, url = {https://eprint.iacr.org/2018/1085}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kiryukhin18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KishoreKVS18, author = {Ravi Kishore and Ashutosh Kumar and Chiranjeevi Vanarasa and Kannan Srinathan}, title = {On the Price of Proactivizing Round-Optimal Perfectly Secret Message Transmission}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1167}, year = {2018}, url = {https://eprint.iacr.org/2018/1167}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KishoreKVS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KissNLAS18, author = {{\'{A}}gnes Kiss and Masoud Naderpour and Jian Liu and N. Asokan and Thomas Schneider}, title = {SoK: Modular and Efficient Private Decision Tree Evaluation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1099}, year = {2018}, url = {https://eprint.iacr.org/2018/1099}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KissNLAS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KitagawaNTY18, author = {Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka and Takashi Yamakawa}, title = {Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {974}, year = {2018}, url = {https://eprint.iacr.org/2018/974}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KitagawaNTY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KitagawaT18, author = {Fuyuki Kitagawa and Keisuke Tanaka}, title = {A Framework for Achieving {KDM-CCA} Secure Public-Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {845}, year = {2018}, url = {https://eprint.iacr.org/2018/845}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KitagawaT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kiyoshima18, author = {Susumu Kiyoshima}, title = {No-signaling Linear PCPs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {649}, year = {2018}, url = {https://eprint.iacr.org/2018/649}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kiyoshima18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Klein18, author = {Dominik Klein}, title = {Key-Secrecy of {PACE} with OTS/CafeOBJ}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {510}, year = {2018}, url = {https://eprint.iacr.org/2018/510}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Klein18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KleinjungW18, author = {Thorsten Kleinjung and Benjamin Wesolowski}, title = {A new perspective on the powers of two descent for discrete logarithms in finite fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {647}, year = {2018}, url = {https://eprint.iacr.org/2018/647}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KleinjungW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KluczniakA18, author = {Kamil Kluczniak and Man Ho Au}, title = {Fine-Tuning Decentralized Anonymous Payment Systems based on Arguments for Arithmetic Circuit Satisfiability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {176}, year = {2018}, url = {http://eprint.iacr.org/2018/176}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KluczniakA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kobeissi18, author = {Nadim Kobeissi}, title = {Capsule: {A} Protocol for Secure Collaborative Document Editing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {253}, year = {2018}, url = {http://eprint.iacr.org/2018/253}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kobeissi18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kobeissi18a, author = {Nadim Kobeissi}, title = {An Analysis of the ProtonMail Cryptographic Architecture}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1121}, year = {2018}, url = {https://eprint.iacr.org/2018/1121}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kobeissi18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KobeissiB18, author = {Nadim Kobeissi and Karthikeyan Bhargavan}, title = {Noise Explorer: Fully Automated Modeling and Verification for Arbitrary Noise Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {766}, year = {2018}, url = {https://eprint.iacr.org/2018/766}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KobeissiB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KobeissiK18, author = {Nadim Kobeissi and Natalia Kulatova}, title = {Ledger Design Language: Towards Formal Reasoning and Implementation for Public Ledgers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {416}, year = {2018}, url = {https://eprint.iacr.org/2018/416}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KobeissiK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Koch18, author = {Alexander Koch}, title = {The Landscape of Optimal Card-based Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {951}, year = {2018}, url = {https://eprint.iacr.org/2018/951}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Koch18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KochW18, author = {Alexander Koch and Stefan Walzer}, title = {Private Function Evaluation with Cards}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1113}, year = {2018}, url = {https://eprint.iacr.org/2018/1113}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KochW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kokoris-KogiasA18, author = {Eleftherios Kokoris{-}Kogias and Enis Ceyhun Alp and Sandra Deepthy Siby and Nicolas Gailly and Philipp Jovanovic and Linus Gasser and Bryan Ford}, title = {Hidden in Plain Sight: Storing and Managing Secrets on a Public Ledger}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {209}, year = {2018}, url = {http://eprint.iacr.org/2018/209}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kokoris-KogiasA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kolesnikov18, author = {Vladimir Kolesnikov}, title = {Free {IF:} How to Omit Inactive Branches and Implement S-Universal Garbled Circuit (Almost) for Free}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {789}, year = {2018}, url = {https://eprint.iacr.org/2018/789}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kolesnikov18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KomanoSM18, author = {Yuichi Komano and Hideo Shimizu and Hideyuki Miyake}, title = {Integrative Acceleration of First-Order Boolean Masking for Embedded IoT Devices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {934}, year = {2018}, url = {https://eprint.iacr.org/2018/934}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KomanoSM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KomargodskiY18, author = {Ilan Komargodski and Eylon Yogev}, title = {Another Step Towards Realizing Random Oracles: Non-Malleable Point Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {149}, year = {2018}, url = {http://eprint.iacr.org/2018/149}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KomargodskiY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KomargodskiY18a, author = {Ilan Komargodski and Eylon Yogev}, title = {On Distributional Collision Resistant Hashing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {480}, year = {2018}, url = {https://eprint.iacr.org/2018/480}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KomargodskiY18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KoppKBP18, author = {Henning Kopp and Frank Kargl and Christoph B{\"{o}}sch and Andreas Peter}, title = {uMine: a Blockchain based on Human Miners}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {722}, year = {2018}, url = {https://eprint.iacr.org/2018/722}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KoppKBP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KoppermannPHS18, author = {Philipp Koppermann and Eduard Pop and Johann Heyszl and Georg Sigl}, title = {18 Seconds to Key Exchange: Limitations of Supersingular Isogeny Diffie-Hellman on Embedded Devices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {932}, year = {2018}, url = {https://eprint.iacr.org/2018/932}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KoppermannPHS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KoppulaW18, author = {Venkata Koppula and Brent Waters}, title = {Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {847}, year = {2018}, url = {https://eprint.iacr.org/2018/847}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KoppulaW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KornaropoulosPT18, author = {Evgenios M. Kornaropoulos and Charalampos Papamanthou and Roberto Tamassia}, title = {Data Recovery on Encrypted Databases With k-Nearest Neighbor Query Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {719}, year = {2018}, url = {https://eprint.iacr.org/2018/719}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KornaropoulosPT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KotovMMPU18, author = {Matvei Kotov and Anton Menshov and Alex D. Myasnikov and Dmitry Panteleev and Alexander Ushakov}, title = {Conjugacy Separation Problem in Braids: an Attack on the Original Colored Burau Key Agreement Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {491}, year = {2018}, url = {https://eprint.iacr.org/2018/491}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KotovMMPU18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KotovMU18, author = {Matvei Kotov and Anton Menshov and Alexander Ushakov}, title = {{AN} {ATTACK} {ON} {THE} {WALNUT} {DIGITAL} {SIGNATURE} {ALGORITHM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {393}, year = {2018}, url = {https://eprint.iacr.org/2018/393}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KotovMU18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KotovMU18a, author = {Matvei Kotov and Anton Menshov and Alexander Ushakov}, title = {Attack on Kayawood Protocol: Uncloaking Private Keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {604}, year = {2018}, url = {https://eprint.iacr.org/2018/604}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KotovMU18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KounavisDDPD18, author = {Michael E. Kounavis and David Durham and Sergej Deutsch and Antonios Papadimitriou and Amitabh Das}, title = {Cryptographic Constructions Supporting Implicit Data Integrity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {534}, year = {2018}, url = {https://eprint.iacr.org/2018/534}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KounavisDDPD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KovalenkoK18, author = {Bohdan Kovalenko and Anton Kudin}, title = {Kleptography trapdoor free cryptographic protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {989}, year = {2018}, url = {https://eprint.iacr.org/2018/989}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KovalenkoK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KowalczykLMM18, author = {Lucas Kowalczyk and Jiahui Liu and Tal Malkin and Kailash Meiyappan}, title = {Mitigating the One-Use Restriction in Attribute-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {645}, year = {2018}, url = {https://eprint.iacr.org/2018/645}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KowalczykLMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KraitsbergLOSA18, author = {Michael Kraitsberg and Yehuda Lindell and Valery Osheter and Nigel P. Smart and Younes Talibi Alaoui}, title = {Adding Distributed Decryption and Key Generation to a Ring-LWE Based {CCA} Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1034}, year = {2018}, url = {https://eprint.iacr.org/2018/1034}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KraitsbergLOSA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KrennPSS18, author = {Stephan Krenn and Henrich C. P{\"{o}}hls and Kai Samelin and Daniel Slamanig}, title = {Protean Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {970}, year = {2018}, url = {https://eprint.iacr.org/2018/970}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KrennPSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KrennPSS18a, author = {Stephan Krenn and Henrich C. P{\"{o}}hls and Kai Samelin and Daniel Slamanig}, title = {Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {971}, year = {2018}, url = {https://eprint.iacr.org/2018/971}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KrennPSS18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KrennSS18, author = {Stephan Krenn and Kai Samelin and Dieter Sommer}, title = {Stronger Security for Sanitizable Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {858}, year = {2018}, url = {https://eprint.iacr.org/2018/858}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KrennSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KubilayKM18, author = {Murat Yasin Kubilay and Mehmet Sabir Kiraz and Haci Ali Mantar}, title = {CertLedger: {A} New {PKI} Model with Certificate Transparency Based on Blockchain}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1071}, year = {2018}, url = {https://eprint.iacr.org/2018/1071}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KubilayKM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KulykV18, author = {Oksana Kulyk and Melanie Volkamer}, title = {Usability is not Enough: Lessons Learned from 'Human Factors in Security' Research for Verifiability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {683}, year = {2018}, url = {https://eprint.iacr.org/2018/683}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KulykV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KumarLLAPBWZ18, author = {Vireshwar Kumar and He Li and Noah Luther and Pranav Asokan and Jung{-}Min "Jerry" Park and Kaigui Bian and Martin B. H. Weiss and Taieb Znati}, title = {Direct Anonymous Attestation with Efficient Verifier-Local Revocation for Subscription System}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {290}, year = {2018}, url = {https://eprint.iacr.org/2018/290}, timestamp = {Sat, 26 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KumarLLAPBWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KumarMS18, author = {Ashutosh Kumar and Raghu Meka and Amit Sahai}, title = {Leakage-Resilient Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1138}, year = {2018}, url = {https://eprint.iacr.org/2018/1138}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KumarMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KumarMS18a, author = {Rajendra Kumar and Nikhil Mittal and Shashank Singh}, title = {Cryptanalysis of 2-round {KECCAK-384}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1191}, year = {2018}, url = {https://eprint.iacr.org/2018/1191}, timestamp = {Fri, 28 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KumarMS18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KumawatP18, author = {Sudhakar Kumawat and Souradyuti Paul}, title = {A New Constant-size Accountable Ring Signature Scheme Without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {242}, year = {2018}, url = {http://eprint.iacr.org/2018/242}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KumawatP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KunnemannG018, author = {Robert K{\"{u}}nnemann and Deepak Garg and Michael Backes}, title = {Accountability in Security Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {127}, year = {2018}, url = {http://eprint.iacr.org/2018/127}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KunnemannG018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KutylowskiHK18, author = {Miroslaw Kutylowski and Lucjan Hanzlik and Kamil Kluczniak}, title = {Towards Practical Security of Pseudonymous Signature on the {BSI} eIDAS Token}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1148}, year = {2018}, url = {https://eprint.iacr.org/2018/1148}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KutylowskiHK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LaVigneZMMMT18, author = {Rio LaVigne and Chen{-}Da Liu Zhang and Ueli Maurer and Tal Moran and Marta Mularczyk and Daniel Tschudi}, title = {Topology-Hiding Computation Beyond Semi-Honest Adversaries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {255}, year = {2018}, url = {http://eprint.iacr.org/2018/255}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LaVigneZMMMT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LaanPRRSV18, author = {Ebo van der Laan and Erik Poll and Joost Rijneveld and Joeri de Ruiter and Peter Schwabe and Jan Verschuren}, title = {Is Java Card ready for hash-based signatures?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {611}, year = {2018}, url = {https://eprint.iacr.org/2018/611}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LaanPRRSV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LaarhovenM18, author = {Thijs Laarhoven and Artur Mariano}, title = {Progressive lattice sieving}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {79}, year = {2018}, url = {http://eprint.iacr.org/2018/079}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LaarhovenM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LaiM18, author = {Russell W. F. Lai and Giulio Malavolta}, title = {Optimal Succinct Arguments via Hidden Order Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {705}, year = {2018}, url = {https://eprint.iacr.org/2018/705}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LaiM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LaiMS18, author = {Russell W. F. Lai and Giulio Malavolta and Dominique Schr{\"{o}}der}, title = {Homomorphic Secret Sharing for Low Degree Polynomials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1065}, year = {2018}, url = {https://eprint.iacr.org/2018/1065}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LaiMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LaiPSLMSSLZ18, author = {Shangqi Lai and Sikhar Patranabis and Amin Sakzad and Joseph K. Liu and Debdeep Mukhopadhyay and Ron Steinfeld and Shifeng Sun and Dongxi Liu and Cong Zuo}, title = {Result Pattern Hiding Searchable Encryption for Conjunctive Queries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1168}, year = {2018}, url = {https://eprint.iacr.org/2018/1168}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LaiPSLMSSLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LapidW18, author = {Ben Lapid and Avishai Wool}, title = {Cache-Attacks on the {ARM} TrustZone implementations of {AES-256} and {AES-256-GCM} via GPU-based analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {621}, year = {2018}, url = {https://eprint.iacr.org/2018/621}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LapidW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lara-NinoDM18, author = {Carlos Andres Lara{-}Nino and Arturo Diaz{-}Perez and Miguel Morales{-}Sandoval}, title = {FPGA-based Assessment of Midori and {GIFT} Lightweight Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {979}, year = {2018}, url = {https://eprint.iacr.org/2018/979}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lara-NinoDM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LarsenN18, author = {Kasper Green Larsen and Jesper Buus Nielsen}, title = {Yes, There is an Oblivious {RAM} Lower Bound!}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {423}, year = {2018}, url = {https://eprint.iacr.org/2018/423}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LarsenN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeGrowJA18, author = {Jason T. LeGrow and David Jao and Reza Azarderakhsh}, title = {Modeling Quantum-Safe Authenticated Key Establishment, and an Isogeny-Based Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {282}, year = {2018}, url = {https://eprint.iacr.org/2018/282}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeGrowJA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeKK18, author = {Duc Viet Le and Mahimna Kelkar and Aniket Kate}, title = {Flexible Signatures: Towards Making Authentication Suitable for Real-Time Environments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {343}, year = {2018}, url = {https://eprint.iacr.org/2018/343}, timestamp = {Mon, 29 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LeKK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LebedevHD18, author = {Ilia A. Lebedev and Kyle Hogan and Srinivas Devadas}, title = {Secure Boot and Remote Attestation in the Sanctum Processor}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {427}, year = {2018}, url = {https://eprint.iacr.org/2018/427}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LebedevHD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeJK18, author = {Seungkwang Lee and Nam{-}Su Jho and Myungchul Kim}, title = {A Key Leakage Preventive White-box Cryptographic Implementation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1047}, year = {2018}, url = {https://eprint.iacr.org/2018/1047}, timestamp = {Mon, 05 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeJK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeK18, author = {Suhyeon Lee and Seungjoo Kim}, title = {Countering Block Withholding Attack Effciently}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1211}, year = {2018}, url = {https://eprint.iacr.org/2018/1211}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeK18a, author = {Suhyeon Lee and Seungjoo Kim}, title = {Pooled Mining Makes Selfish Mining Tricky}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1230}, year = {2018}, url = {https://eprint.iacr.org/2018/1230}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeK18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeKK18, author = {Jung{-}Keun Lee and Bonwook Koo and Woo{-}Hwan Kim}, title = {Related-Key Linear Cryptanalysis on {SIMON}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {152}, year = {2018}, url = {http://eprint.iacr.org/2018/152}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeKK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeKKSSC18, author = {Joohee Lee and Dongwoo Kim and Duhyeong Kim and Yongsoo Song and Junbum Shin and Jung Hee Cheon}, title = {Instant Privacy-Preserving Biometric Authentication for Hamming Distance}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1214}, year = {2018}, url = {https://eprint.iacr.org/2018/1214}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeKKSSC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeL18, author = {ByeongHak Lee and Jooyoung Lee}, title = {Tweakable Block Ciphers Secure Beyond the Birthday Bound in the Ideal Cipher Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {784}, year = {2018}, url = {https://eprint.iacr.org/2018/784}, timestamp = {Tue, 19 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LeeL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeWZ18, author = {Hyung Tae Lee and Huaxiong Wang and Kai Zhang}, title = {Security Analysis and Modification of ID-Based Encryption with Equality Test from {ACISP} 2017}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {369}, year = {2018}, url = {https://eprint.iacr.org/2018/369}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeermakersS18, author = {Daan Leermakers and Boris Skoric}, title = {Security proof for Quantum Key Recycling with noise}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {264}, year = {2018}, url = {http://eprint.iacr.org/2018/264}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeermakersS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LehmannT18, author = {Anja Lehmann and Bj{\"{o}}rn Tackmann}, title = {Updatable Encryption with Post-Compromise Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {118}, year = {2018}, url = {http://eprint.iacr.org/2018/118}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LehmannT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeontiadisV18, author = {Iraklis Leontiadis and Serge Vaudenay}, title = {Private Message Franking with After Opening Privacy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {938}, year = {2018}, url = {https://eprint.iacr.org/2018/938}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeontiadisV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LermanPVM18, author = {Liran Lerman and Stjepan Picek and Nikita Veshchikov and Olivier Markowitch}, title = {Higher Order Side-Channel Attacks Resilient S-boxes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {6}, year = {2018}, url = {http://eprint.iacr.org/2018/006}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LermanPVM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeungSGZ18, author = {Derek Leung and Adam Suhl and Yossi Gilad and Nickolai Zeldovich}, title = {Vault: Fast Bootstrapping for Cryptocurrencies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {269}, year = {2018}, url = {http://eprint.iacr.org/2018/269}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeungSGZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeurentNS18, author = {Ga{\"{e}}tan Leurent and Mridul Nandi and Ferdinand Sibleyras}, title = {Generic Attacks against Beyond-Birthday-Bound MACs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {541}, year = {2018}, url = {https://eprint.iacr.org/2018/541}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeurentNS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeurentS18, author = {Ga{\"{e}}tan Leurent and Ferdinand Sibleyras}, title = {The Missing Difference Problem, and its Applications to Counter Mode Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {159}, year = {2018}, url = {http://eprint.iacr.org/2018/159}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeurentS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LewiRWLXY18, author = {Kevin Lewi and Callen Rain and Stephen A. Weis and Yueting Lee and Haozhi Xiong and Benjamin Yang}, title = {Scaling Backend Authentication at Facebook}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {413}, year = {2018}, url = {https://eprint.iacr.org/2018/413}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LewiRWLXY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Li18, author = {Xin Li}, title = {Non-Malleable Extractors and Non-Malleable Codes: Partially Optimal Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {353}, year = {2018}, url = {https://eprint.iacr.org/2018/353}, timestamp = {Tue, 06 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Li18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiLNC18, author = {Fenghua Li and Hui Li and Ben Niu and Jinjun Chen}, title = {Privacy Computing: Concept, Computing Framework And Future Development Trends}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1145}, year = {2018}, url = {https://eprint.iacr.org/2018/1145}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiLNC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiLPX18, author = {Haoyu Li and Renzhang Liu and Yanbin Pan and Tianyuan Xie}, title = {Cryptanalysis of Compact-LWE Submitted to {NIST} {PQC} Project}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {20}, year = {2018}, url = {http://eprint.iacr.org/2018/020}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiLPX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiM18, author = {Baiyu Li and Daniele Micciancio}, title = {Symbolic security of garbled circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {141}, year = {2018}, url = {http://eprint.iacr.org/2018/141}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiXY18, author = {Zhe Li and Chaoping Xing and Sze Ling Yeo}, title = {Reducing the Key Size of McEliece Cryptosystem from Goppa Codes via Permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1029}, year = {2018}, url = {https://eprint.iacr.org/2018/1029}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiXY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiYAKV18, author = {Songze Li and Mingchao Yu and Amir Salman Avestimehr and Sreeram Kannan and Pramod Viswanath}, title = {PolyShard: Coded Sharding Achieves Linearly Scaling Efficiency and Security Simultaneously}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {925}, year = {2018}, url = {https://eprint.iacr.org/2018/925}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiYAKV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiZGQ18, author = {Yin Li and Yu Zhang and Xiaoli Guo and Chuanda Qi}, title = {N-term Karatsuba Algorithm and its Application to Multiplier designs for Special Trinomials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {605}, year = {2018}, url = {https://eprint.iacr.org/2018/605}, timestamp = {Thu, 15 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiZGQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiZYHLL18, author = {Ningbo Li and Tanping Zhou and Xiaoyuan Yang and Yiliang Han and Longfei Liu and Wenchao Liu}, title = {Two round multiparty computation via Multi-key fully homomorphic encryption with faster homomorphic evaluations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1249}, year = {2018}, url = {https://eprint.iacr.org/2018/1249}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LiZYHLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Liang18, author = {Min Liang}, title = {Teleportation-based quantum homomorphic encryption scheme with quasi-compactness and perfect security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1209}, year = {2018}, url = {https://eprint.iacr.org/2018/1209}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Liang18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertLNW18, author = {Beno{\^{\i}}t Libert and San Ling and Khoa Nguyen and Huaxiong Wang}, title = {Lattice-Based Zero-Knowledge Arguments for Integer Relations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {716}, year = {2018}, url = {https://eprint.iacr.org/2018/716}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LibertLNW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertST18, author = {Beno{\^{\i}}t Libert and Damien Stehl{\'{e}} and Radu Titiu}, title = {Adaptively Secure Distributed PRFs from {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {927}, year = {2018}, url = {https://eprint.iacr.org/2018/927}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LibertST18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinCGSW18, author = {Fuchun Lin and Mahdi Cheraghchi and Venkatesan Guruswami and Reihaneh Safavi{-}Naini and Huaxiong Wang}, title = {Secret Sharing with Binary Shares}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {746}, year = {2018}, url = {https://eprint.iacr.org/2018/746}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinCGSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinM18, author = {Huijia Lin and Christian Matt}, title = {Pseudo Flawed-Smudging Generators and Their Application to Indistinguishability Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {646}, year = {2018}, url = {https://eprint.iacr.org/2018/646}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinSX18, author = {Wei{-}Kai Lin and Elaine Shi and Tiancheng Xie}, title = {Can We Overcome the n log n Barrier for Oblivious Sorting?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {227}, year = {2018}, url = {http://eprint.iacr.org/2018/227}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinSX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LindellNR18, author = {Yehuda Lindell and Ariel Nof and Samuel Ranellucci}, title = {Fast Secure Multiparty {ECDSA} with Practical Distributed Key Generation and Applications to Cryptocurrency Custody}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {987}, year = {2018}, url = {https://eprint.iacr.org/2018/987}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LindellNR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LingNWX18, author = {San Ling and Khoa Nguyen and Huaxiong Wang and Yanhong Xu}, title = {Constant-size Group Signatures from Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {34}, year = {2018}, url = {http://eprint.iacr.org/2018/034}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LingNWX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LingNWX18a, author = {San Ling and Khoa Nguyen and Huaxiong Wang and Yanhong Xu}, title = {Accountable Tracing Signatures from Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1251}, year = {2018}, url = {https://eprint.iacr.org/2018/1251}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LingNWX18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Liu18, author = {Fukang Liu}, title = {Efficient Collision Attack Frameworks for {RIPEMD-160}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {652}, year = {2018}, url = {https://eprint.iacr.org/2018/652}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Liu18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Liu18a, author = {Fukang Liu}, title = {Finding Ordinary Cube Variables for Keccak-MAC with Greedy Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {799}, year = {2018}, url = {https://eprint.iacr.org/2018/799}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Liu18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuV18, author = {Tianren Liu and Vinod Vaikuntanathan}, title = {Breaking the Circuit-Size Barrier in Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {333}, year = {2018}, url = {https://eprint.iacr.org/2018/333}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuW18, author = {Zhen Liu and Duncan S. Wong}, title = {On Enabling Attribute-Based Encryption to Be Traceable against Traitors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {963}, year = {2018}, url = {https://eprint.iacr.org/2018/963}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuY0L18, author = {Joseph K. Liu and Tsz Hon Yuen and Peng Zhang and Kaitai Liang}, title = {Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {330}, year = {2018}, url = {https://eprint.iacr.org/2018/330}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuY0L18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuYWL18, author = {Meicheng Liu and Jingchun Yang and Wenhao Wang and Dongdai Lin}, title = {Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {158}, year = {2018}, url = {http://eprint.iacr.org/2018/158}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuYWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuYWNW18, author = {Zhen Liu and Guomin Yang and Duncan S. Wong and Khoa Nguyen and Huaxiong Wang}, title = {Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {956}, year = {2018}, url = {https://eprint.iacr.org/2018/956}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LiuYWNW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuZ18, author = {Qipeng Liu and Mark Zhandry}, title = {On Finding Quantum Multi-collisions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1096}, year = {2018}, url = {https://eprint.iacr.org/2018/1096}, timestamp = {Fri, 30 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LochbihlerS18, author = {Andreas Lochbihler and S. Reza Sefidgar}, title = {A tutorial introduction to CryptHOL}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {941}, year = {2018}, url = {https://eprint.iacr.org/2018/941}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LochbihlerS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lochter18, author = {Manfred Lochter}, title = {Blockchain as cryptanalytic tool}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {893}, year = {2018}, url = {https://eprint.iacr.org/2018/893}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lochter18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LohrkeTKBS18, author = {Heiko Lohrke and Shahin Tajik and Thilo Krachenfels and Christian Boit and Jean{-}Pierre Seifert}, title = {Key Extraction using Thermal Laser Stimulation: {A} Case Study on Xilinx Ultrascale FPGAs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {717}, year = {2018}, url = {https://eprint.iacr.org/2018/717}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LohrkeTKBS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Longa18, author = {Patrick Longa}, title = {A Note on Post-Quantum Authenticated Key Exchange from Supersingular Isogenies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {267}, year = {2018}, url = {http://eprint.iacr.org/2018/267}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Longa18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LossM18, author = {Julian Loss and Tal Moran}, title = {Combining Asynchronous and Synchronous Byzantine Agreement: The Best of Both Worlds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {235}, year = {2018}, url = {http://eprint.iacr.org/2018/235}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LossM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuAZ18, author = {Xingye Lu and Man Ho Au and Zhenfei Zhang}, title = {Raptor: {A} Practical Lattice-Based (Linkable) Ring Signature}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {857}, year = {2018}, url = {https://eprint.iacr.org/2018/857}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuAZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuLZJXHL18, author = {Xianhui Lu and Yamin Liu and Zhenfei Zhang and Dingding Jia and Haiyang Xue and Jingnan He and Bao Li}, title = {{LAC:} Practical Ring-LWE Based Public-Key Encryption with Byte-Level Modulus}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1009}, year = {2018}, url = {https://eprint.iacr.org/2018/1009}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuLZJXHL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuykxP18, author = {Atul Luykx and Bart Preneel}, title = {Optimal Forgeries Against Polynomial-Based MACs and {GCM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {166}, year = {2018}, url = {http://eprint.iacr.org/2018/166}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuykxP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LyuLHG18, author = {Lin Lyu and Shengli Liu and Shuai Han and Dawu Gu}, title = {Tightly {SIM-SO-CCA} Secure Public Key Encryption from Standard Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {30}, year = {2018}, url = {http://eprint.iacr.org/2018/030}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LyuLHG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MadalaJC18, author = {D. S. V. Madala and Mahabir Prasad Jhanwar and Anupam Chattopadhyay}, title = {Certificate Transparency Using Blockchain}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1232}, year = {2018}, url = {https://eprint.iacr.org/2018/1232}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/MadalaJC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaghrebiP18, author = {Houssem Maghrebi and Emmanuel Prouff}, title = {On the Use of Independent Component Analysis to Denoise Side-Channel Measurements}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {177}, year = {2018}, url = {http://eprint.iacr.org/2018/177}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaghrebiP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MahalanobisM18, author = {Ayan Mahalanobis and Vivek Mallick}, title = {A Las Vegas algorithm to solve the elliptic curve discrete logarithm problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {134}, year = {2018}, url = {http://eprint.iacr.org/2018/134}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MahalanobisM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MahdionSHM18, author = {Parinaz Mahdion and Hadi Soleimany and Pouya Habibi and Farokhlagha Moazami}, title = {New Single-Trace Side-Channel Attacks on a Specific Class of Elgamal Cryptosystem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {761}, year = {2018}, url = {https://eprint.iacr.org/2018/761}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MahdionSHM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MahloujifarMM18, author = {Saeed Mahloujifar and Mohammad Mahmoody and Ameer Mohammed}, title = {Multi-party Poisoning through Generalized p-Tampering}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {854}, year = {2018}, url = {https://eprint.iacr.org/2018/854}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MahloujifarMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MahriSBDW18, author = {Hassan Qahur Al Mahri and Leonie Simpson and Harry Bartlett and Ed Dawson and Kenneth Koon{-}Ho Wong}, title = {Tweaking Generic {OTR} to Avoid Forgery Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {66}, year = {2018}, url = {http://eprint.iacr.org/2018/066}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MahriSBDW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaimutT18, author = {Diana Maimut and George Teseleanu}, title = {New Configurations of Grain Ciphers: Security Against Slide Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {692}, year = {2018}, url = {https://eprint.iacr.org/2018/692}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaimutT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaimutT18a, author = {Diana Maimut and George Teseleanu}, title = {A Unified Security Perspective on Legally Fair Contract Signing Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1027}, year = {2018}, url = {https://eprint.iacr.org/2018/1027}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaimutT18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaininiH18, author = {Pascal Mainini and Rolf Haenni}, title = {Outsourcing Modular Exponentiation in Cryptographic Web Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {300}, year = {2018}, url = {https://eprint.iacr.org/2018/300}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaininiH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MalacariaKPPL18, author = {Pasquale Malacaria and M. H. R. Khouzani and Corina S. Pasareanu and Quoc{-}Sang Phan and Kasper S{\o}e Luckow}, title = {Symbolic Side-Channel Analysis for Probabilistic Programs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {329}, year = {2018}, url = {https://eprint.iacr.org/2018/329}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MalacariaKPPL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MalavoltaMSKM18, author = {Giulio Malavolta and Pedro Moreno{-}Sanchez and Clara Schneidewind and Aniket Kate and Matteo Maffei}, title = {Multi-Hop Locks for Secure, Privacy-Preserving and Interoperable Payment-Channel Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {472}, year = {2018}, url = {https://eprint.iacr.org/2018/472}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MalavoltaMSKM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MandalD18, author = {Mriganka Mandal and Ratna Dutta}, title = {Cost-Effective Private Linear Key Agreement With Adaptive {CCA} Security from Prime Order Multilinear Maps and Tracing Traitors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {508}, year = {2018}, url = {https://eprint.iacr.org/2018/508}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MandalD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MandalMMR18, author = {Avradip Mandal and John C. Mitchell and Hart Montgomery and Arnab Roy}, title = {Data Oblivious Genome Variants Search on Intel {SGX}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {732}, year = {2018}, url = {https://eprint.iacr.org/2018/732}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MandalMMR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MangipudiRCK18, author = {Easwar Vivek Mangipudi and Krutarth Rao and Jeremy Clark and Aniket Kate}, title = {Automated Penalization of Data Breaches using Crypto-augmented Smart Contracts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1050}, year = {2018}, url = {https://eprint.iacr.org/2018/1050}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MangipudiRCK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MarcusHG18, author = {Yuval Marcus and Ethan Heilman and Sharon Goldberg}, title = {Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {236}, year = {2018}, url = {http://eprint.iacr.org/2018/236}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MarcusHG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MartinM18, author = {Daniel P. Martin and Marco Martinoli}, title = {A Note on Key Rank}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {614}, year = {2018}, url = {https://eprint.iacr.org/2018/614}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MartinM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MastanP18, author = {Indra Deep Mastan and Souradyuti Paul}, title = {A New Approach to Deanonymization of Unreachable Bitcoin Nodes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {243}, year = {2018}, url = {http://eprint.iacr.org/2018/243}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MastanP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MasureDP18, author = {Lo{\"{\i}}c Masure and C{\'{e}}cile Dumas and Emmanuel Prouff}, title = {Gradient Visualization for General Characterization in Profiling Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1196}, year = {2018}, url = {https://eprint.iacr.org/2018/1196}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MasureDP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MateticSMJC18, author = {Sinisa Matetic and Moritz Schneider and Andrew Miller and Ari Juels and Srdjan Capkun}, title = {DelegaTEE: Brokered Delegation Using Trusted Execution Environments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {160}, year = {2018}, url = {http://eprint.iacr.org/2018/160}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MateticSMJC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MateticWSKKC18, author = {Sinisa Matetic and Karl W{\"{u}}st and Moritz Schneider and Kari Kostiainen and Ghassan Karame and Srdjan Capkun}, title = {{BITE:} Bitcoin Lightweight Client Privacy using Trusted Execution}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {803}, year = {2018}, url = {https://eprint.iacr.org/2018/803}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MateticWSKKC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MateticWSMKC18, author = {Sinisa Matetic and Karl W{\"{u}}st and Moritz Schneider and Ian Miers and Kari Kostiainen and Srdjan Capkun}, title = {ZLiTE: Lightweight Clients for Shielded Zcash Transactions using Trusted Execution}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1024}, year = {2018}, url = {https://eprint.iacr.org/2018/1024}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MateticWSMKC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MatsudaTK18, author = {Yoshitatsu Matsuda and Tadanori Teruya and Kenji Kashiwabara}, title = {Estimation of the Success Probability of Random Sampling by the Gram-Charlier Approximation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {815}, year = {2018}, url = {https://eprint.iacr.org/2018/815}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MatsudaTK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaxwellPSW18, author = {Gregory Maxwell and Andrew Poelstra and Yannick Seurin and Pieter Wuille}, title = {Simple Schnorr Multi-Signatures with Applications to Bitcoin}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {68}, year = {2018}, url = {http://eprint.iacr.org/2018/068}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaxwellPSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MayH18, author = {Alexander May and Gottfried Herold}, title = {{LP} Solutions of Vectorial Integer Subset Sums - Cryptanalysis of Galbraith's Binary Matrix {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {741}, year = {2018}, url = {https://eprint.iacr.org/2018/741}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MayH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/McCorryBBMM18, author = {Patrick McCorry and Surya Bakshi and Iddo Bentov and Andrew Miller and Sarah Meiklejohn}, title = {Pisa: Arbitration Outsourcing for State Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {582}, year = {2018}, url = {https://eprint.iacr.org/2018/582}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/McCorryBBMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/McCorryHM18, author = {Patrick McCorry and Alexander Hicks and Sarah Meiklejohn}, title = {Smart contracts for bribing miners}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {581}, year = {2018}, url = {https://eprint.iacr.org/2018/581}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/McCorryHM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/McQuoidSR18, author = {Ian McQuoid and Trevor Swope and Mike Rosulek}, title = {Characterizing Collision and Second-Preimage Resistance in Linicrypt}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {458}, year = {2018}, url = {https://eprint.iacr.org/2018/458}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/McQuoidSR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MehrdadMS18, author = {Alireza Mehrdad and Farokhlagha Moazami and Hadi Soleimany}, title = {Impossible Differential Cryptanalysis on Deoxys-BC-256}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {48}, year = {2018}, url = {http://eprint.iacr.org/2018/048}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MehrdadMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Meiser18, author = {Sebastian Meiser}, title = {Approximate and Probabilistic Differential Privacy Definitions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {277}, year = {2018}, url = {https://eprint.iacr.org/2018/277}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Meiser18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Mennink18, author = {Bart Mennink}, title = {Towards Tight Security of Cascaded {LRW2}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {434}, year = {2018}, url = {https://eprint.iacr.org/2018/434}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Mennink18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Mennink18a, author = {Bart Mennink}, title = {Key Prediction Security of Keyed Sponges}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {449}, year = {2018}, url = {https://eprint.iacr.org/2018/449}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Mennink18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MentensCR18, author = {Nele Mentens and Edoardo Charbon and Francesco Regazzoni}, title = {Rethinking Secure FPGAs: Towards a Cryptography-friendly Configurable Cell Architecture and its Automated Design Flow}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {724}, year = {2018}, url = {https://eprint.iacr.org/2018/724}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MentensCR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MentensMNV18, author = {Nele Mentens and Vojtech Miskovsk{\'{y}} and Martin Novotn{\'{y}} and Jo Vliegen}, title = {High-speed Side-channel-protected Encryption and Authentication in Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1088}, year = {2018}, url = {https://eprint.iacr.org/2018/1088}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MentensMNV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Menyachikhin18, author = {A. V. Menyachikhin}, title = {Spectral-linear and spectral-differential methods for generating S-boxes having almost optimal cryptographic parameters}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {370}, year = {2018}, url = {https://eprint.iacr.org/2018/370}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Menyachikhin18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MerzP18, author = {Simon{-}Philipp Merz and Christophe Petit}, title = {On the (non) obfuscating power of Garside Normal Forms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1142}, year = {2018}, url = {https://eprint.iacr.org/2018/1142}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/MerzP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MesnagerKCT18, author = {Sihem Mesnager and Kwang Ho Kim and Junyop Choe and Chunming Tang}, title = {On the Menezes-Teske-Weng's conjecture}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {659}, year = {2018}, url = {https://eprint.iacr.org/2018/659}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/MesnagerKCT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MesnagerKJ18, author = {Sihem Mesnager and Kwang Ho Kim and Myong Song Jo}, title = {Improved upper bound on root number of linearized polynomials and its application to nonlinearity estimation of Boolean functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1159}, year = {2018}, url = {https://eprint.iacr.org/2018/1159}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MesnagerKJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MeyerANNR18, author = {Lauren De Meyer and Victor Arribas and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, title = {M{\&}M: Masks and Macs against Physical Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1195}, year = {2018}, url = {https://eprint.iacr.org/2018/1195}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MeyerANNR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MeyerB18, author = {Lauren De Meyer and Beg{\"{u}}l Bilgin}, title = {Classification of Balanced Quadratic Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {113}, year = {2018}, url = {http://eprint.iacr.org/2018/113}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MeyerB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MeyerBR18, author = {Lauren De Meyer and Beg{\"{u}}l Bilgin and Oscar Reparaz}, title = {Consolidating Security Notions in Hardware Masking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {597}, year = {2018}, url = {https://eprint.iacr.org/2018/597}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MeyerBR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MeyerCR18, author = {Michael Meyer and Fabio Campos and Steffen Reith}, title = {On Lions and Elligators: An efficient constant-time implementation of {CSIDH}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1198}, year = {2018}, url = {https://eprint.iacr.org/2018/1198}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/MeyerCR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MeyerR18, author = {Michael Meyer and Steffen Reith}, title = {A faster way to the {CSIDH}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {782}, year = {2018}, url = {https://eprint.iacr.org/2018/782}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/MeyerR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MeyerRB18, author = {Lauren De Meyer and Oscar Reparaz and Beg{\"{u}}l Bilgin}, title = {Multiplicative Masking for {AES} in Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {865}, year = {2018}, url = {https://eprint.iacr.org/2018/865}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MeyerRB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Micciancio018, author = {Daniele Micciancio and Michael Walter}, title = {On the Bit Security of Cryptographic Primitives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {77}, year = {2018}, url = {http://eprint.iacr.org/2018/077}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Micciancio018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Micciancio18, author = {Daniele Micciancio}, title = {On the Hardness of Learning With Errors with Binary Secrets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {988}, year = {2018}, url = {https://eprint.iacr.org/2018/988}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Micciancio18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MicciancioS18, author = {Daniele Micciancio and Jessica Sorrell}, title = {Ring packing and amortized {FHEW} bootstrapping}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {532}, year = {2018}, url = {https://eprint.iacr.org/2018/532}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MicciancioS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Michalas18, author = {Antonis Michalas}, title = {The Lord of the Shares: Combining Attribute-Based Encryption and Searchable Encryption for Flexible Data Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1204}, year = {2018}, url = {https://eprint.iacr.org/2018/1204}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Michalas18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MichalevskyJ18, author = {Yan Michalevsky and Marc Joye}, title = {Decentralized Policy-Hiding Attribute-Based Encryption with Receiver Privacy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {753}, year = {2018}, url = {https://eprint.iacr.org/2018/753}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MichalevskyJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MicheliHS18, author = {Gabrielle De Micheli and Nadia Heninger and Barak Shani}, title = {Characterizing overstretched {NTRU} attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {630}, year = {2018}, url = {https://eprint.iacr.org/2018/630}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MicheliHS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MillerS18, author = {Stephen D. Miller and Noah Stephens{-}Davidowitz}, title = {Generalizations of Banaszczyk's transference theorems and tail bound}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {188}, year = {2018}, url = {http://eprint.iacr.org/2018/188}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MillerS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MinaeiMK18, author = {Mohsen Minaei and Pedro Moreno{-}Sanchez and Aniket Kate}, title = {{R3C3:} Cryptographically secure Censorship Resistant Rendezvous using Cryptocurrencies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {454}, year = {2018}, url = {https://eprint.iacr.org/2018/454}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MinaeiMK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Minaud18, author = {Brice Minaud}, title = {Linear Biases in {AEGIS} Keystream}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {292}, year = {2018}, url = {https://eprint.iacr.org/2018/292}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Minaud18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MingCLYZZ18, author = {Jingdian Ming and Wei Cheng and Huizhong Li and Guang Yang and Yongbin Zhou and Qian Zhang}, title = {Achilles' Heel: the Unbalanced Mask Sets May Destroy a Masking Countermeasure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {745}, year = {2018}, url = {https://eprint.iacr.org/2018/745}, timestamp = {Fri, 11 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/MingCLYZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MishraRDY18, author = {Pradeep Kumar Mishra and Deevashwer Rathee and Dung Hoang Duong and Masaya Yasuda}, title = {Fast Secure Matrix Multiplications over Ring-Based Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {663}, year = {2018}, url = {https://eprint.iacr.org/2018/663}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MishraRDY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MizuideTT18, author = {Taiga Mizuide and Atsushi Takayasu and Tsuyoshi Takagi}, title = {Tight Reductions for Diffie-Hellman Variants in the Algebraic Group Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1220}, year = {2018}, url = {https://eprint.iacr.org/2018/1220}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MizuideTT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MohasselR18, author = {Payman Mohassel and Peter Rindal}, title = {{ABY3:} {A} Mixed Protocol Framework for Machine Learning}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {403}, year = {2018}, url = {https://eprint.iacr.org/2018/403}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MohasselR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Montgomery18, author = {Hart William Montgomery}, title = {A Nonstandard Variant of Learning with Rounding with Polynomial Modulus and Unbounded Samples}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {100}, year = {2018}, url = {http://eprint.iacr.org/2018/100}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Montgomery18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Montgomery18a, author = {Hart Montgomery}, title = {More Efficient Lattice PRFs from Keyed Pseudorandom Synthesizers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1077}, year = {2018}, url = {https://eprint.iacr.org/2018/1077}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Montgomery18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoosMR18, author = {Thorben Moos and Amir Moradi and Bastian Richter}, title = {Static Power Side-Channel Analysis - {A} Survey on Measurement Factors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {676}, year = {2018}, url = {https://eprint.iacr.org/2018/676}, timestamp = {Mon, 10 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoosMR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoosMSS18, author = {Thorben Moos and Amir Moradi and Tobias Schneider and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Glitch-Resistant Masking Revisited - or Why Proofs in the Robust Probing Model are Needed}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {490}, year = {2018}, url = {https://eprint.iacr.org/2018/490}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoosMSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MorganP18, author = {Andrew Morgan and Rafael Pass}, title = {On the Security Loss of Unique Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {905}, year = {2018}, url = {https://eprint.iacr.org/2018/905}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MorganP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MorganP18a, author = {Andrew Morgan and Rafael Pass}, title = {Achieving Fair Treatment in Algorithmic Classification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {911}, year = {2018}, url = {https://eprint.iacr.org/2018/911}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MorganP18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MusaX18, author = {Saud Al Musa and Guangwu Xu}, title = {Fast Scalar Multiplication for Elliptic Curves over Prime Fields by Efficiently Computable Formulas}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {964}, year = {2018}, url = {https://eprint.iacr.org/2018/964}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MusaX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MustafaCAA18, author = {Mustafa A. Mustafa and Sara Cleemput and Abdelrahaman Aly and Aysajan Abidin}, title = {A Secure and Privacy-preserving Protocol for Smart Metering Operational Data Collection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {101}, year = {2018}, url = {http://eprint.iacr.org/2018/101}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MustafaCAA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nandi18, author = {Mridul Nandi}, title = {Bernstein Bound on {WCS} is Tight - Repairing Luykx-Preneel Optimal Forgeries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {520}, year = {2018}, url = {https://eprint.iacr.org/2018/520}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nandi18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaorPR18, author = {Moni Naor and Benny Pinkas and Eyal Ronen}, title = {How to (not) share a password: Privacy preserving protocols for finding heavy hitters with adversarial behavior}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {3}, year = {2018}, url = {http://eprint.iacr.org/2018/003}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaorPR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaorRS18, author = {Moni Naor and Lior Rotem and Gil Segev}, title = {The Security of Lazy Users in Out-of-Band Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {823}, year = {2018}, url = {https://eprint.iacr.org/2018/823}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaorRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NarayananP18, author = {Varun Narayanan and Vinod M. Prabhakaran}, title = {Oblivious Transfer in Incomplete Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {875}, year = {2018}, url = {https://eprint.iacr.org/2018/875}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NarayananP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NarulaVV18, author = {Neha Narula and Willy Vasquez and Madars Virza}, title = {zkLedger: Privacy-Preserving Auditing for Distributed Ledgers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {241}, year = {2018}, url = {http://eprint.iacr.org/2018/241}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NarulaVV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NathS18, author = {Kaushik Nath and Palash Sarkar}, title = {Efficient Inversion In (Pseudo-)Mersenne Prime Order Fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {985}, year = {2018}, url = {https://eprint.iacr.org/2018/985}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NathS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NejatollahiDBC18, author = {Hamid Nejatollahi and Nikil D. Dutt and Indranil Banerjee and Rosario Cammarota}, title = {Domain-specific Accelerators for Ideal Lattice-based Public Key Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {608}, year = {2018}, url = {https://eprint.iacr.org/2018/608}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/NejatollahiDBC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NeumayerVE18, author = {Seb Neumayer and Mayank Varia and Ittay Eyal}, title = {An Analysis of Acceptance Policies For Blockchain Transactions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {40}, year = {2018}, url = {http://eprint.iacr.org/2018/040}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NeumayerVE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NguyenSJMRD18, author = {Phuong Ha Nguyen and Durga Prasad Sahoo and Chenglu Jin and Kaleel Mahmood and Ulrich R{\"{u}}hrmair and Marten van Dijk}, title = {The Interpose {PUF:} Secure {PUF} Design against State-of-the-art Machine Learning Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {350}, year = {2018}, url = {https://eprint.iacr.org/2018/350}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NguyenSJMRD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NikovaNR18, author = {Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, title = {Decomposition of Permutations in a Finite Field}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {103}, year = {2018}, url = {http://eprint.iacr.org/2018/103}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NikovaNR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NilssonJS18, author = {Alexander Nilsson and Thomas Johansson and Paul Stankovski}, title = {Error Amplification in Code-based Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1223}, year = {2018}, url = {https://eprint.iacr.org/2018/1223}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NilssonJS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NingDHC18, author = {Jianting Ning and Hung Dang and Ruomu Hou and Ee{-}Chien Chang}, title = {Keeping Time-Release Secrets through Smart Contracts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1166}, year = {2018}, url = {https://eprint.iacr.org/2018/1166}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NingDHC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NingMHMXW18, author = {Yu Ning and Fuyou Miao and Wenchao Huang and Keju Meng and Yan Xiong and Xingfu Wang}, title = {Constructing Ideal Secret Sharing Schemes based on Chinese Remainder Theorem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {837}, year = {2018}, url = {https://eprint.iacr.org/2018/837}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NingMHMXW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NordholtV18, author = {Peter Sebastian Nordholt and Meilof Veeningen}, title = {Minimising Communication in Honest-Majority {MPC} by Batchwise Multiplication Verification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {474}, year = {2018}, url = {https://eprint.iacr.org/2018/474}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NordholtV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nuida18, author = {Koji Nuida}, title = {Keeping or Losing Tiny-Error Correctness of Cryptosystems Implemented by Secure Pseudorandom Generators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {718}, year = {2018}, url = {https://eprint.iacr.org/2018/718}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nuida18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OkamotoTYO18, author = {Takeshi Okamoto and Raylin Tso and Michitomo Yamaguchi and Eiji Okamoto}, title = {A k-out-of-n Ring Signature with Flexible Participation for Signers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {728}, year = {2018}, url = {https://eprint.iacr.org/2018/728}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OkamotoTYO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OrtizADAC18, author = {Jheyne N. Ortiz and Robson R. de Araujo and Ricardo Dahab and Diego F. Aranha and Sueli I. R. Costa}, title = {In Praise of Twisted Canonical Embedding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {356}, year = {2018}, url = {https://eprint.iacr.org/2018/356}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OrtizADAC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OstrovskyPVV18, author = {Rafail Ostrovsky and Giuseppe Persiano and Daniele Venturi and Ivan Visconti}, title = {Continuously Non-Malleable Codes in the Split-State Model from Minimal Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {542}, year = {2018}, url = {https://eprint.iacr.org/2018/542}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OstrovskyPVV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OuZL18, author = {Changhai Ou and Xinping Zhou and Siew{-}Kei Lam}, title = {Information Entropy Based Leakage Certification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {959}, year = {2018}, url = {https://eprint.iacr.org/2018/959}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OuZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OuZL18a, author = {Changhai Ou and Chengju Zhou and Siew{-}Kei Lam}, title = {Compressive Sensing based Leakage Sampling and Reconstruction: {A} First Study}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1149}, year = {2018}, url = {https://eprint.iacr.org/2018/1149}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OuZL18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OzmenBY18, author = {Muslum Ozgur Ozmen and Rouzbeh Behnia and Attila A. Yavuz}, title = {Compact Energy and Delay-aware Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {28}, year = {2018}, url = {http://eprint.iacr.org/2018/028}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OzmenBY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OzmenBY18a, author = {Muslum Ozgur Ozmen and Rouzbeh Behnia and Attila A. Yavuz}, title = {Fast Authentication from Aggregate Signatures with Improved Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1141}, year = {2018}, url = {https://eprint.iacr.org/2018/1141}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OzmenBY18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Pakniat18, author = {Nasrollah Pakniat}, title = {On the Security of a Certificateless Strong Designated Verifier Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {915}, year = {2018}, url = {https://eprint.iacr.org/2018/915}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Pakniat18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PalD18, author = {Tapas Pal and Ratna Dutta}, title = {Constructing Witness {PRF} and Offline Witness Encryption Without Multilinear Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {587}, year = {2018}, url = {https://eprint.iacr.org/2018/587}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PalD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PanLN18, author = {Dongxue Pan and Hongda Li and Peifang Ni}, title = {Candidate Differing-Inputs Obfuscation from Indistinguishability Obfuscation and Auxiliary-Input Point Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1055}, year = {2018}, url = {https://eprint.iacr.org/2018/1055}, timestamp = {Mon, 12 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PanLN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PanjaR18, author = {Somnath Panja and Bimal Kumar Roy}, title = {A secure end-to-end verifiable e-voting system using zero knowledge based blockchain}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {466}, year = {2018}, url = {https://eprint.iacr.org/2018/466}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PanjaR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Papagiannopoulos18, author = {Kostas Papagiannopoulos}, title = {Low Randomness Masking and Shuffling: An Evaluation Using Mutual Information}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {825}, year = {2018}, url = {https://eprint.iacr.org/2018/825}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Papagiannopoulos18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PascaS18, author = {Vlad{-}Raul Pasca and Emil Simion}, title = {Challenges in cyber security - Ransomware Phenomenon}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {125}, year = {2018}, url = {http://eprint.iacr.org/2018/125}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PascaS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Paskin-Cherniavsky18, author = {Anat Paskin{-}Cherniavsky}, title = {On Perfectly Secure 2PC in the OT-hybrid model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {308}, year = {2018}, url = {https://eprint.iacr.org/2018/308}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Paskin-Cherniavsky18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PassS18, author = {Rafael Pass and Elaine Shi}, title = {Rethinking Large-Scale Consensus}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {302}, year = {2018}, url = {https://eprint.iacr.org/2018/302}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PassS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatelPRY18, author = {Sarvar Patel and Giuseppe Persiano and Mariana Raykova and Kevin Yeo}, title = {PanORAMa: Oblivious {RAM} with Logarithmic Overhead}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {373}, year = {2018}, url = {https://eprint.iacr.org/2018/373}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatelPRY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatelPY18, author = {Sarvar Patel and Giuseppe Persiano and Kevin Yeo}, title = {Private Stateful Information Retrieval}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1083}, year = {2018}, url = {https://eprint.iacr.org/2018/1083}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatelPY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatersonS18, author = {Kenneth G. Paterson and Jacob C. N. Schuldt}, title = {Statistical Attacks on Cookie Masking for {RC4}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {93}, year = {2018}, url = {http://eprint.iacr.org/2018/093}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatersonS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatraR18, author = {Arpita Patra and Divya Ravi}, title = {On the Exact Round Complexity of Secure Three-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {481}, year = {2018}, url = {https://eprint.iacr.org/2018/481}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatraR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatranabisM18, author = {Sikhar Patranabis and Debdeep Mukhopadhyay}, title = {New Lower Bounds on Predicate Entropy for Function Private Public-Key Predicate Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {190}, year = {2018}, url = {http://eprint.iacr.org/2018/190}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatranabisM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatranabisMR18, author = {Sikhar Patranabis and Debdeep Mukhopadhyay and Somindu C. Ramanna}, title = {Function Private Predicate Encryption for Low Min-Entropy Predicates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1250}, year = {2018}, url = {https://eprint.iacr.org/2018/1250}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatranabisMR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatsonakisSRK18, author = {Christos Patsonakis and Katerina Samari and Mema Roussopoulos and Aggelos Kiayias}, title = {Towards a Smart Contract-based, Decentralized, Public-Key Infrastructure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {853}, year = {2018}, url = {https://eprint.iacr.org/2018/853}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatsonakisSRK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PattonS18, author = {Christopher Patton and Thomas Shrimpton}, title = {Partially specified channels: The {TLS} 1.3 record layer without elision}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {634}, year = {2018}, url = {https://eprint.iacr.org/2018/634}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PattonS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PaulSSR18, author = {Arinjita Paul and Varshika Srinivasavaradhan and S. Sharmila Deva Selvi and C. Pandu Rangan}, title = {A CCA-secure collusion-resistant Identity-based Proxy Re-encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1131}, year = {2018}, url = {https://eprint.iacr.org/2018/1131}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PaulSSR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PedrosaPP18, author = {Alejandro Ranchal{-}Pedrosa and Maria Potop{-}Butucaru and Sara {Tucci Piergiovanni}}, title = {Lightning Factories}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {918}, year = {2018}, url = {https://eprint.iacr.org/2018/918}, timestamp = {Mon, 15 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/PedrosaPP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Pellet-Mary18, author = {Alice Pellet{-}Mary}, title = {Quantum Attacks against Indistinguishablility Obfuscators Proved Secure in the Weak Multilinear Map Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {533}, year = {2018}, url = {https://eprint.iacr.org/2018/533}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Pellet-Mary18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Perez-SolaDNH18, author = {Cristina P{\'{e}}rez{-}Sol{\`{a}} and Sergi Delgado{-}Segura and Guillermo Navarro{-}Arribas and Jordi Herrera{-}Joancomart{\'{\i}}}, title = {Another coin bites the dust: An analysis of dust in {UTXO} based cryptocurrencies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {513}, year = {2018}, url = {https://eprint.iacr.org/2018/513}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Perez-SolaDNH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PersianoY18, author = {Giuseppe Persiano and Kevin Yeo}, title = {Lower Bounds for Differentially Private RAMs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1051}, year = {2018}, url = {https://eprint.iacr.org/2018/1051}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PersianoY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PfeiferH18, author = {Christophe Pfeifer and Patrick Haddad}, title = {Spread: a new layer for profiled deep-learning side-channel attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {880}, year = {2018}, url = {https://eprint.iacr.org/2018/880}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PfeiferH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PiccoliVR18, author = {Alessandro De Piccoli and Andrea Visconti and Ottavio Giulio Rizzo}, title = {Polynomial multiplication over binary finite fields: new upper bounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {91}, year = {2018}, url = {http://eprint.iacr.org/2018/091}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PiccoliVR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PicekHAR18, author = {Stjepan Picek and Annelie Heuser and Cesare Alippi and Francesco Regazzoni}, title = {When Theory Meets Practice: {A} Framework for Robust Profiled Side-channel Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1123}, year = {2018}, url = {https://eprint.iacr.org/2018/1123}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PicekHAR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PicekHJBR18, author = {Stjepan Picek and Annelie Heuser and Alan Jovic and Shivam Bhasin and Francesco Regazzoni}, title = {The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {476}, year = {2018}, url = {https://eprint.iacr.org/2018/476}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PicekHJBR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PicekSHKBL18, author = {Stjepan Picek and Ioannis Petros Samiotis and Annelie Heuser and Jaehun Kim and Shivam Bhasin and Axel Legay}, title = {On the Performance of Deep Learning for Side-channel Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {4}, year = {2018}, url = {http://eprint.iacr.org/2018/004}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PicekSHKBL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Pietrzak18, author = {Krzysztof Pietrzak}, title = {Proofs of Catalytic Space}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {194}, year = {2018}, url = {http://eprint.iacr.org/2018/194}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Pietrzak18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Pietrzak18a, author = {Krzysztof Pietrzak}, title = {Simple Verifiable Delay Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {627}, year = {2018}, url = {https://eprint.iacr.org/2018/627}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Pietrzak18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PilyankevichKM18, author = {Eugene Pilyankevich and Ignat Korchagin and Andrey Mnatsakanov}, title = {Hermes. {A} framework for cryptographically assured access control and data security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {200}, year = {2018}, url = {http://eprint.iacr.org/2018/200}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PilyankevichKM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Pinkas0WW18, author = {Benny Pinkas and Thomas Schneider and Christian Weinert and Udi Wieder}, title = {Efficient Circuit-based {PSI} via Cuckoo Hashing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {120}, year = {2018}, url = {http://eprint.iacr.org/2018/120}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Pinkas0WW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PinoLS18, author = {Rafa{\"{e}}l Del Pino and Vadim Lyubashevsky and Gregor Seiler}, title = {Lattice-Based Group Signatures and Zero-Knowledge Proofs of Automorphism Stability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {779}, year = {2018}, url = {https://eprint.iacr.org/2018/779}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PinoLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Poettering18, author = {Bertram Poettering}, title = {Shorter double-authentication preventing signatures for small address spaces}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {223}, year = {2018}, url = {http://eprint.iacr.org/2018/223}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Poettering18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Poettering18a, author = {Bertram Poettering}, title = {Breaking the confidentiality of {OCB2}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1087}, year = {2018}, url = {https://eprint.iacr.org/2018/1087}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Poettering18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PoetteringR18, author = {Bertram Poettering and Paul R{\"{o}}sler}, title = {Ratcheted key exchange, revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {296}, year = {2018}, url = {https://eprint.iacr.org/2018/296}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PoetteringR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ProuffSBCD18, author = {Emmanuel Prouff and R{\'{e}}mi Strullu and Ryad Benadjila and Eleonora Cagli and C{\'{e}}cile Dumas}, title = {Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to {ASCAD} Database}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {53}, year = {2018}, url = {http://eprint.iacr.org/2018/053}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ProuffSBCD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PullsD18, author = {Tobias Pulls and Rasmus Dahlberg}, title = {Steady: {A} Simple End-to-End Secure Logging System}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {737}, year = {2018}, url = {https://eprint.iacr.org/2018/737}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PullsD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PutraSW18, author = {Dea Saka Kurnia Putra and Mohamad Ali Sadikin and Susila Windarta}, title = {S-Mbank: Secure Mobile Banking Authentication Scheme Using Signcryption, Pair Based Text Authentication, and Contactless Smartcard}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {868}, year = {2018}, url = {https://eprint.iacr.org/2018/868}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PutraSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/QuachWW18, author = {Willy Quach and Hoeteck Wee and Daniel Wichs}, title = {Laconic Function Evaluation and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {409}, year = {2018}, url = {https://eprint.iacr.org/2018/409}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/QuachWW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/QuachWZ18, author = {Willy Quach and Daniel Wichs and Giorgos Zirdelis}, title = {Watermarking PRFs under Standard Assumptions: Public Marking and Security with Extraction Queries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {906}, year = {2018}, url = {https://eprint.iacr.org/2018/906}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/QuachWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/QuagliaS18, author = {Elizabeth A. Quaglia and Ben Smyth}, title = {Authentication with weaker trust assumptions for voting systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {222}, year = {2018}, url = {http://eprint.iacr.org/2018/222}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/QuagliaS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RaddumZ18, author = {H{\aa}vard Raddum and Pavol Zajac}, title = {{MRHS} Solver Based on Linear Algebra and Exhaustive Search}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {111}, year = {2018}, url = {http://eprint.iacr.org/2018/111}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RaddumZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RajuTV18, author = {Kallepu Raju and Appala Naidu Tentu and China Venkaiah Vadlamudi}, title = {Cryptanalysis of a Group Key Transfer Protocol Based on Secret Sharing: Generalization and Countermeasures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {711}, year = {2018}, url = {https://eprint.iacr.org/2018/711}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RajuTV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.