Search dblp for Publications

export results for "toc:db/journals/iacr/iacr2006.bht:"

 download as .bib file

@article{DBLP:journals/iacr/AbdallaCDMNS06,
  author       = {Michel Abdalla and
                  Dario Catalano and
                  Alexander W. Dent and
                  John Malone{-}Lee and
                  Gregory Neven and
                  Nigel P. Smart},
  title        = {Identity-Based Encryption Gone Wild},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {304},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/304},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaCDMNS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbeF06,
  author       = {Masayuki Abe and
                  Serge Fehr},
  title        = {Perfect {NIZK} with Adaptive Soundness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {423},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/423},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbeF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AciicmezK06,
  author       = {Onur Acii{\c{c}}mez and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Trace-Driven Cache Attacks on {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {138},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/138},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AciicmezK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AciicmezKS06,
  author       = {Onur Acii{\c{c}}mez and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Jean{-}Pierre Seifert},
  title        = {On the Power of Simple Branch Prediction Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {351},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/351},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AciicmezKS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AciicmezSK06,
  author       = {Onur Acii{\c{c}}mez and
                  Jean{-}Pierre Seifert and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Predicting Secret Keys via Branch Prediction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {288},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/288},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AciicmezSK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgostaP06,
  author       = {Giovanni Agosta and
                  Gerardo Pelosi},
  title        = {Countermeasures for the Simple Branch Prediction Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {482},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/482},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgostaP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Alt06,
  author       = {St{\'{e}}phanie Alt},
  title        = {Authenticated Hybrid Encryption for Multiple Recipients},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {29},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/029},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Alt06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnandCSBK06,
  author       = {Madhukar Anand and
                  Eric Cronin and
                  Micah Sherr and
                  Matt Blaze and
                  Sampath Kannan},
  title        = {Security Protocols with Isotropic Channels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {396},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/396},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnandCSBK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AngelM06,
  author       = {Jos{\'{e}} de Jes{\'{u}}s Angel Angel and
                  Guillermo Morales{-}Luna},
  title        = {Counting Prime Numbers with Short Binary Signed Representation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {121},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/121},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AngelM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AravamuthanL06,
  author       = {Sarang Aravamuthan and
                  Sachin Lodha},
  title        = {The Average Transmission Overhead of Broadcast Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {324},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/324},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AravamuthanL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AravamuthanT06,
  author       = {Sarang Aravamuthan and
                  Viswanatha Rao Thumparthy},
  title        = {A Parallelization of {ECDSA} Resistant to Simple Power Analysis Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {316},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/316},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AravamuthanT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseCJT06,
  author       = {Giuseppe Ateniese and
                  Jan Camenisch and
                  Marc Joye and
                  Gene Tsudik},
  title        = {Remarks on "Analysis of One Popular Group Signature Scheme" in Asiacrypt
                  2006},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {464},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/464},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseCJT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseSFM06,
  author       = {Giuseppe Ateniese and
                  Alfredo De Santis and
                  Anna Lisa Ferrara and
                  Barbara Masucci},
  title        = {Provably-Secure Time-Bound Hierarchical Key Assignment Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {225},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/225},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseSFM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtkinsonBSTZ06,
  author       = {Timothy Atkinson and
                  Roman Bart{\'{a}}k and
                  Marius{-}Calin Silaghi and
                  E. Tuleu and
                  Markus Zanker},
  title        = {Private and Efficient Stable Marriages (Matching)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {345},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/345},
  timestamp    = {Mon, 31 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtkinsonBSTZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtkinsonS06,
  author       = {Timothy Atkinson and
                  Marius{-}Calin Silaghi},
  title        = {An efficient way to access an array at a secret index},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {157},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/157},
  timestamp    = {Mon, 31 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtkinsonS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AuCLMWY06,
  author       = {Man Ho Au and
                  Jing Chen and
                  Joseph K. Liu and
                  Yi Mu and
                  Duncan S. Wong and
                  Guomin Yang},
  title        = {Malicious {KGC} Attacks in Certificateless Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {255},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/255},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AuCLMWY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AuLYW06a,
  author       = {Man Ho Au and
                  Joseph K. Liu and
                  Tsz Hon Yuen and
                  Duncan S. Wong},
  title        = {Practical Hierarchical Identity Based Encryption and Signature schemes
                  Without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {368},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/368},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AuLYW06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Aumasson06a,
  author       = {Jean{-}Philippe Aumasson},
  title        = {On the pseudo-random generator {ISAAC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {438},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/438},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Aumasson06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AvanziS06,
  author       = {Roberto Avanzi and
                  Francesco Sica},
  title        = {Scalar Multiplication on Koblitz Curves using Double Bases},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {67},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/067},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AvanziS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BabbageCPR06,
  author       = {Steve Babbage and
                  Carlos Cid and
                  Norbert Pramstaller and
                  H{\aa}vard Raddum},
  title        = {An Analysis of the Hermes8 Stream Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {269},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/269},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BabbageCPR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BabbageD06,
  author       = {Steve Babbage and
                  Matthew Dodd},
  title        = {Finding Characteristic Polynomials with Jump Indices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {10},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/010},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BabbageD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesCJST06,
  author       = {Michael Backes and
                  Iliano Cervesato and
                  Aaron D. Jaggard and
                  Andre Scedrov and
                  Joe{-}Kai Tsay},
  title        = {Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {219},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/219},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesCJST06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesDHK06,
  author       = {Michael Backes and
                  Markus D{\"{u}}rmuth and
                  Dennis Hofheinz and
                  Ralf K{\"{u}}sters},
  title        = {Conditional Reactive Simulatability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {132},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/132},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesDHK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesL06,
  author       = {Michael Backes and
                  Peeter Laud},
  title        = {Computationally Sound Secrecy Proofs by Mechanized Flow Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {266},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/266},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesMPV06,
  author       = {Michael Backes and
                  Sebastian M{\"{o}}dersheim and
                  Birgit Pfitzmann and
                  Luca Vigan{\`{o}}},
  title        = {Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging
                  Scenario},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {58},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/058},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesMPV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesMU06,
  author       = {Michael Backes and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Dominique Unruh},
  title        = {On the Necessity of Rewinding in Secure Multiparty Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {315},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/315},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesMU06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesPW06,
  author       = {Michael Backes and
                  Birgit Pfitzmann and
                  Michael Waidner},
  title        = {Limits of the Reactive Simulatability/UC of Dolev-Yao Models with
                  Hashes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {68},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/068},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesPW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BanaMS06,
  author       = {Gergei Bana and
                  Payman Mohassel and
                  Till Stegers},
  title        = {Computational Soundness of Formal Indistinguishability and Static
                  Equivalence},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {323},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/323},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BanaMS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarakPS06,
  author       = {Boaz Barak and
                  Manoj Prabhakaran and
                  Amit Sahai},
  title        = {Concurrent Non-Malleable Zero Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {355},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/355},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarakPS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarbierFM06,
  author       = {Johann Barbier and
                  Eric Filiol and
                  Kichenakoumar Mayoura},
  title        = {New features for {JPEG} Steganalysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {301},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/301},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarbierFM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarbosaF06,
  author       = {Manuel Barbosa and
                  Pooya Farshim},
  title        = {Secure Cryptographic Workflow in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {450},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/450},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarbosaF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bard06,
  author       = {Gregory V. Bard},
  title        = {A Challenging but Feasible Blockwise-Adaptive Chosen-Plaintext Attack
                  on {SSL}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {136},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/136},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bard06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bard06a,
  author       = {Gregory V. Bard},
  title        = {Achieving a log(n) Speed Up for Boolean Matrix Operations and Calculating
                  the Complexity of the Dense Linear Algebra step of Algebraic Stream
                  Cipher Attacks and of Integer Factorization Methods},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {163},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/163},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bard06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bard06b,
  author       = {Gregory V. Bard},
  title        = {Accelerating Cryptanalysis with the Method of Four Russians},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {251},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/251},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bard06b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bard06c,
  author       = {Gregory V. Bard},
  title        = {Modes of Encryption Secure against Blockwise-Adaptive Chosen-Plaintext
                  Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {271},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/271},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bard06c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bard06d,
  author       = {Gregory V. Bard},
  title        = {Spelling-Error Tolerant, Order-Independent Pass-Phrases via the Damerau-Levenshtein
                  String-Edit Distance Metric},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {364},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/364},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bard06d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarwickJ06,
  author       = {Susan G. Barwick and
                  Wen{-}Ai Jackson},
  title        = {Geometric constructions of optimal linear perfect hash families},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {2},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/002},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarwickJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BatinaGKMTV06,
  author       = {Lejla Batina and
                  Jorge Guajardo and
                  Tim Kerins and
                  Nele Mentens and
                  Pim Tuyls and
                  Ingrid Verbauwhede},
  title        = {An Elliptic Curve Processor Suitable For RFID-Tags},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {227},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/227},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BatinaGKMTV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bayev06,
  author       = {Vladimir Bayev},
  title        = {Finding Low Degree Annihilators for a Boolean Function Using Polynomial
                  Algorithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {27},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/027},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bayev06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bellare06,
  author       = {Mihir Bellare},
  title        = {New Proofs for {NMAC} and {HMAC:} Security Without Collision-Resistance},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {43},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/043},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bellare06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareBO06,
  author       = {Mihir Bellare and
                  Alexandra Boldyreva and
                  Adam O'Neill},
  title        = {Deterministic and Efficiently Searchable Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {186},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/186},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareBO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareG06,
  author       = {Mihir Bellare and
                  Oded Goldreich},
  title        = {On Probabilistic versus Deterministic Provers in the Definition of
                  Proofs Of Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {359},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/359},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareKS06,
  author       = {Mihir Bellare and
                  Tadayoshi Kohno and
                  Victor Shoup},
  title        = {Stateful Public-Key Cryptosystems: How to Encrypt with One 160-bit
                  Exponentiation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {267},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/267},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareKS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareNN06,
  author       = {Mihir Bellare and
                  Chanathip Namprempre and
                  Gregory Neven},
  title        = {Unrestricted Aggregate Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {285},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/285},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareNN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareR06,
  author       = {Mihir Bellare and
                  Thomas Ristenpart},
  title        = {Multi-Property-Preserving Hash Domain Extension and the {EMD} Transform},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {399},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/399},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareR06a,
  author       = {Mihir Bellare and
                  Phillip Rogaway},
  title        = {Robust Computational Secret Sharing and a Unified Account of Classical
                  Secret-Sharing Goals},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {449},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/449},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareR06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareS06,
  author       = {Mihir Bellare and
                  Amit Sahai},
  title        = {Non-Malleable Encryption: Equivalence between Two Notions, and an
                  Indistinguishability-based Characterization},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {228},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/228},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenoitT06,
  author       = {Olivier Beno{\^{\i}}t and
                  Michael Tunstall},
  title        = {Efficient Use of Random Delays},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {272},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/272},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenoitT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BertoniDPA06,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche},
  title        = {RadioGat{\'{u}}n, a belt-and-mill hash function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {369},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/369},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BertoniDPA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeuchatSTO06,
  author       = {Jean{-}Luc Beuchat and
                  Masaaki Shirase and
                  Tsuyoshi Takagi and
                  Eiji Okamoto},
  title        = {An Algorithm for the {\(\eta\)}\({}_{\mbox{T}}\) Pairing Calculation
                  in Characteristic Three and its Hardware Implementation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {327},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/327},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeuchatSTO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BicakciCT06,
  author       = {Kemal Bicakci and
                  Bruno Crispo and
                  Andrew S. Tanenbaum},
  title        = {Reverse {SSL:} Improved Server Performance and DoS Resistance for
                  {SSL} Handshakes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {212},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/212},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BicakciCT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BirkettDNS06,
  author       = {James Birkett and
                  Alexander W. Dent and
                  Gregory Neven and
                  Jacob C. N. Schuldt},
  title        = {Efficient Chosen-Ciphertext Secure Identity-Based Encryption with
                  Wildcards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {377},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/377},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BirkettDNS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Birkner06,
  author       = {Peter Birkner},
  title        = {Efficient Divisor Class Halving on Genus Two Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {257},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/257},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Birkner06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlackC06,
  author       = {John Black and
                  Martin Cochran},
  title        = {{MAC} Reforgeability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {95},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/095},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlackC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlanchetP06,
  author       = {Bruno Blanchet and
                  David Pointcheval},
  title        = {Automated Security Proofs with Sequences of Games},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {69},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/069},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlanchetP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlundoCS06,
  author       = {Carlo Blundo and
                  Stelvio Cimato and
                  Alfredo De Santis},
  title        = {Visual Cryptography Schemes with Optimal Pixel Expansion},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {170},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/170},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlundoCS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BohliGS06,
  author       = {Jens{-}Matthias Bohli and
                  Benjamin Glas and
                  Rainer Steinwandt},
  title        = {Towards Provably Secure Group Key Agreement Building on Group Theory},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {79},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/079},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BohliGS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BohliVS06,
  author       = {Jens{-}Matthias Bohli and
                  Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and
                  Rainer Steinwandt},
  title        = {Password-Authenticated Constant-Round Group Key Establishment with
                  a Common Reference String},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {214},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/214},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BohliVS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehSW06,
  author       = {Dan Boneh and
                  Amit Sahai and
                  Brent Waters},
  title        = {Fully Collusion Resistant Traitor Tracing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {45},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/045},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehW06,
  author       = {Dan Boneh and
                  Brent Waters},
  title        = {Conjunctive, Subset, and Range Queries on Encrypted Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {287},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/287},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehW06a,
  author       = {Dan Boneh and
                  Brent Waters},
  title        = {A Fully Collusion Resistant Broadcast, Trace, and Revoke System},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {298},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/298},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehW06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bonneau06,
  author       = {Joseph Bonneau},
  title        = {Robust Final-Round Cache-Trace Attacks Against {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {374},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/374},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bonneau06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosleyD06,
  author       = {Carl Bosley and
                  Yevgeniy Dodis},
  title        = {Does Privacy Require True Randomness?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {283},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/283},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosleyD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyenSSW06,
  author       = {Xavier Boyen and
                  Hovav Shacham and
                  Emily Shen and
                  Brent Waters},
  title        = {Forward-Secure Signatures with Untrusted Update},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {297},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/297},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyenSSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyenW06,
  author       = {Xavier Boyen and
                  Brent Waters},
  title        = {Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {85},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/085},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyenW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BraekenNN06,
  author       = {An Braeken and
                  Ventzislav Nikov and
                  Svetla Nikova},
  title        = {On Zigzag Functions and Related Objects in New Metric},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {437},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/437},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BraekenNN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Brandao06,
  author       = {Lu{\'{\i}}s Teixeira d'Aguiar Norton Brandao},
  title        = {A Framework for Interactive Argument Systems using Quasigroupic Homorphic
                  Commitment},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {472},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/472},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Brandao06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BressonMS06,
  author       = {Emmanuel Bresson and
                  Mark Manulis and
                  J{\"{o}}rg Schwenk},
  title        = {On Security Models and Compilers for Group Key Exchange Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {385},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/385},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BressonMS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrickellGNS06,
  author       = {Ernie Brickell and
                  Gary Graunke and
                  Michael Neve and
                  Jean{-}Pierre Seifert},
  title        = {Software mitigations to hedge {AES} against cache-based software side
                  channel vulnerabilities},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {52},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/052},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrickellGNS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BringerCD06,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Emmanuelle Dottax},
  title        = {Perturbing and Protecting a Traceable Block Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {64},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/064},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BringerCD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BringerCD06a,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Emmanuelle Dottax},
  title        = {White Box Cryptography: Another Attempt},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {468},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/468},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BringerCD06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Brown06,
  author       = {Daniel R. L. Brown},
  title        = {Conjectured Security of the {ANSI-NIST} Elliptic Curve {RNG}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {117},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/117},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Brown06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Brown06a,
  author       = {Daniel R. L. Brown},
  title        = {Multi-Dimensional Montgomery Ladders for Elliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {220},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/220},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Brown06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Brown06b,
  author       = {Daniel R. L. Brown},
  title        = {What Hashes Make {RSA-OAEP} Secure?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {223},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/223},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Brown06b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BuanGK06,
  author       = {Aslak Bakke Buan and
                  Kristian Gj{\o}steen and
                  Lillian Kr{\aa}kmo},
  title        = {Universally Composable Blind Signatures in the Plain Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {405},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/405},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BuanGK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BuchmannGDDK06,
  author       = {Johannes Buchmann and
                  Luis Carlos Coronado Garc{\'{\i}}a and
                  Erik Dahmen and
                  Martin D{\"{o}}ring and
                  Elena Klintsevich},
  title        = {{CMSS} - An Improved Merkle Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {320},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/320},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BuchmannGDDK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BudaghyanCL06,
  author       = {Lilya Budaghyan and
                  Claude Carlet and
                  Gregor Leander},
  title        = {Another class of quadratic {APN} binomials over F\({}_{\mbox{2\({}^{\mbox{n}}\)}}\):
                  the case n divisible by 4},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {428},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/428},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BudaghyanCL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BudaghyanCL06a,
  author       = {Lilya Budaghyan and
                  Claude Carlet and
                  Gregor Leander},
  title        = {A class of quadratic {APN} binomials inequivalent to power functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {445},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/445},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BudaghyanCL06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BurmesterLM06,
  author       = {Mike Burmester and
                  Tri Van Le and
                  Breno de Medeiros},
  title        = {Provably Secure Ubiquitous Systems: Universally Composable {RFID}
                  Authentication Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {131},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/131},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BurmesterLM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischHKLM06,
  author       = {Jan Camenisch and
                  Susan Hohenberger and
                  Markulf Kohlweiss and
                  Anna Lysyanskaya and
                  Mira Meyerovich},
  title        = {How to Win the Clone Wars: Efficient Periodic n-Times Anonymous Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {454},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/454},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischHKLM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Campagna06,
  author       = {Matthew J. Campagna},
  title        = {Security Bounds for the {NIST} Codebook-based Deterministic Random
                  Bit Generator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {379},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/379},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Campagna06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanardGH06,
  author       = {S{\'{e}}bastien Canard and
                  Aline Gouget and
                  Emeline Hufschmitt},
  title        = {A handy multi-coupon system},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {231},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/231},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanardGH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Canetti06,
  author       = {Ran Canetti},
  title        = {Security and Composition of Cryptographic Protocols: {A} Tutorial},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {465},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/465},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Canetti06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiDPW06,
  author       = {Ran Canetti and
                  Yevgeniy Dodis and
                  Rafael Pass and
                  Shabsi Walfish},
  title        = {Universally Composable Security with Global Setup},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {432},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/432},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiDPW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiHS06,
  author       = {Ran Canetti and
                  Shai Halevi and
                  Michael Steiner},
  title        = {Mitigating Dictionary Attacks on Password-Protected Local Storage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {276},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/276},
  timestamp    = {Sat, 23 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiHS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Cao06,
  author       = {Zhengjun Cao},
  title        = {Classification of Signature-only Signature Models},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {164},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/164},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Cao06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CaoPK06,
  author       = {Xuefei Cao and
                  Kenneth G. Paterson and
                  Weidong Kou},
  title        = {An Attack on a Certificateless Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {367},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/367},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CaoPK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Carlet06,
  author       = {Claude Carlet},
  title        = {A method of construction of balanced functions with optimum algebraic
                  immunity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {149},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/149},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Carlet06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Carlet06a,
  author       = {Claude Carlet},
  title        = {Recursive lower bounds on the nonlinearity profile of Boolean functions
                  and their applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {459},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/459},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Carlet06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Castelluccia06,
  author       = {Claude Castelluccia},
  title        = {Authenticated Interleaved Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {416},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/416},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Castelluccia06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CastryckDV06,
  author       = {Wouter Castryck and
                  Jan Denef and
                  Frederik Vercauteren},
  title        = {Computing Zeta Functions of Nondegenerate Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {240},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/240},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CastryckDV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CervesatoJSTW06,
  author       = {Iliano Cervesato and
                  Aaron D. Jaggard and
                  Andre Scedrov and
                  Joe{-}Kai Tsay and
                  Christopher Walstad},
  title        = {Breaking and Fixing Public-Key Kerberos},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {9},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/009},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CervesatoJSTW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChakrabortyS06a,
  author       = {Debrup Chakraborty and
                  Palash Sarkar},
  title        = {A New Mode of Encryption Providing {A} Tweakable Strong Pseudo-Random},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {275},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/275},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChakrabortyS06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chang06,
  author       = {Donghoon Chang},
  title        = {Preimage Attack on Hashing with Polynomials proposed at ICISC'06},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {411},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/411},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chang06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chang06a,
  author       = {Donghoon Chang},
  title        = {Preimage Attacks on CellHash, SubHash and Strengthened Versions of
                  CellHash and SubHash},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {412},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/412},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chang06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chang06b,
  author       = {Donghoon Chang},
  title        = {Preimage Attack on Parallel FFT-Hashing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {413},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/413},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chang06b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chang06c,
  author       = {Donghoon Chang},
  title        = {Preimage Attacks On Provably Secure {FFT} Hashing proposed at Second
                  Hash Workshop in 2006},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {460},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/460},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chang06c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chang06d,
  author       = {Donghoon Chang},
  title        = {Near-Collision Attack and Collision-Attack on Double Block Length
                  Compression Functions based on the Block Cipher {IDEA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {478},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/478},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chang06d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chang06e,
  author       = {Donghoon Chang},
  title        = {A Practical Limit of Security Proof in the Ideal Cipher Model : Possibility
                  of Using the Constant As a Trapdoor In Several Double Block Length
                  Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {481},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/481},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chang06e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangFL06,
  author       = {Ee{-}Chien Chang and
                  Vadym Fedyukovych and
                  Qiming Li},
  title        = {Secure Sketch for Multi-Sets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {90},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/090},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangFL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangN06,
  author       = {Donghoon Chang and
                  Mridul Nandi},
  title        = {General Distinguishing Attacks on {NMAC} and {HMAC} with Birthday
                  Attack Complexity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {441},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/441},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangY06,
  author       = {Donghoon Chang and
                  Moti Yung},
  title        = {Do We Need to Vary the Constants? (Methodological Investigation of
                  Block-Cipher Based Hash Functions)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {467},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/467},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangZZZ06,
  author       = {TingMao Chang and
                  Jin Zhou and
                  YaJuan Zhang and
                  Yuefei Zhu},
  title        = {Hybrid Protocol For Password-based Key Exchange in Three-party Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {452},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/452},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangZZZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Charles06,
  author       = {Denis Xavier Charles},
  title        = {On the existence of distortion maps on ordinary elliptic curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {128},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/128},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Charles06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CharlesGL06,
  author       = {Denis Xavier Charles and
                  Eyal Z. Goren and
                  Kristin E. Lauter},
  title        = {Cryptographic hash functions from expander graphs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {21},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/021},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CharlesGL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CharlesJL06,
  author       = {Denis Xavier Charles and
                  Kamal Jain and
                  Kristin E. Lauter},
  title        = {Signatures for Network Coding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {25},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/025},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CharlesJL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaseL06,
  author       = {Melissa Chase and
                  Anna Lysyanskaya},
  title        = {On Signatures of Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {184},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/184},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaseL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChatterjeeS06,
  author       = {Sanjit Chatterjee and
                  Palash Sarkar},
  title        = {Generalization of the Selective-ID Security Model for {HIBE} Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {203},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/203},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChatterjeeS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChatterjeeS06a,
  author       = {Sanjit Chatterjee and
                  Palash Sarkar},
  title        = {On (Hierarchical) Identity Based Encryption Protocols with Short Public
                  Parameters (With an Exposition of Waters' Artificial Abort Technique)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {279},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/279},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChatterjeeS06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenCS06a,
  author       = {Liqun Chen and
                  Zhaohui Cheng and
                  Nigel P. Smart},
  title        = {Identity-based Key Agreement Protocols From Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {199},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/199},
  timestamp    = {Sat, 28 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenCS06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chien06,
  author       = {Hung{-}Yu Chien},
  title        = {Comments on a Provably Secure Three-Party Password-Based Authenticated
                  Key Exchange Protocol Using Weil Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {13},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/013},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chien06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoP06,
  author       = {Joo Yeon Cho and
                  Josef Pieprzyk},
  title        = {Crossword Puzzle Attack on {NLS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {49},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/049},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoiBW06,
  author       = {Su{-}Jeong Choi and
                  Simon R. Blackburn and
                  Peter R. Wild},
  title        = {Cryptanalysis of a homomorphic public-key cryptosystem over a finite
                  group},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {357},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/357},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoiBW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChouCH06,
  author       = {Jue{-}Sam Chou and
                  Yalin Chen and
                  Jin{-}Cheng Huang},
  title        = {A ID-Based Deniable Authentication Protocol on pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {335},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/335},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChouCH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChouCH06a,
  author       = {Jue{-}Sam Chou and
                  Yalin Chen and
                  Jin{-}Cheng Huang},
  title        = {A Novel Secure Electronic Voting Protocol Based On Bilinear Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {342},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/342},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChouCH06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChowS06,
  author       = {Sherman S. M. Chow and
                  Willy Susilo},
  title        = {Generic Construction of (Identity-based) Perfect Concurrent Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {361},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/361},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChowS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ClimentGR06,
  author       = {Joan{-}Josep Climent and
                  Elisa Gorla and
                  Joachim Rosenthal},
  title        = {Cryptanalysis of the {CFVZ} cryptosystem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {53},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/053},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ClimentGR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ComutaKT06,
  author       = {Aya Comuta and
                  Mitsuru Kawazoe and
                  Tetsuya Takahashi},
  title        = {Pairing-friendly elliptic curves with small security loss by Cheon's
                  algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {427},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/427},
  timestamp    = {Tue, 12 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ComutaKT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ContiniY06,
  author       = {Scott Contini and
                  Yiqun Lisa Yin},
  title        = {Forgery and Partial Key-Recovery Attacks on {HMAC} and {NMAC} Using
                  Hash Collisions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {319},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/319},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ContiniY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CortierKKW06,
  author       = {V{\'{e}}ronique Cortier and
                  Steve Kremer and
                  Ralf K{\"{u}}sters and
                  Bogdan Warinschi},
  title        = {Computationally Sound Symbolic Secrecy in the Presence of Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {218},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/218},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CortierKKW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Courtois06,
  author       = {Nicolas T. Courtois},
  title        = {How Fast can be Algebraic Attacks on Block Ciphers ?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {168},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/168},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Courtois06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CourtoisB06,
  author       = {Nicolas T. Courtois and
                  Gregory V. Bard},
  title        = {Algebraic Cryptanalysis of the Data Encryption Standard},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {402},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/402},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CourtoisB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Couveignes06,
  author       = {Jean Marc Couveignes},
  title        = {Hard Homogeneous Spaces},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {291},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/291},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Couveignes06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerHK06,
  author       = {Ronald Cramer and
                  Dennis Hofheinz and
                  Eike Kiltz},
  title        = {A Note on Bounded Chosen Ciphertext Security from Black-box Semantical
                  Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {391},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/391},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerHK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CrepeauSSW06,
  author       = {Claude Cr{\'{e}}peau and
                  George Savvides and
                  Christian Schaffner and
                  J{\"{u}}rg Wullschleger},
  title        = {Information-Theoretic Conditions for Two-Party Secure Function Evaluation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {183},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/183},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CrepeauSSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Crowley06,
  author       = {Paul Crowley},
  title        = {Improved cryptanalysis of Py},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {30},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/030},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Crowley06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CurtmolaGKO06,
  author       = {Reza Curtmola and
                  Juan A. Garay and
                  Seny Kamara and
                  Rafail Ostrovsky},
  title        = {Searchable Symmetric Encryption: Improved Definitions and Efficient
                  Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {210},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/210},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CurtmolaGKO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaemenR06,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {Two-Round {AES} Differentials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {39},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/039},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DaemenR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DalaiGM06,
  author       = {Deepak Kumar Dalai and
                  Kishan Chand Gupta and
                  Subhamoy Maitra},
  title        = {Notion of Algebraic Immunity and Its evaluation Related to Fast Algebraic
                  Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {18},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/018},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DalaiGM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DalaiM06,
  author       = {Deepak Kumar Dalai and
                  Subhamoy Maitra},
  title        = {Reducing the Number of Homogeneous Linear Equations in Finding Annihilators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {32},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/032},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DalaiM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DalaiM06a,
  author       = {Deepak Kumar Dalai and
                  Subhamoy Maitra},
  title        = {Balanced Boolean Functions with (more than) Maximum Algebraic Immunity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {434},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/434},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DalaiM06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardO06,
  author       = {Ivan Damg{\aa}rd and
                  Michael {\O}stergaard Pedersen},
  title        = {{RFID} Security: Tradeoffs between Security and Efficiency},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {234},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/234},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardT06,
  author       = {Ivan Damg{\aa}rd and
                  Rune Thorbek},
  title        = {Linear Integer Secret Sharing and Distributed Exponentiation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {44},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/044},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DanezisD06,
  author       = {George Danezis and
                  Claudia D{\'{\i}}az},
  title        = {Improving the Decoding Efficiency of Private Search},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {24},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/024},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DanezisD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DattaDMW06,
  author       = {Anupam Datta and
                  Ante Derek and
                  John C. Mitchell and
                  Bogdan Warinschi},
  title        = {Key Exchange Protocols: Security Definition, Proof Method and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {56},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/056},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DattaDMW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DattaKMR06,
  author       = {Anupam Datta and
                  Ralf K{\"{u}}sters and
                  John C. Mitchell and
                  Ajith Ramanathan},
  title        = {On the Relationships Between Notions of Simulation-Based Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {153},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/153},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DattaKMR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dechene06,
  author       = {Isabelle D{\'{e}}ch{\`{e}}ne},
  title        = {Arithmetic of Generalized Jacobians},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {33},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/033},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dechene06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dechene06a,
  author       = {Isabelle D{\'{e}}ch{\`{e}}ne},
  title        = {On the Security of Generalized Jacobian Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {331},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/331},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dechene06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DengCL06,
  author       = {Yi Deng and
                  Giovanni Di Crescenzo and
                  Dongdai Lin},
  title        = {Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {314},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/314},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DengCL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DengL06,
  author       = {Yi Deng and
                  Dongdai Lin},
  title        = {Resettable Zero Knowledge in the Bare Public-Key Model under Standard
                  Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {239},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/239},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DengL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dent06,
  author       = {Alexander W. Dent},
  title        = {The Hardness of the {DHK} Problem in the Generic Group Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {156},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/156},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dent06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dent06a,
  author       = {Alexander W. Dent},
  title        = {A Survey of Certificateless Encryption Schemes and Security Models},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {211},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/211},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dent06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dent06b,
  author       = {Alexander W. Dent},
  title        = {A Note On Game-Hopping Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {260},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/260},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dent06b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dent06c,
  author       = {Alexander W. Dent},
  title        = {Fundamental problems in provable security and cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {278},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/278},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dent06c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DentT06,
  author       = {Alexander W. Dent and
                  Qiang Tang},
  title        = {Revisiting the Security Model for Timed-Release Public-Key Encryption
                  with Pre-Open Capability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {306},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/306},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DentT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DesmedtLB06,
  author       = {Yvo Desmedt and
                  Tanja Lange and
                  Mike Burmester},
  title        = {Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {443},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/443},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DesmedtLB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DevegiliOSD06,
  author       = {Augusto Jun Devegili and
                  Colm O'hEigeartaigh and
                  Michael Scott and
                  Ricardo Dahab},
  title        = {Multiplication and Squaring on Pairing-Friendly Fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {471},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/471},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DevegiliOSD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Didier06,
  author       = {Fr{\'{e}}d{\'{e}}ric Didier},
  title        = {Using Wiedemann's algorithm to compute the immunity against algebraic
                  and fast algebraic attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {261},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/261},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Didier06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DimitrovJJJCH06,
  author       = {Vassil S. Dimitrov and
                  Kimmo U. J{\"{a}}rvinen and
                  Michael J. Jacobson Jr. and
                  W. F. Chan and
                  Zhun Huang},
  title        = {Provably Sublinear Point Multiplication on Koblitz Curves and its
                  Hardware Implementation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {305},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/305},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DimitrovJJJCH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DingGS06,
  author       = {Jintai Ding and
                  Jason E. Gower and
                  Dieter Schmidt},
  title        = {Zhuang-Zi: {A} New Algorithm for Solving Multivariate Polynomial Equations
                  over a Finite Field},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {38},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/038},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DingGS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DingHNLW06,
  author       = {Jintai Ding and
                  Lei Hu and
                  Xuyun Nie and
                  Jianyu Li and
                  John Wagner},
  title        = {High Order Linearization Equation {(HOLE)} Attack on Multivariate
                  Public Key Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {336},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/336},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DingHNLW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DingHYC06,
  author       = {Jintai Ding and
                  Lei Hu and
                  Bo{-}Yin Yang and
                  Jiun{-}Ming Chen},
  title        = {Note on Design Criteria for Rainbow-Type Multivariates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {307},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/307},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DingHYC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DocheI06,
  author       = {Christophe Doche and
                  Laurent Imbert},
  title        = {Extended Double-Base Number System with applications to Elliptic Curve
                  Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {330},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/330},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DocheI06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisP06,
  author       = {Yevgeniy Dodis and
                  Prashant Puniya},
  title        = {Verifiable Random Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {78},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/078},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisYY06,
  author       = {Yevgeniy Dodis and
                  Aleksandr Yampolskiy and
                  Moti Yung},
  title        = {Threshold and Proactive Pseudo-Random Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {17},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/017},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisYY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DoghmiGT06,
  author       = {Shaddin F. Doghmi and
                  Joshua D. Guttman and
                  F. Javier Thayer},
  title        = {Searching for Shapes in Cryptographic Protocols (extended version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {435},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/435},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DoghmiGT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DongWC06,
  author       = {Xiaolei Dong and
                  Licheng Wang and
                  Zhenfu Cao},
  title        = {New Public Key Authentication Frameworks with Lite Certification Authority},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {154},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/154},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DongWC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DoroshenkoFLMR06,
  author       = {Sergey Doroshenko and
                  Andrei Fionov and
                  A. Lubkin and
                  V. A. Monarev and
                  Boris Ryabko},
  title        = {On ZK-Crypt, Book Stack, and Statistical Tests},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {196},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/196},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DoroshenkoFLMR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DoroshenkoR06,
  author       = {Sergey Doroshenko and
                  Boris Ryabko},
  title        = {The experimental distinguishing attack on {RC4}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {70},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/070},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DoroshenkoR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DunkelmanK06,
  author       = {Orr Dunkelman and
                  Nathan Keller},
  title        = {Linear Cryptanalysis of {CTC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {250},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/250},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DunkelmanK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuoL06,
  author       = {Lei Duo and
                  Chao Li},
  title        = {Improved Collision and Preimage Resistance Bounds on {PGV} Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {462},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/462},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuoL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuursmaP06,
  author       = {Iwan M. Duursma and
                  Seungkook Park},
  title        = {ElGamal type signature schemes for n-dimensional vector spaces},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {312},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/312},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuursmaP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Elmegaard-Fessel06,
  author       = {Lars Elmegaard{-}Fessel},
  title        = {Efficient Scalar Multiplication and Security against Power Analysis
                  in Cryptosystems based on the {NIST} Elliptic Curves Over Prime Fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {313},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/313},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Elmegaard-Fessel06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EngelbertOS06,
  author       = {Daniela Engelbert and
                  Raphael Overbeck and
                  Arthur Schmidt},
  title        = {A Summary of McEliece-Type Cryptosystems and their Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {162},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/162},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EngelbertOS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Fangh06,
  author       = {Guanfei Fang and
                  Genxun huang},
  title        = {Improvement of recently proposed Remote User Authentication Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {200},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/200},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Fangh06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FarashahiSS06,
  author       = {Reza Rezaeian Farashahi and
                  Berry Schoenmakers and
                  Andrey Sidorenko},
  title        = {Efficient Pseudorandom Generators Based on the {DDH} Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {321},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/321},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FarashahiSS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FarrasMP06,
  author       = {Oriol Farr{\`{a}}s and
                  Jaume Mart{\'{\i}}{-}Farr{\'{e}} and
                  Carles Padr{\'{o}}},
  title        = {Ideal Multipartite Secret Sharing Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {292},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/292},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FarrasMP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FilhoB06,
  author       = {D{\'{e}}cio Luiz Gazzoni Filho and
                  Paulo S{\'{e}}rgio Licciardi Messeder Barreto},
  title        = {Demonstrating data possession and uncheatable data transfer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {150},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/150},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FilhoB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Filiol06,
  author       = {Eric Filiol},
  title        = {Zero-knowledge-like Proof of Cryptanalysis of Bluetooth Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {303},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/303},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Filiol06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FossorierMICM06,
  author       = {Marc P. C. Fossorier and
                  Miodrag J. Mihaljevic and
                  Hideki Imai and
                  Yang Cui and
                  Kanta Matsuura},
  title        = {A Novel Algorithm for Solving the {LPN} Problem and its Application
                  to Security Evaluation of the {HB} Protocol for {RFID} Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {197},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/197},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FossorierMICM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FranklinGM06,
  author       = {Matthew K. Franklin and
                  Mark A. Gondree and
                  Payman Mohassel},
  title        = {Improved Efficiency for Private Stable Matching},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {332},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/332},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FranklinGM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Freeman06,
  author       = {David Freeman},
  title        = {Constructing Pairing-Friendly Elliptic Curves with Embedding Degree
                  10},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {26},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/026},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Freeman06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FreemanST06,
  author       = {David Freeman and
                  Michael Scott and
                  Edlyn Teske},
  title        = {A taxonomy of pairing-friendly elliptic curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {372},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/372},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FreemanST06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Fujii06,
  author       = {Mikio Fujii},
  title        = {Secure Positioning of Mobile Terminals with Simplex Radio Communication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {273},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/273},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Fujii06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FujisakiS06,
  author       = {Eiichiro Fujisaki and
                  Koutarou Suzuki},
  title        = {Traceable Ring Signature},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {389},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/389},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FujisakiS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FumaroliV06,
  author       = {Guillaume Fumaroli and
                  David Vigilant},
  title        = {Blinded Fault Resistant Exponentiation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {143},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/143},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FumaroliV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Galbraith06,
  author       = {Steven D. Galbraith},
  title        = {Disguising tori and elliptic curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {248},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/248},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Galbraith06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithOS06,
  author       = {Steven D. Galbraith and
                  Colm O'hEigeartaigh and
                  Caroline Sheedy},
  title        = {Simplified pairing computation and security implications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {169},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/169},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithOS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithPRS06,
  author       = {Steven D. Galbraith and
                  Jordi Pujol{\`{a}}s and
                  Christophe Ritzenthaler and
                  Benjamin A. Smith},
  title        = {Distortion maps for genus two curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {375},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/375},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithPRS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithPS06,
  author       = {Steven D. Galbraith and
                  Kenneth G. Paterson and
                  Nigel P. Smart},
  title        = {Pairings for Cryptographers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {165},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/165},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithPS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithS06,
  author       = {Steven D. Galbraith and
                  Benjamin A. Smith},
  title        = {Discrete Logarithms in Generalized Jacobians},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {333},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/333},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalindoHK06,
  author       = {David Galindo and
                  Javier Herranz and
                  Eike Kiltz},
  title        = {On the Generic Construction of Identity-Based Signatures with Additional
                  Properties},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {296},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/296},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalindoHK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GangopadhyayS06,
  author       = {Sugata Gangopadhyay and
                  Deepmala Sharma},
  title        = {On construction of non-normal Boolean functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {118},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/118},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GangopadhyayS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GangopadhyayS06a,
  author       = {Sugata Gangopadhyay and
                  Deepmala Sharma},
  title        = {On a new invariant of Boolean functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {429},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/429},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GangopadhyayS06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarciaR06,
  author       = {Flavio D. Garcia and
                  Peter van Rossum},
  title        = {Sound Computational Interpretation of Formal Hashes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {14},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/014},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarciaR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarciaR06a,
  author       = {Flavio D. Garcia and
                  Peter van Rossum},
  title        = {Completeness of Formal Hashes in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {146},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/146},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarciaR06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ge06,
  author       = {He Ge},
  title        = {A Method to Implement Direct Anonymous Attestation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {23},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/023},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ge06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GeiselmannJKPS06,
  author       = {Willi Geiselmann and
                  Fabian Januszewski and
                  Hubert K{\"{o}}pfer and
                  Jan Pelzl and
                  Rainer Steinwandt},
  title        = {A Simpler Sieving Device: Combining {ECM} and {TWIRL}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {109},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/109},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GeiselmannJKPS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GeiselmannS06,
  author       = {Willi Geiselmann and
                  Rainer Steinwandt},
  title        = {Non-Wafer-Scale Sieving Hardware for the {NFS:} Another Attempt to
                  Cope with 1024-bit},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {403},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/403},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GeiselmannS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GennaroM06,
  author       = {Rosario Gennaro and
                  Silvio Micali},
  title        = {Independent Zero-Knowledge Sets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {155},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/155},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GennaroM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GertnerMM06,
  author       = {Yael Gertner and
                  Tal Malkin and
                  Steven A. Myers},
  title        = {Towards a Separation of Semantic and {CCA} Security for Public Key
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {447},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/447},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GertnerMM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GiriS06,
  author       = {Debasis Giri and
                  P. D. Srivastava},
  title        = {An Improved Remote User Authentication Scheme with Smart Cards using
                  Bilinear Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {274},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/274},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GiriS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gjosteen06,
  author       = {Kristian Gj{\o}steen},
  title        = {A Latency-Free Election Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {366},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/366},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gjosteen06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Goldreich06,
  author       = {Oded Goldreich},
  title        = {On Expected Probabilistic Polynomial-Time Adversaries - {A} suggestion
                  for restricted definitions and their benefits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {277},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/277},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Goldreich06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Goldreich06a,
  author       = {Oded Goldreich},
  title        = {On Post-Modern Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {461},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/461},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Goldreich06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GolleW06,
  author       = {Philippe Golle and
                  David A. Wagner},
  title        = {Cryptanalysis of a Cognitive Authentication Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {258},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/258},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GolleW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GorantlaS06,
  author       = {M. Choudary Gorantla and
                  Ashutosh Saxena},
  title        = {Verifiably Encrypted Signature Scheme with Threshold Adjudication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {343},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/343},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GorantlaS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GordonK06,
  author       = {S. Dov Gordon and
                  Jonathan Katz},
  title        = {Rational Secret Sharing, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {142},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/142},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GordonK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoriparthiDNS06,
  author       = {Thulasi Goriparthi and
                  Manik Lal Das and
                  Atul Negi and
                  Ashutosh Saxena},
  title        = {Cryptanalysis of recently proposed Remote User Authentication Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {28},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/028},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoriparthiDNS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gower06,
  author       = {Jason E. Gower},
  title        = {Prime Order Primitive Subgroups in Torus-Based Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {466},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/466},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gower06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalMOS06,
  author       = {Vipul Goyal and
                  Ryan Moriarty and
                  Rafail Ostrovsky and
                  Amit Sahai},
  title        = {Concurrent Statistical Zero-Knowledge Arguments for {NP} from One
                  Way Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {400},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/400},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalMOS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalPSW06,
  author       = {Vipul Goyal and
                  Omkant Pandey and
                  Amit Sahai and
                  Brent Waters},
  title        = {Attribute-Based Encryption for Fine-Grained Access Control of Encrypted
                  Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {309},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/309},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalPSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrangerPS06,
  author       = {Robert Granger and
                  Dan Page and
                  Nigel P. Smart},
  title        = {High Security Pairing-Based Cryptography Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {59},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/059},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrangerPS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrangerS06,
  author       = {Robert Granger and
                  Nigel P. Smart},
  title        = {On Computing Products of Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {172},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/172},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrangerS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GreenA06,
  author       = {Matthew Green and
                  Giuseppe Ateniese},
  title        = {Identity-Based Proxy Re-encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {473},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/473},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GreenA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrothO06,
  author       = {Jens Groth and
                  Rafail Ostrovsky},
  title        = {Cryptography in the Multi-string Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {407},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/407},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrothO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuZ06,
  author       = {Chunxiang Gu and
                  Yuefei Zhu},
  title        = {An Efficient ID-based Proxy Signature Scheme from Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {158},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/158},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuZZ06,
  author       = {Chunxiang Gu and
                  Yuefei Zhu and
                  YaJuan Zhang},
  title        = {Efficient Public Key Encryption with Keyword Search Schemes from Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {108},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/108},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuZZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoWW06,
  author       = {Lifeng Guo and
                  Guilin Wang and
                  Duncan S. Wong},
  title        = {Further Discussions on the Security of a Nominative Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {7},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/007},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoWW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuptaS06,
  author       = {Prateek Gupta and
                  Vitaly Shmatikov},
  title        = {Key confirmation and adaptive corruptions in the protocol security
                  logic},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {171},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/171},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuptaS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuptaS06a,
  author       = {Prateek Gupta and
                  Vitaly Shmatikov},
  title        = {Security Analysis of Voice-over-IP Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {424},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/424},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuptaS06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuttermanPR06,
  author       = {Zvi Gutterman and
                  Benny Pinkas and
                  Tzachy Reinman},
  title        = {Analysis of the Linux Random Number Generator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {86},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/086},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuttermanPR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaitnerR06,
  author       = {Iftach Haitner and
                  Omer Reingold},
  title        = {Statistically-Hiding Commitment from Any One-Way Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {436},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/436},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaitnerR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HanY06,
  author       = {Yiliang Han and
                  Xiaoyuan Yang},
  title        = {{ECGSC:} Elliptic Curve based Generalized Signcryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {126},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/126},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HanY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HanZC06,
  author       = {Wei Han and
                  Dong Zheng and
                  Kefei Chen},
  title        = {Some Remarks on the {TKIP} Key Mixing Function of {IEEE} 802.11i},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {129},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/129},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HanZC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HanaokaI06,
  author       = {Goichiro Hanaoka and
                  Hideki Imai},
  title        = {A Generic Construction of CCA-Secure Cryptosystems without {NIZKP}
                  for a Bounded Number of Decryption Queries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {408},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/408},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HanaokaI06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HarasawaSK06,
  author       = {Ryuichi Harasawa and
                  Yutaka Sueyoshi and
                  Aichi Kudo},
  title        = {Tate pairing for y\({}^{\mbox{2}}\)=x\({}^{\mbox{5}}\)-{\(\alpha\)}x
                  in Characteristic Five},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {114},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/114},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HarasawaSK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HarasawaSK06a,
  author       = {Ryuichi Harasawa and
                  Yutaka Sueyoshi and
                  Aichi Kudo},
  title        = {Ate pairing for y\({}^{\mbox{2}}\)=x\({}^{\mbox{5}}\)-{\(\alpha\)}x
                  in characteristic five},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {202},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/202},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HarasawaSK06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Harayama06,
  author       = {Tomohiro Harayama},
  title        = {On the Weil Sum Evaluation of Central Polynomial in Multivariate Quadratic
                  Cryptosystem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {75},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/075},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Harayama06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HerranzHK06,
  author       = {Javier Herranz and
                  Dennis Hofheinz and
                  Eike Kiltz},
  title        = {The Kurosawa-Desmedt Key Encapsulation is not Chosen-Ciphertext Secure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {207},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/207},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HerranzHK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HerranzHK06a,
  author       = {Javier Herranz and
                  Dennis Hofheinz and
                  Eike Kiltz},
  title        = {Some (in)sufficient conditions for secure hybrid encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {265},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/265},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HerranzHK06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HerranzS06,
  author       = {Javier Herranz and
                  Germ{\'{a}}n S{\'{a}}ez},
  title        = {New Results on Multipartite Access Structures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {48},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/048},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HerranzS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Herzberg06,
  author       = {Amir Herzberg},
  title        = {Browsers Defenses Against Phishing, Spoofing and Malware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {83},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/083},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Herzberg06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HerzbergY06,
  author       = {Amir Herzberg and
                  Igal Yoffe},
  title        = {Foundations of Secure E-Commerce: The Order Layer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {352},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/352},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HerzbergY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HerzbergY06a,
  author       = {Amir Herzberg and
                  Igal Yoffe},
  title        = {The Layered Games Framework for Specifications and Analysis of Security
                  Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {398},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/398},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HerzbergY06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HessSV06,
  author       = {Florian Hess and
                  Nigel P. Smart and
                  Frederik Vercauteren},
  title        = {The Eta Pairing Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {110},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/110},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HessSV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeubergerM06,
  author       = {Clemens Heuberger and
                  James A. Muir},
  title        = {Minimal Weight and Colexicographically Minimal Integer Representations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {209},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/209},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeubergerM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hitt06,
  author       = {Laura Hitt},
  title        = {On the Minimal Embedding Field},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {415},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/415},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hitt06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HofheinzMS06,
  author       = {Dennis Hofheinz and
                  John Malone{-}Lee and
                  Martijn Stam},
  title        = {Obfuscation for Cryptographic Purposes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {463},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/463},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HofheinzMS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HofheinzMU06,
  author       = {Dennis Hofheinz and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Dominique Unruh},
  title        = {On the (Im-)Possibility of Extending Coin Toss},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {177},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/177},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HofheinzMU06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HofheinzU06,
  author       = {Dennis Hofheinz and
                  Dominique Unruh},
  title        = {Simulatable Security and Polynomially Bounded Concurrent Composition},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {130},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/130},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HofheinzU06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Holt06,
  author       = {Jason E. Holt},
  title        = {Key Privacy for Identity Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {120},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/120},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Holt06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HopperMW06,
  author       = {Nicholas Hopper and
                  David Molnar and
                  David A. Wagner},
  title        = {From Weak to Strong Watermarking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {430},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/430},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HopperMW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hruby06,
  author       = {Jaroslav Hruby},
  title        = {On the Postquantum Cipher Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {246},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/246},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hruby06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangCW06,
  author       = {Zhenjie Huang and
                  Kefei Chen and
                  Yumin Wang},
  title        = {Analysis and Improvements of Two Identity-Based Perfect Concurrent
                  Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {353},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/353},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangCW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangWZ06,
  author       = {Qiong Huang and
                  Duncan S. Wong and
                  Yiming Zhao},
  title        = {Generic Transformation to Strongly Unforgeable Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {346},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/346},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangWZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Iftene06,
  author       = {Sorin Iftene},
  title        = {General Secret Sharing Based on the Chinese Remainder Theorem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {166},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/166},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Iftene06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshaiKOS06,
  author       = {Yuval Ishai and
                  Eyal Kushilevitz and
                  Rafail Ostrovsky and
                  Amit Sahai},
  title        = {Cryptography from Anonymity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {84},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/084},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshaiKOS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Iwata06,
  author       = {Tetsu Iwata},
  title        = {New Blockcipher Modes of Operation with Beyond the Birthday Bound
                  Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {188},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/188},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Iwata06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JakimoskiD06,
  author       = {Goce Jakimoski and
                  Yvo Desmedt},
  title        = {A Tree-based Model of Unicast Stream Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {89},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/089},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JakimoskiD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Jiang06,
  author       = {Shaoquan Jiang},
  title        = {Efficient Primitives from Exponentiation in Zp},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {46},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/046},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Jiang06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JouxL06,
  author       = {Antoine Joux and
                  Reynald Lercier},
  title        = {Counting points on elliptic curves in medium characteristic},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {176},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/176},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JouxL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JuelsW06,
  author       = {Ari Juels and
                  Stephen A. Weis},
  title        = {Defining Strong Privacy for {RFID}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {137},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/137},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JuelsW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kaiser06,
  author       = {Ulrich Kaiser},
  title        = {Hermes8 : {A} Low-Complexity Low-Power Stream Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {19},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/019},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kaiser06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KasperLL06,
  author       = {Emilia K{\"{a}}sper and
                  Sven Laur and
                  Helger Lipmaa},
  title        = {Black-Box Knowledge Extraction Revisited: Universal Approach with
                  Precise Bounds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {356},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/356},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KasperLL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Katz06,
  author       = {Jonathan Katz},
  title        = {On Achieving the "Best of Both Worlds" in Secure Multiparty Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {455},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/455},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Katz06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KatzK06,
  author       = {Jonathan Katz and
                  Chiu{-}Yuen Koo},
  title        = {On Expected Constant-Round Protocols for Byzantine Agreement},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {65},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/065},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KatzK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KatzS06,
  author       = {Jonathan Katz and
                  Adam D. Smith},
  title        = {Analyzing the {HB} and {HB+} Protocols in the "Large Error" Case},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {326},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/326},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KatzS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KavutMSY06,
  author       = {Sel{\c{c}}uk Kavut and
                  Subhamoy Maitra and
                  Sumanta Sarkar and
                  Melek Diker Y{\"{u}}cel},
  title        = {Enumeration of 9-variable Rotation Symmetric Boolean Functions having
                  Nonlinearity {\textgreater} 240},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {249},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/249},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KavutMSY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KavutMY06,
  author       = {Sel{\c{c}}uk Kavut and
                  Subhamoy Maitra and
                  Melek D. Y{\"{u}}cel},
  title        = {There exist Boolean functions on n (odd) variables having nonlinearity
                  {\textgreater} 2\({}^{\mbox{n-1}}\) - 2\({}^{\mbox{(n-1)/2}}\) if
                  and only if n{\textgreater}7},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {181},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/181},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KavutMY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KawachiKNY06,
  author       = {Akinori Kawachi and
                  Takeshi Koshiba and
                  Harumichi Nishimura and
                  Tomoyuki Yamakami},
  title        = {Computational Indistinguishability between Quantum States and Its
                  Cryptographic Application},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {148},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/148},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KawachiKNY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KawaharaTO06,
  author       = {Yuto Kawahara and
                  Tsuyoshi Takagi and
                  Eiji Okamoto},
  title        = {Efficient Implementation of Tate Pairing on a Mobile Phone using Java},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {299},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/299},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KawaharaTO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KellerMMV06,
  author       = {Nathan Keller and
                  Stephen D. Miller and
                  Ilya Mironov and
                  Ramarathnam Venkatesan},
  title        = {{MV3:} {A} new word based stream cipher using rapid mixing and revolving
                  buffers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {341},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/341},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KellerMMV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Khader06,
  author       = {Dalia Khader},
  title        = {Public Key Encryption with Keyword Search based on K-Resilient {IBE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {358},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/358},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Khader06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhazaeiHK06,
  author       = {Shahram Khazaei and
                  Mahdi M. Hasanzadeh and
                  Mohammad S. Kiaei},
  title        = {Linear Sequential Circuit Approximation of Grain and Trivium Stream
                  Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {141},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/141},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KhazaeiHK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Khovratovich06,
  author       = {Dmitry Khovratovich},
  title        = {Divisibility of the Hamming Weight by 2\({}^{\mbox{k}}\) and Monomial
                  Criteria for Boolean Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {180},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/180},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Khovratovich06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasY06,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {Copyrighting Public-key Functions and Applications to Black-box Traitor
                  Tracing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {458},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/458},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kiltz06,
  author       = {Eike Kiltz},
  title        = {Chosen-Ciphertext Secure Identity-Based Encryption in the Standard
                  Model with short Ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {122},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/122},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kiltz06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiltzG06,
  author       = {Eike Kiltz and
                  David Galindo},
  title        = {Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation without
                  Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {34},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/034},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiltzG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kim06,
  author       = {Jongsung Kim},
  title        = {Combined Differential, Linear and Related-Key Attacks on Block Ciphers
                  and {MAC} Algorithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {451},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/451},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kim06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimBPH06,
  author       = {Jongsung Kim and
                  Alex Biryukov and
                  Bart Preneel and
                  Seokhie Hong},
  title        = {On the Security of {HMAC} and {NMAC} Based on HAVAL, MD4, MD5, {SHA-0}
                  and {SHA-1}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {187},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/187},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimBPH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimKP06,
  author       = {E{-}yong Kim and
                  Hwangnam Kim and
                  Kunsoo Park},
  title        = {Provisioning Protected Resource Sharing in Multi-Hop Wireless Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {382},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/382},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimKP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimTHKL06,
  author       = {Tae Hyun Kim and
                  Tsuyoshi Takagi and
                  Dong{-}Guk Han and
                  Ho Won Kim and
                  Jongin Lim},
  title        = {Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems
                  over Binary Fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {243},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/243},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KimTHKL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KirschenbaumW06,
  author       = {Ilan Kirschenbaum and
                  Avishai Wool},
  title        = {How to Build a Low-Cost, Extended-Range {RFID} Skimmer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {54},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/054},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KirschenbaumW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KissnerM06,
  author       = {Lea Kissner and
                  David Molnar},
  title        = {Provably Secure Subsitution of Cryptographic Tools},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {4},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/004},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KissnerM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Klima06,
  author       = {Vlastimil Kl{\'{\i}}ma},
  title        = {Tunnels in Hash Functions: {MD5} Collisions Within a Minute},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {105},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/105},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Klima06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Klima06a,
  author       = {Vlastimil Kl{\'{\i}}ma},
  title        = {A New Concept of Hash Functions {SNMAC} Using a Special Block Cipher
                  and {NMAC/HMAC} Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {376},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/376},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Klima06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoblitzM06,
  author       = {Neal Koblitz and
                  Alfred Menezes},
  title        = {Another Look at "Provable Security". {II}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {229},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/229},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoblitzM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoblitzM06a,
  author       = {Neal Koblitz and
                  Alfred Menezes},
  title        = {Another Look at Generic Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {230},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/230},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoblitzM06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kocar06,
  author       = {Osman Kocar},
  title        = {{DPA} attacks on keys stored in {CMOS} cryptographic devices through
                  the influence of the leakage behavior},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {192},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/192},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kocar06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KolesnikovR06,
  author       = {Vladimir Kolesnikov and
                  Charles Rackoff},
  title        = {Key Exchange Using Passwords and Long Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {57},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/057},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KolesnikovR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kong06,
  author       = {Jiejun Kong},
  title        = {{GVG-RP:} {A} Net-centric Negligibility-based Security Model for Self-organizing
                  Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {140},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/140},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kong06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kramer06,
  author       = {Simon Kramer},
  title        = {Logical Concepts in Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {262},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/262},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kramer06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Krovetz06,
  author       = {Ted Krovetz},
  title        = {Message Authentication on 64-bit Architectures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {37},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/037},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Krovetz06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KumarSS06,
  author       = {Phani Kumar Kancharla and
                  Shailaja Gummadidala and
                  Ashutosh Saxena},
  title        = {Identity Based Strong Designated Verifier Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {134},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/134},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KumarSS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KumarSS06a,
  author       = {K. Phani Kumar and
                  G. Shailaja and
                  Ashutosh Saxena},
  title        = {Secure and Efficient Threshold Key Issuing Protocol for ID-based Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {245},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/245},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KumarSS06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kurt06,
  author       = {Yesem Kurt},
  title        = {A New Key Exchange Primitive Based on the Triple Decomposition Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {378},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/378},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kurt06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kusters06,
  author       = {Ralf K{\"{u}}sters},
  title        = {Simulation-Based Security with Inexhaustible Interactive Turing Machines},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {151},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/151},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kusters06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KuwakadoM06,
  author       = {Hidenori Kuwakado and
                  Masakatu Morii},
  title        = {Indifferentiability of Single-Block-Length and Rate-1 Compression
                  Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {485},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/485},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KuwakadoM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KwonJSL06,
  author       = {Jeong Ok Kwon and
                  Ik Rae Jeong and
                  Kouichi Sakurai and
                  Dong Hoon Lee},
  title        = {Password-Authenticated Multi-Party Key Exchange with Different Passwords},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {476},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/476},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KwonJSL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaMacchiaLM06,
  author       = {Brian A. LaMacchia and
                  Kristin E. Lauter and
                  Anton Mityagin},
  title        = {Stronger Security of Authenticated Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {73},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/073},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LaMacchiaLM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LalV06,
  author       = {Sunder Lal and
                  Vandani Verma},
  title        = {Identity Based Strong Designated Verifier Proxy Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {394},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/394},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LalV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LambergerPR06,
  author       = {Mario Lamberger and
                  Norbert Pramstaller and
                  Vincent Rijmen},
  title        = {Second Preimages for Iterated Hash Functions Based on a b-Block Bypass},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {116},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/116},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LambergerPR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaurL06,
  author       = {Sven Laur and
                  Helger Lipmaa},
  title        = {On the Feasibility of Consistent Computations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {88},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/088},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LaurL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaurLM06,
  author       = {Sven Laur and
                  Helger Lipmaa and
                  Taneli Mielik{\"{a}}inen},
  title        = {Cryptographically Private Support Vector Machines},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {198},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/198},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LaurLM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeBM06,
  author       = {Tri Van Le and
                  Mike Burmester and
                  Breno de Medeiros},
  title        = {Universally Composable and Forward Secure {RFID} Authentication and
                  Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {448},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/448},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeBM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeLKW06,
  author       = {Yunho Lee and
                  Kwang{-}Woo Lee and
                  Seungjoo Kim and
                  Dongho Won},
  title        = {Towards Trustworthy e-Voting using Paper Receipts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {167},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/167},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeLKW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeLL06,
  author       = {Eunjeong Lee and
                  Hyang{-}Sook Lee and
                  Yoonjin Lee},
  title        = {Fast computation of Tate pairing on general divisors of genus 3 hyperelliptic
                  curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {125},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/125},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeLL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lei06,
  author       = {Duo Lei},
  title        = {New Integrated proof Method on Iterated Hash Structure and New Structures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {147},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/147},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lei06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeiLCFQ06,
  author       = {Duo Lei and
                  Da Lin and
                  Chao Li and
                  Keqin Feng and
                  Longjiang Qu},
  title        = {The Design Principle of Hash Function with Merkle-Damg{\aa}rd Construction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {135},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/135},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeiLCFQ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Li06,
  author       = {Chengqing Li},
  title        = {Cryptanalyses of Some Multimedia Encryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {340},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/340},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Li06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Li06a,
  author       = {An{-}Ping Li},
  title        = {A new stream cipher: {DICING}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {354},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/354},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Li06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Li06b,
  author       = {An{-}Ping Li},
  title        = {A new Mac: {LAMA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {409},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/409},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Li06b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Li06c,
  author       = {An{-}Ping Li},
  title        = {Linear Approximating to Integer Addition},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {457},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/457},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Li06c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiHL06,
  author       = {Fagen Li and
                  Yupu Hu and
                  Shuanggen Liu},
  title        = {Efficient and Provably Secure Multi-Recipient Signcryption from Bilinear
                  Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {338},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/338},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiHL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiLLC06,
  author       = {Shujun Li and
                  Chengqing Li and
                  Kwok{-}Tung Lo and
                  Guanrong Chen},
  title        = {Cryptanalysis of an Image Scrambling Scheme without Bandwidth Expansion},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {215},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/215},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiLLC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Liao06,
  author       = {Lijun Liao},
  title        = {Group Key Agreement for Ad Hoc Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {6},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/006},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Liao06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LindenbergWB06,
  author       = {Christina Lindenberg and
                  Kai Wirt and
                  Johannes Buchmann},
  title        = {Formal Proof for the Correctness of {RSA-PSS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {11},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/011},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LindenbergWB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuAS06,
  author       = {Joseph K. Liu and
                  Man Ho Au and
                  Willy Susilo},
  title        = {Self-Generated-Certificate Public Key Cryptography and Certificateless
                  Signature / Encryption Scheme in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {373},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/373},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuAS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuHC06,
  author       = {Chao{-}Liang Liu and
                  Gwoboa Horng and
                  Te{-}Yu Chen},
  title        = {Further Refinement of Pairing Computation Based on Miller's Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {106},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/106},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuHC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuZ06,
  author       = {Shengli Liu and
                  Fangguo Zhang},
  title        = {Cryptanalysis of {REESSE1+} Public Key Cryptosystem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {480},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/480},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuOSSW06,
  author       = {Steve Lu and
                  Rafail Ostrovsky and
                  Amit Sahai and
                  Hovav Shacham and
                  Brent Waters},
  title        = {Sequential Aggregate Signatures and Multisignatures without Random
                  Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {96},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/096},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LuOSSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaAL06,
  author       = {Chunbo Ma and
                  Jun Ao and
                  Jianhua Li},
  title        = {Chameleon-Based Deniable Authenticated Key Agreement Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {318},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/318},
  timestamp    = {Sun, 03 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaAL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Mahalanobis06,
  author       = {Ayan Mahalanobis},
  title        = {A simple generalization of El-Gamal cryptosystem to non-abelian groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {233},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/233},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Mahalanobis06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Manulis06,
  author       = {Mark Manulis},
  title        = {Survey on Security Requirements and Models for Group Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {388},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/388},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Manulis06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Manulis06a,
  author       = {Mark Manulis},
  title        = {Security-Focused Survey on Group Key Exchange Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {395},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/395},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Manulis06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ManulisSS06,
  author       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  J{\"{o}}rg Schwenk},
  title        = {Linkable Democratic Group Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {40},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/040},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ManulisSS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Marti-FarreP06,
  author       = {Jaume Mart{\'{\i}}{-}Farr{\'{e}} and
                  Carles Padr{\'{o}}},
  title        = {On Secret Sharing Schemes, Matroids and Polymatroids},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {77},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/077},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Marti-FarreP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MashatanS06,
  author       = {Atefeh Mashatan and
                  Douglas R. Stinson},
  title        = {Noninteractive two-channel message authentication based on hybrid-collision
                  resistant hash functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {302},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/302},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MashatanS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MatusiewiczCP06,
  author       = {Krystian Matusiewicz and
                  Scott Contini and
                  Josef Pieprzyk},
  title        = {Weaknesses of the {FORK-256} compression function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {317},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/317},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MatusiewiczCP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaurerOPS06,
  author       = {Ueli Maurer and
                  Yvonne Anne Oswald and
                  Krzysztof Pietrzak and
                  Johan Sj{\"{o}}din},
  title        = {Luby-Rackoff Ciphers from Weak Round Functions?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {213},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/213},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaurerOPS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaurerPR06,
  author       = {Ueli Maurer and
                  Krzysztof Pietrzak and
                  Renato Renner},
  title        = {Indistinguishability Amplification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {456},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/456},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaurerPR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaurerS06,
  author       = {Ueli Maurer and
                  Johan Sj{\"{o}}din},
  title        = {A Fast and Key-Efficient Reduction of Chosen- Ciphertext to Known-Plaintext
                  Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {71},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/071},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaurerS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Mendel06,
  author       = {Florian Mendel},
  title        = {Colliding Message Pair for 53-Step {HAS-160}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {334},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/334},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Mendel06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Mireles06,
  author       = {David Mireles},
  title        = {An Attack on Disguised Elliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {469},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/469},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Mireles06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MironovMN06,
  author       = {Ilya Mironov and
                  Anton Mityagin and
                  Kobbi Nissim},
  title        = {Hard Instances of the Constrained Discrete Logarithm Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {253},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/253},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MironovMN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MironovZ06,
  author       = {Ilya Mironov and
                  Lintao Zhang},
  title        = {Applications of {SAT} Solvers to Cryptanalysis of Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {254},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/254},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MironovZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MishraPS06,
  author       = {Pradeep Kumar Mishra and
                  Pinakpani Pal and
                  Palash Sarkar},
  title        = {Towards Minimizing Memory Requirement for Implementation of Hyperelliptic
                  Curve Crytosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {204},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/204},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MishraPS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Moh06,
  author       = {Tzuong{-}Tsieng Moh},
  title        = {The Recent Attack of Nie et al On {TTM} is Faulty},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {417},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/417},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Moh06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MolnarKSW06,
  author       = {David Molnar and
                  Tadayoshi Kohno and
                  Naveen Sastry and
                  David A. Wagner},
  title        = {Tamper-Evident, History-Independent, Subliminal-Free Data Structures
                  on {PROM} Storage -or- How to Store Ballots on a Voting Machine},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {81},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/081},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MolnarKSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MomoseC06,
  author       = {Fumiyuki Momose and
                  Jinhui Chao},
  title        = {Classification of Weil Restrictions Obtained by (2, ..., 2) Coverings
                  of P\({}^{\mbox{1}}\)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {347},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/347},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MomoseC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MorilloR06,
  author       = {Paz Morillo and
                  Carla R{\`{a}}fols},
  title        = {Certificate-Based Encryption Without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {12},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/012},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MorilloR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Muir06,
  author       = {James A. Muir},
  title        = {A Simple Left-to-Right Algorithm for the Computation of the Arithmetic
                  Weight of Integers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {8},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/008},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Muir06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MukhopadhyayS06,
  author       = {Sourav Mukhopadhyay and
                  Palash Sarkar},
  title        = {Application of LFSRs for Parallel Sequence Generation in Cryptologic
                  Algorithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {42},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/042},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MukhopadhyayS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MukhopadhyayS06a,
  author       = {Sourav Mukhopadhyay and
                  Palash Sarkar},
  title        = {A New Cryptanalytic Time/Memory/Data Trade-off Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {127},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/127},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MukhopadhyayS06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Muller-QuadeU06,
  author       = {J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Dominique Unruh},
  title        = {Long-term Security and Universal Composability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {422},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/422},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Muller-QuadeU06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MykletunT06,
  author       = {Einar Mykletun and
                  Gene Tsudik},
  title        = {On Security of Sovereign Joins},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {380},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/380},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MykletunT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NagaoMO06,
  author       = {Waka Nagao and
                  Yoshifumi Manabe and
                  Tatsuaki Okamoto},
  title        = {On the Equivalence of Several Security Notions of Key Encapsulation
                  Mechanism},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {268},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/268},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NagaoMO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaitoSSYKO06,
  author       = {Yusuke Naito and
                  Yu Sasaki and
                  Takeshi Shimoyama and
                  Jun Yajima and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  title        = {Message Modification for Step 21-23 on {SHA-0}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {16},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/016},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaitoSSYKO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NakanoKM06,
  author       = {Yuto Nakano and
                  Hidenori Kuwakado and
                  Masakatu Morii},
  title        = {Redundancy of the Wang-Yu Sufficient Conditions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {406},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/406},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NakanoKM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NamLW06,
  author       = {Junghyun Nam and
                  Youngsook Lee and
                  Dongho Won},
  title        = {Constant Round Group Key Exchange with Logarithmic Computational Complexity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {284},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/284},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NamLW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nandi06,
  author       = {Mridul Nandi},
  title        = {A Simple and Unified Method of Proving Unpredictability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {264},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/264},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nandi06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NandiS06,
  author       = {Mridul Nandi and
                  Douglas R. Stinson},
  title        = {Multicollision Attacks on some Generalized Sequential Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {55},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/055},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NandiS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorR06,
  author       = {Moni Naor and
                  Guy N. Rothblum},
  title        = {The Complexity of Online Memory Checking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {91},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/091},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaorR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorSS06,
  author       = {Moni Naor and
                  Gil Segev and
                  Adam D. Smith},
  title        = {Tight Bounds for Unconditional Authentication Protocols in the Manual
                  Channel and Shared Key Models},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {175},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/175},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaorSS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NarayananS06,
  author       = {Arvind Narayanan and
                  Vitaly Shmatikov},
  title        = {On the Limits of Point Function Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {182},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/182},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NarayananS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NawazGG06,
  author       = {Yassir Nawaz and
                  Kishan Chand Gupta and
                  Guang Gong},
  title        = {Algebraic Immunity of S-boxes Based on Power Mappings: Analysis and
                  Construction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {322},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/322},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NawazGG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nguyen06,
  author       = {Phong Q. Nguyen},
  title        = {A Note on the Security of NTRUSign},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {387},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/387},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nguyen06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NguyenOV06,
  author       = {Minh{-}Huyen Nguyen and
                  Shien Jin Ong and
                  Salil P. Vadhan},
  title        = {Statistical Zero-Knowledge Arguments for {NP} from Any One-Way Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {185},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/185},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NguyenOV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nicolas06,
  author       = {Nicolas M{\'{e}}loni},
  title        = {Fast and Secure Elliptic Curve Scalar Multiplication Over Prime Fields
                  Using Special Addition Chains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {216},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/216},
  timestamp    = {Thu, 08 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nicolas06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nikov06,
  author       = {Ventzislav Nikov},
  title        = {A DoS Attack Against the Integrity-Less {ESP} (IPSec)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {370},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/370},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nikov06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nitaj06,
  author       = {Abderrahmane Nitaj},
  title        = {Cryptanalysis of {RSA} with constrained keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {92},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/092},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nitaj06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nitaj06a,
  author       = {Abderrahmane Nitaj},
  title        = {{RSA} and a higher degree diophantine equation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {93},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/093},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nitaj06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nitaj06b,
  author       = {Abderrahmane Nitaj},
  title        = {Application of {ECM} to a Class of {RSA} keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {235},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/235},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nitaj06b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OEigeartaighS06,
  author       = {Colm O'hEigeartaigh and
                  Michael Scott},
  title        = {Pairing Calculation on Supersingular Genus 2 Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {5},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/005},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OEigeartaighS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ONeil06,
  author       = {Sean O'Neil},
  title        = {Vector Stream Cipher Instant Key Recovery},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {36},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/036},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ONeil06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Okamoto06,
  author       = {Tatsuaki Okamoto},
  title        = {Efficient Blind and Partially Blind Signatures Without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {102},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/102},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Okamoto06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OngV06,
  author       = {Shien Jin Ong and
                  Salil P. Vadhan},
  title        = {Zero Knowledge and Soundness are Symmetric},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {414},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/414},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OngV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OstrovskyPV06,
  author       = {Rafail Ostrovsky and
                  Giuseppe Persiano and
                  Ivan Visconti},
  title        = {Constant-Round Concurrent {NMWI} and its relation to {NMZK}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {256},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/256},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OstrovskyPV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Overbeck06,
  author       = {Raphael Overbeck},
  title        = {Decoding Interleaved Gabidulin Codes and Ciphertext-Security for {GPT}
                  variants},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {222},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/222},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Overbeck06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Padhye06,
  author       = {Sahadeo Padhye},
  title        = {A Public Key Cryptosystem Based on Pell Equation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {191},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/191},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Padhye06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Page06,
  author       = {Dan Page},
  title        = {A Note On Side-Channels Resulting From Dynamic Compilation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {349},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/349},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Page06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Parakh06,
  author       = {Abhishek Parakh},
  title        = {A d-Sequence based Recursive Random Number Generator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {310},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/310},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Parakh06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Park06,
  author       = {Je Hong Park},
  title        = {An attack on the certificateless signature scheme from {EUC} Workshops
                  2006},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {442},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/442},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Park06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Paterson06,
  author       = {Kenneth G. Paterson},
  title        = {A Cryptographic Tour of the IPsec Standards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {97},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/097},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Paterson06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatersonS06,
  author       = {Kenneth G. Paterson and
                  Jacob C. N. Schuldt},
  title        = {Efficient Identity-based Signatures Secure in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {80},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/080},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatersonS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PeikertR06,
  author       = {Chris Peikert and
                  Alon Rosen},
  title        = {Lattices that Admit Logarithmic Worst-Case to Average-Case Connection
                  Factors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {444},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/444},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PeikertR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Pestunov06,
  author       = {Andrey Pestunov},
  title        = {Statistical Analysis of the {MARS} Block Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {217},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/217},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Pestunov06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PfitzmannSW06,
  author       = {Birgit Pfitzmann and
                  Matthias Schunter and
                  Michael Waidner},
  title        = {Reactively Simulatable Certified Mail},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {41},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/041},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PfitzmannSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PhongO06,
  author       = {Le Trieu Phong and
                  Wakaha Ogata},
  title        = {On a Variation of Kurosawa-Desmedt Encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {31},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/031},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PhongO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PhongO06a,
  author       = {Le Trieu Phong and
                  Wakaha Ogata},
  title        = {Some Practical Public-Key Encryption Schemes in both Standard Model
                  and Random Oracle Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {173},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/173},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PhongO06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Pietrzak06,
  author       = {Krzysztof Pietrzak},
  title        = {Non-Trivial Black-Box Combiners for Collision-Resistant Hash-Functions
                  don't Exist},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {348},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/348},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Pietrzak06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PintoSMA06,
  author       = {Alexandre Pinto and
                  Andre Souto and
                  Armando Matos and
                  Luis Filipe Coelho Antunes},
  title        = {Galois Field Commitment Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {410},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/410},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PintoSMA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Popovych06,
  author       = {Roman Popovych},
  title        = {Improvement to {AKS} algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {232},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/232},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Popovych06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RaddumS06,
  author       = {H{\aa}vard Raddum and
                  Igor A. Semaev},
  title        = {New Technique for Solving Sparse Equation Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {475},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/475},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RaddumS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RaghavanPM06,
  author       = {Barath Raghavan and
                  Saurabh Panjwani and
                  Anton Mityagin},
  title        = {Analysis of the {SPV} Secure Routing Protocol: Weaknesses and Lessons},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {87},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/087},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RaghavanPM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RahmanIOMO06,
  author       = {Sk. Md. Mizanur Rahman and
                  Atsuo Inomata and
                  Takeshi Okamoto and
                  Masahiro Mambo and
                  Eiji Okamoto},
  title        = {Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {328},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/328},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RahmanIOMO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RaimondoGK06,
  author       = {Mario Di Raimondo and
                  Rosario Gennaro and
                  Hugo Krawczyk},
  title        = {Deniable Authentication and Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {280},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/280},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RaimondoGK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RamasamyC06,
  author       = {HariGovind V. Ramasamy and
                  Christian Cachin},
  title        = {Parsimonious Asynchronous Byzantine-Fault-Tolerant Atomic Broadcast},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {82},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/082},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RamasamyC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RamzanW06,
  author       = {Zulfikar Ramzan and
                  David P. Woodruff},
  title        = {Fast Algorithms for the Free Riders Problem in Broadcast Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {293},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/293},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RamzanW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Rappe06,
  author       = {Doerte K. Rappe},
  title        = {Homomorphic Cryptosystems and their Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/001},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Rappe06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RechbergerR06,
  author       = {Christian Rechberger and
                  Vincent Rijmen},
  title        = {On Authentication with {HMAC} and Non-Random Properties},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {290},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/290},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RechbergerR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Rodriguez-HenriquezML06,
  author       = {Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and
                  Guillermo Morales{-}Luna and
                  Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez},
  title        = {Low Complexity Bit-Parallel Square Root Computation over GF(2\({}^{\mbox{m}}\))
                  for all Trinomials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {133},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/133},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Rodriguez-HenriquezML06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Rodriguez-HenriquezMSC06,
  author       = {Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and
                  Guillermo Morales{-}Luna and
                  Nazar Abbas Saqib and
                  Nareli Cruz Cort{\'{e}}s},
  title        = {Parallel Itoh-Tsujii Multiplicative Inversion Algorithm for a Special
                  Class of Trinomials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {35},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/035},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Rodriguez-HenriquezMSC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Rogaway06,
  author       = {Phillip Rogaway},
  title        = {Formalizing Human Ignorance: Collision-Resistant Hashing without the
                  Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {281},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/281},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Rogaway06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RogawayS06,
  author       = {Phillip Rogaway and
                  Thomas Shrimpton},
  title        = {Deterministic Authenticated-Encryption: {A} Provable-Security Treatment
                  of the Key-Wrap Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {221},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/221},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RogawayS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RonanhMKB06,
  author       = {Robert Ronan and
                  Colm O'hEigeartaigh and
                  Colin C. Murphy and
                  Tim Kerins and
                  Paulo S. L. M. Barreto},
  title        = {Hardware Implementation of the {\(\eta\)}\({}^{\mbox{T}}\) Pairing
                  in Characteristic 3},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {371},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/371},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RonanhMKB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Rostovtsev06,
  author       = {Alexander Rostovtsev},
  title        = {Fast exponentiation via prime finite field isomorphism},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {115},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/115},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Rostovtsev06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RostovtsevS06,
  author       = {Alexander Rostovtsev and
                  Anton Stolbunov},
  title        = {Public-Key Cryptosystem Based on Isogenies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {145},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/145},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RostovtsevS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RoyDDM06,
  author       = {Arnab Roy and
                  Anupam Datta and
                  Ante Derek and
                  John C. Mitchell},
  title        = {Inductive Trace Properties for Computational Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {486},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/486},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RoyDDM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RuinskiyST06,
  author       = {Dima Ruinskiy and
                  Adi Shamir and
                  Boaz Tsaban},
  title        = {Length-based cryptanalysis: The case of Thompson's Group},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {244},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/244},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RuinskiyST06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RyabkoR06,
  author       = {Boris Ryabko and
                  Daniil Ryabko},
  title        = {Provably Secure Universal Steganographic Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {63},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/063},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RyabkoR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Saarinen06,
  author       = {Markku{-}Juhani O. Saarinen},
  title        = {Security of {VSH} in the Real World},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {103},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/103},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Saarinen06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Safavi-NainiW06,
  author       = {Reihaneh Safavi{-}Naini and
                  Peter R. Wild},
  title        = {Information Theoretic Bounds on Authentication Systems in Query Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {433},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/433},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Safavi-NainiW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SantisFM06,
  author       = {Alfredo De Santis and
                  Anna Lisa Ferrara and
                  Barbara Masucci},
  title        = {Efficient Provably-Secure Hierarchical Key Assignment Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {479},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/479},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SantisFM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SantisFM06a,
  author       = {Alfredo De Santis and
                  Anna Lisa Ferrara and
                  Barbara Masucci},
  title        = {New Constructions for Provably-Secure Time-Bound Hierarchical Key
                  Assignment Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {483},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/483},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SantisFM06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SarkarC06,
  author       = {Palash Sarkar and
                  Sanjit Chatterjee},
  title        = {Construction of a Hybrid (Hierarchical) Identity-Based Encryption
                  Protocol Secure Against Adaptive Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {362},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/362},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SarkarC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SasakiNYSKO06,
  author       = {Yu Sasaki and
                  Yusuke Naito and
                  Jun Yajima and
                  Takeshi Shimoyama and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  title        = {How to Construct Sufficient Condition in Searching Collisions of {MD5}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {74},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/074},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SasakiNYSKO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SaxenaEKA06,
  author       = {Nitesh Saxena and
                  Jan{-}Erik Ekberg and
                  Kari Kostiainen and
                  N. Asokan},
  title        = {Secure Device Pairing based on a Visual Channel},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {50},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/050},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SaxenaEKA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SaxenaS06a,
  author       = {Amitabh Saxena and
                  Ben Soh},
  title        = {A New Cryptosystem Based On Hidden Order Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {178},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/178},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SaxenaS06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Schirokauer06,
  author       = {Oliver Schirokauer},
  title        = {The number field sieve for integers of low weight},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {107},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/107},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Schirokauer06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SchoenmakersS06,
  author       = {Berry Schoenmakers and
                  Andrey Sidorenko},
  title        = {Cryptanalysis of the Dual Elliptic Curve Pseudorandom Generator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {190},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/190},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SchoenmakersS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ScottCA06,
  author       = {Michael Scott and
                  Neil Costigan and
                  Wesam Abdulwahab},
  title        = {Implementing Cryptographic Pairings on Smartcards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {144},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/144},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ScottCA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SeoYLCH06,
  author       = {Jae Hong Seo and
                  HyoJin Yoon and
                  Seongan Lim and
                  Jung Hee Cheon and
                  Dowon Hong},
  title        = {Analysis of Privacy-Preserving Element Reduction of Multiset},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {418},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/418},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SeoYLCH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShachamW06,
  author       = {Hovav Shacham and
                  Brent Waters},
  title        = {Efficient Ring Signatures without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {289},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/289},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShachamW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShailajaKS06,
  author       = {G. Shailaja and
                  K. Phani Kumar and
                  Ashutosh Saxena},
  title        = {Pairing based Mutual Authentication Scheme Using Smart Cards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {152},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/152},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShailajaKS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShakedW06,
  author       = {Yaniv Shaked and
                  Avishai Wool},
  title        = {Cryptanalysis of the Bluetooth {E0} Cipher using OBDD's},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {72},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/072},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShakedW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShaoCW06,
  author       = {Jun Shao and
                  Zhenfu Cao and
                  Licheng Wang},
  title        = {Efficient ID-based Threshold Signature Schemes without Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {308},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/308},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShaoCW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShiraseTO06,
  author       = {Masaaki Shirase and
                  Tsuyoshi Takagi and
                  Eiji Okamoto},
  title        = {Some Efficient Algorithms for the Final Exponentiation of {\(\eta\)}\({}_{\mbox{T}}\)
                  Pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {431},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/431},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShiraseTO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShuKG06,
  author       = {Chang Shu and
                  Soonhak Kwon and
                  Kris Gaj},
  title        = {{FPGA} Accelerated Tate Pairing Based Cryptosystems over Binary Fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {179},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/179},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShuKG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Sirvent06,
  author       = {Thomas Sirvent},
  title        = {Traitor tracing scheme with constant ciphertext rate against powerful
                  pirates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {383},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/383},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Sirvent06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SkoricMKT06,
  author       = {Boris Skoric and
                  Stefan Maubach and
                  Tom A. M. Kevenaar and
                  Pim Tuyls},
  title        = {Information-theoretic analysis of coating PUFs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {101},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/101},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SkoricMKT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Smith06,
  author       = {Adam D. Smith},
  title        = {Scrambling Adversarial Errors Using Few Random Bits, Optimal Information
                  Reconciliation, and Better Private Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {20},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/020},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Smith06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SolisT06,
  author       = {John Solis and
                  Gene Tsudik},
  title        = {Simple and Flexible Private Revocation Checking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {66},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/066},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SolisT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SpeirsW06,
  author       = {William R. Speirs II and
                  Samuel S. Wagstaff Jr.},
  title        = {Dynamic Cryptographic Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {477},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/477},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SpeirsW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SprengerBBPW06,
  author       = {Christoph Sprenger and
                  Michael Backes and
                  David A. Basin and
                  Birgit Pfitzmann and
                  Michael Waidner},
  title        = {Cryptographically Sound Theorem Proving},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {47},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/047},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SprengerBBPW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StandaertMY06,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Tal Malkin and
                  Moti Yung},
  title        = {A Unified Framework for the Analysis of Side-Channel Key Recovery
                  Attacks (extended version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {139},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/139},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StandaertMY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Stanek06,
  author       = {Martin Stanek},
  title        = {Attacking {LCCC} Batch Verification of {RSA} Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {111},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/111},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Stanek06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Stange06,
  author       = {Katherine E. Stange},
  title        = {The Tate Pairing via Elliptic Nets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {392},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/392},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Stange06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Stegers06,
  author       = {Till Stegers},
  title        = {Faugere's {F5} Algorithm Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {404},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/404},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Stegers06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Steinberger06,
  author       = {John P. Steinberger},
  title        = {The Collision Intractability of {MDC-2} in the Ideal Cipher Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {294},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/294},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Steinberger06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SteinfeldPW06,
  author       = {Ron Steinfeld and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  title        = {On the Provable Security of an Efficient RSA-Based Pseudorandom Generator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {206},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/206},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SteinfeldPW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Stevens06,
  author       = {Marc Stevens},
  title        = {Fast Collision Attack on {MD5}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {104},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/104},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Stevens06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StevensLW06,
  author       = {Marc Stevens and
                  Arjen K. Lenstra and
                  Benne de Weger},
  title        = {Target Collisions for {MD5} and Colliding {X.509} Certificates for
                  Different Identities},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {360},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/360},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/StevensLW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Stinson06,
  author       = {Douglas R. Stinson},
  title        = {Unconditionally secure chaffing and winnowing with short authentication
                  tags},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {189},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/189},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Stinson06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StinsonW06,
  author       = {Douglas R. Stinson and
                  Jiang Wu},
  title        = {An Efficient and Secure Two-flow Zero-Knowledge Identification Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {337},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/337},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StinsonW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Strangio06,
  author       = {Maurizio Adriano Strangio},
  title        = {On the Resilience of Key Agreement Protocols to Key Compromise Impersonation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {252},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/252},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Strangio06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SuL06,
  author       = {Shenghui Su and
                  Shuwang L{\"{u}}},
  title        = {The {REESSE1+} Public Key Cryptosystem v2.2},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {420},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/420},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SuL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SuYYZ06,
  author       = {Shenghui Su and
                  Yixian Yang and
                  Bo Yang and
                  Shaolan Zhang},
  title        = {Design and Analysis of a Hash Ring-iterative Structure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {384},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/384},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SuYYZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SugitaKI06,
  author       = {Makoto Sugita and
                  Mitsuru Kawazoe and
                  Hideki Imai},
  title        = {Gr{\"{o}}bner Basis Based Cryptanalysis of {SHA-1}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {98},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/098},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SugitaKI06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Tang06,
  author       = {Qiang Tang},
  title        = {On the security of a group key agreement protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {470},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/470},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Tang06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Toli06,
  author       = {Ilia Toli},
  title        = {Some New Hidden Ideal Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {419},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/419},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Toli06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TonienS06,
  author       = {Dongvu Tonien and
                  Reihaneh Safavi{-}Naini},
  title        = {An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {99},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/099},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TonienS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Trinca06,
  author       = {Dragos Trinca},
  title        = {Sequential and Parallel Cascaded Convolutional Encryption with Local
                  Propagation: Toward Future Directions in Symmetric Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {3},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/003},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Trinca06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Trinca06a,
  author       = {Dragos Trinca},
  title        = {Efficient {FPGA} Implementations and Cryptanalysis of Automata-based
                  Dynamic Convolutional Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {263},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/263},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Trinca06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Trolin06,
  author       = {M{\aa}rten Trolin},
  title        = {A Stronger Definition for Anonymous Electronic Cash},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {241},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/241},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Trolin06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TsoGOO06,
  author       = {Raylin Tso and
                  Chunxiang Gu and
                  Takeshi Okamoto and
                  Eiji Okamoto},
  title        = {An Efficient ID-based Digital Signature with Message Recovery Based
                  on Pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {195},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/195},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TsoGOO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Tsudik06,
  author       = {Gene Tsudik},
  title        = {A Family of Dunces: Trivial {RFID} Identification and Authentication
                  Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {15},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/015},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Tsudik06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TsujiiTF06,
  author       = {Shigeo Tsujii and
                  Kohtaro Tadaki and
                  Ryou Fujita},
  title        = {Proposal for Piece In Hand Matrix Ver.2: General Concept for Enhancing
                  Security of Multivariate Public Key Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {51},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/051},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TsujiiTF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Volkmer06,
  author       = {Markus Volkmer},
  title        = {Entity Authentication and Authenticated Key Exchange with Tree Parity
                  Machines},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {112},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/112},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Volkmer06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangBZ06,
  author       = {Guilin Wang and
                  Feng Bao and
                  Jianying Zhou},
  title        = {The Fairness of Perfect Concurrent Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {226},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/226},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangBZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangCC06,
  author       = {Shengbao Wang and
                  Zhenfu Cao and
                  Kim{-}Kwang Raymond Choo},
  title        = {New Identity-Based Authenticated Key Agreement Protocols from Pairings
                  (without Random Oracles)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {446},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/446},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangCC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangDDB06,
  author       = {Shuhong Wang and
                  Xuhua Ding and
                  Robert H. Deng and
                  Feng Bao},
  title        = {Private Information Retrieval Using Trusted Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {208},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/208},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangDDB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangFW06,
  author       = {Peng Wang and
                  Dengguo Feng and
                  Wenling Wu},
  title        = {Cryptanalysis of the {MEM} Mode of Operation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {94},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/094},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangFW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangOMO06,
  author       = {Lihua Wang and
                  Takeshi Okamoto and
                  Masahiro Mambo and
                  Eiji Okamoto},
  title        = {A Subject-Delegated Decryption Scheme with "Tightly" Limited Authority},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {344},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/344},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangOMO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangZQM06,
  author       = {Zhang{-}yi Wang and
                  Huanguo Zhang and
                  Zhongping Qin and
                  Qingshu Meng},
  title        = {Cryptanalysis of 4-Pass {HAVAL}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {161},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/161},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangZQM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Wei06,
  author       = {Victor K. Wei},
  title        = {Invisible Designated Confirmer Signatures without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {325},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/325},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Wei06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WeiY06,
  author       = {Victor K. Wei and
                  Tsz Hon Yuen},
  title        = {(Hierarchical Identity-Based) Threshold Ring Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {193},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/193},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WeiY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WeimerskirchP06,
  author       = {Andr{\'{e}} Weimerskirch and
                  Christof Paar},
  title        = {Generalizations of the Karatsuba Algorithm for Efficient Implementations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {224},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/224},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WeimerskirchP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WhelanS06,
  author       = {Claire Whelan and
                  Michael Scott},
  title        = {Side Channel Analysis of Practical Pairing Implementations: Which
                  Path is More Secure?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {237},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/237},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WhelanS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Wikstrom06,
  author       = {Douglas Wikstr{\"{o}}m},
  title        = {Designated Confirmer Signatures Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {123},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/123},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Wikstrom06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Wikstrom06a,
  author       = {Douglas Wikstr{\"{o}}m},
  title        = {Simplified Submission of Inputs to Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {259},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/259},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Wikstrom06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WongLCL06,
  author       = {Kwok{-}Wo Wong and
                  Edward C. W. Lee and
                  Lee{-}Ming Cheng and
                  Xiaofeng Liao},
  title        = {Fast Elliptic Scalar Multiplication using New Double-base Chain and
                  Point Halving},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {124},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/124},
  timestamp    = {Fri, 28 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WongLCL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Wooding06,
  author       = {Mark Wooding},
  title        = {The Wrestlers Protocol: {A} simple, practical, secure, deniable protocol
                  for key-exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {386},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/386},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Wooding06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Woodruff06,
  author       = {David P. Woodruff},
  title        = {Revisiting the Efficiency of Malicious Two-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {397},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/397},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Woodruff06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuZF06,
  author       = {Wenling Wu and
                  Wentao Zhang and
                  Dengguo Feng},
  title        = {Impossible Differential Cryptanalysis of {ARIA} and Camellia},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {350},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/350},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WuZF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XuMSCHZ06,
  author       = {Shidi Xu and
                  Yi Mu and
                  Willy Susilo and
                  Xiaofeng Chen and
                  Xinyi Huang and
                  Fangguo Zhang},
  title        = {Online/Offline Signatures and Multisignatures for {AODV} and {DSR}
                  Routing Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {236},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/236},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XuMSCHZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Yang06,
  author       = {Fuw{-}Yi Yang},
  title        = {Cryptanalysis on an Algorithm for Efficient Digital Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {381},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/381},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Yang06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangWWD06,
  author       = {Guomin Yang and
                  Duncan S. Wong and
                  Huaxiong Wang and
                  Xiaotie Deng},
  title        = {Formal Analysis and Systematic Construction of Two-factor Authentication
                  Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {270},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/270},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangWWD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YiWD06,
  author       = {Feng Yi and
                  Daoshun Wang and
                  Yiqi Dai},
  title        = {Visual secret sharing scheme with autostereogram},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {295},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/295},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YiWD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangCLWQ06,
  author       = {Miaomiao Zhang and
                  Gongliang Chen and
                  Jianhua Li and
                  Licheng Wang and
                  Haifeng Qian},
  title        = {A New Construction of Time Capsule Signature},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {113},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/113},
  timestamp    = {Sun, 03 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangCLWQ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangF06,
  author       = {Zhenfeng Zhang and
                  Dengguo Feng},
  title        = {Key Replacement Attack on a Certificateless Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {453},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/453},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangWW06,
  author       = {Haina Zhang and
                  Shaohui Wang and
                  Xiaoyun Wang},
  title        = {The Probability Advantages of Two Linear Expressions in Symmetric
                  Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {242},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/242},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangWW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoZH06,
  author       = {Changan Zhao and
                  Fangguo Zhang and
                  Jiwu Huang},
  title        = {Efficient Tate Pairing Computation Using Double-Base Chains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {201},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/201},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoZH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoZH06a,
  author       = {Changan Zhao and
                  Fangguo Zhang and
                  Jiwu Huang},
  title        = {Speeding up the Bilinear Pairings Computation on Curves with Automorphisms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {474},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/474},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoZH06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhongH06,
  author       = {Jun Zhong and
                  Dake He},
  title        = {A New Type of Group Blind Signature Scheme Based on Bilinear Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {439},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/439},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhongH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhongH06a,
  author       = {Jun Zhong and
                  Dake He},
  title        = {A New Type of Group Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {440},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/440},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhongH06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhouCZZ06,
  author       = {Jin Zhou and
                  TingMao Chang and
                  YaJuan Zhang and
                  Yuefei Zhu},
  title        = {Universally Composable Three-Party Key Distribution},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {421},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/421},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhouCZZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhouL06,
  author       = {Sujing Zhou and
                  Dongdai Lin},
  title        = {A Shorter Group Signature with Verifier-Location Revocation and Backward
                  Unlinkability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {100},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/100},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhouL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhouL06a,
  author       = {Sujing Zhou and
                  Dongdai Lin},
  title        = {Shorter Verifier-Local Revocation Group Signatures From Bilinear Maps},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {286},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/286},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhouL06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZouZQ06,
  author       = {Shi{-}hua Zou and
                  Ji{-}wen Zeng and
                  Jun{-}jie Quan},
  title        = {Designated Verifier Signature Scheme Based on Braid Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {329},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/329},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZouZQ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AuLYW06,
  title        = {ID-Based Ring Signature Scheme secure in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {205},
  year         = {2006},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2006/205},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AuLYW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Aumasson06,
  title        = {On the cost of cryptanalytic attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {401},
  year         = {2006},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2006/401},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Aumasson06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaekW06,
  title        = {Repairing a Security-Mediated Certificateless Encryption Scheme from
                  {PKC} 2006},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {159},
  year         = {2006},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2006/159},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaekW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChakrabortyS06,
  title        = {A New Mode of Encryption Secure Against Symmetric Nonce Respecting
                  Adversaries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {62},
  year         = {2006},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2006/062},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChakrabortyS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenCS06,
  title        = {A Built-in Decisional Function and Security Proof of ID-based Key
                  Agreement Protocols from Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {160},
  year         = {2006},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2006/160},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenCS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DouCA06,
  title        = {Attacks and Modifications of CJC's E-voting Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {300},
  year         = {2006},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2006/300},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DouCA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DouX06,
  title        = {Analysis of Some Attacks on Awasthi and Lal's Proxy Blind Signature
                  Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {311},
  year         = {2006},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2006/311},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DouX06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuttaB06,
  title        = {Repairing Attacks on a Password-Based Group Key Agreement},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {119},
  year         = {2006},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2006/119},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuttaB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuZP06,
  title        = {An Efficient ID-based Signature Scheme from Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {60},
  year         = {2006},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2006/060},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuZP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuA06,
  title        = {Self-Generated-Certificate Public Key Cryptosystem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {194},
  year         = {2006},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2006/194},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuHL06,
  title        = {A New Identity Based Encryption Scheme From Pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {484},
  year         = {2006},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2006/484},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuHL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuLHL06,
  title        = {Revisit of {KD04}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {365},
  year         = {2006},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2006/365},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuLHL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuLHL06a,
  title        = {Revisit of {CS98}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {390},
  year         = {2006},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2006/390},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuLHL06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Martin06,
  title        = {Factoring Class Polynomials over the Genus Field},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {247},
  year         = {2006},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2006/247},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Martin06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NikovNP06,
  title        = {A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {363},
  year         = {2006},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2006/363},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NikovNP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ParkLL06,
  title        = {Searchable Index Schemes for Groups : Security vs. Efficiency},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {238},
  year         = {2006},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2006/238},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ParkLL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SaxenaS06,
  title        = {A Cryptosystem Based on Hidden Order Groups and Its Applications in
                  Highly Dynamic Group Key Agreement},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {76},
  year         = {2006},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2006/076},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SaxenaS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Sule06,
  title        = {Frobenius expansion and the Diffie Hellman problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {174},
  year         = {2006},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2006/174},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Sule06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TartaryW06,
  title        = {The Bilinear Pairing-based Accumulator Proposed at CT-RSA'05 is not
                  Collision Resistant},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {426},
  year         = {2006},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2006/426},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TartaryW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WeiZ06,
  title        = {Chosen Ciphertext Secure Broadcast Threshold Encryption (resp. Threshold-Traitor
                  Tracing)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {282},
  year         = {2006},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2006/282},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WeiZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XuZZ06,
  title        = {A New family of Ideal Multipartite Access Structure Based on {MSP}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {339},
  year         = {2006},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2006/339},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XuZZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhouL06b,
  title        = {The Identity Escrow (Group Signature) Scheme at CT-RSA'05 Is Not Non-frameable},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {393},
  year         = {2006},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2006/393},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhouL06b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics