Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/iacr/iacr2012.bht:"
@article{DBLP:journals/iacr/0001PPR12, author = {Jian Guo and Thomas Peyrin and Axel Poschmann and Matthew J. B. Robshaw}, title = {The {LED} Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {600}, year = {2012}, url = {http://eprint.iacr.org/2012/600}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001PPR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0002KPT12, author = {Abhishek Jain and Stephan Krenn and Krzysztof Pietrzak and Aris Tentes}, title = {Commitments and Efficient Zero-Knowledge Proofs from Hard Learning Problems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {513}, year = {2012}, url = {http://eprint.iacr.org/2012/513}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0002KPT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AaronsonC12, author = {Scott Aaronson and Paul F. Christiano}, title = {Quantum Money from Hidden Subspaces}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {171}, year = {2012}, url = {http://eprint.iacr.org/2012/171}, timestamp = {Thu, 01 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AaronsonC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaFL12, author = {Michel Abdalla and Dario Fiore and Vadim Lyubashevsky}, title = {From Selective to Full Security: Semi-Generic Transformations in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {341}, year = {2012}, url = {http://eprint.iacr.org/2012/341}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaFL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdelraheemABL12, author = {Mohamed Ahmed Abdelraheem and Martin {\AA}gren and Peter Beelen and Gregor Leander}, title = {On The Distribution of Linear Biases: Three Instructive Examples}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {303}, year = {2012}, url = {http://eprint.iacr.org/2012/303}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdelraheemABL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Abdul-LatipRSS12, author = {Shekh Faisal Abdul{-}Latip and Reza Reyhanitabar and Willy Susilo and Jennifer Seberry}, title = {Fault Analysis of the {KATAN} Family of Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {30}, year = {2012}, url = {http://eprint.iacr.org/2012/030}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Abdul-LatipRSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbeCDKNO12, author = {Masayuki Abe and Melissa Chase and Bernardo David and Markulf Kohlweiss and Ryo Nishimaki and Miyako Ohkubo}, title = {Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {285}, year = {2012}, url = {http://eprint.iacr.org/2012/285}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbeCDKNO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbedFLLW12, author = {Farzaneh Abed and Christian Forler and Eik List and Stefan Lucks and Jakob Wenzel}, title = {Biclique Cryptanalysis of the {PRESENT} and {LED} Lightweight Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {591}, year = {2012}, url = {http://eprint.iacr.org/2012/591}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbedFLLW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbedLL12, author = {Farzaneh Abed and Eik List and Stefan Lucks}, title = {On the Security of the Core of {PRINCE} Against Biclique and Differential Cryptanalysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {712}, year = {2012}, url = {http://eprint.iacr.org/2012/712}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbedLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AdjR12, author = {Gora Adj and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {Square root computation over even extension fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {685}, year = {2012}, url = {http://eprint.iacr.org/2012/685}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AdjR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalDVW12, author = {Shweta Agrawal and Yevgeniy Dodis and Vinod Vaikuntanathan and Daniel Wichs}, title = {On Continual Leakage of Discrete Log Representations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {367}, year = {2012}, url = {http://eprint.iacr.org/2012/367}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalDVW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalG0PS12, author = {Shweta Agrawal and Vipul Goyal and Abhishek Jain and Manoj Prabhakaran and Amit Sahai}, title = {New Impossibility Results for Concurrent Composition and a Non-Interactive Completeness Theorem for Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {555}, year = {2012}, url = {http://eprint.iacr.org/2012/555}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalG0PS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalGHS12, author = {Shweta Agrawal and Craig Gentry and Shai Halevi and Amit Sahai}, title = {Sampling Discrete Gaussians Efficiently and Obliviously}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {714}, year = {2012}, url = {http://eprint.iacr.org/2012/714}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalGHS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalGVW12, author = {Shweta Agrawal and Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee}, title = {Functional Encryption: New Perspectives and Lower Bounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {468}, year = {2012}, url = {http://eprint.iacr.org/2012/468}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalGVW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AhmadianSA12, author = {Zahra Ahmadian and Mahmoud Salmasizadeh and Mohammad Reza Aref}, title = {Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {489}, year = {2012}, url = {http://eprint.iacr.org/2012/489}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AhmadianSA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AhmadianSA12a, author = {Zahra Ahmadian and Mahmoud Salmasizadeh and Mohammad Reza Aref}, title = {Desynchronization Attack on {RAPP} Ultralightweight Authentication Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {490}, year = {2012}, url = {http://eprint.iacr.org/2012/490}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AhmadianSA12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AimaniJ12, author = {Laila El Aimani and Marc Joye}, title = {Toward Practical Group Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {155}, year = {2012}, url = {http://eprint.iacr.org/2012/155}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AimaniJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AimaniS12, author = {Laila El Aimani and Olivier Sanders}, title = {Efficient Group Signatures in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {627}, year = {2012}, url = {http://eprint.iacr.org/2012/627}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AimaniS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AkKPS12, author = {Murat Ak and Aggelos Kiayias and Serdar Pehlivanoglu and Ali Aydin Sel{\c{c}}uk}, title = {Generic Construction of Trace and Revoke Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {531}, year = {2012}, url = {http://eprint.iacr.org/2012/531}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AkKPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Al-Kuwari12, author = {Saif Al{-}Kuwari}, title = {On the Indifferentiability of the Integrated-Key Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {9}, year = {2012}, url = {http://eprint.iacr.org/2012/009}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Al-Kuwari12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbrechtCFFP12, author = {Martin R. Albrecht and Carlos Cid and Jean{-}Charles Faug{\`{e}}re and Robert Fitzpatrick and Ludovic Perret}, title = {On the Complexity of the {BKW} Algorithm on {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {636}, year = {2012}, url = {http://eprint.iacr.org/2012/636}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbrechtCFFP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbrechtL12, author = {Martin R. Albrecht and Gregor Leander}, title = {An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {401}, year = {2012}, url = {http://eprint.iacr.org/2012/401}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbrechtL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AliM12, author = {Subidh Ali and Debdeep Mukhopadhyay}, title = {Protecting Last Four Rounds of {CLEFIA} is Not Enough Against Differential Fault Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {286}, year = {2012}, url = {http://eprint.iacr.org/2012/286}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AliM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AliMT12, author = {Subidh Ali and Debdeep Mukhopadhyay and Michael Tunstall}, title = {Differential Fault Analysis of {AES:} Towards Reaching its Limits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {446}, year = {2012}, url = {http://eprint.iacr.org/2012/446}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AliMT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AliasgariBZS12, author = {Mehrdad Aliasgari and Marina Blanton and Yihua Zhang and Aaron Steele}, title = {Secure Computation on Floating Point Numbers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {405}, year = {2012}, url = {http://eprint.iacr.org/2012/405}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AliasgariBZS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlmeidaBBBKB12, author = {Jos{\'{e}} Bacelar Almeida and Manuel Barbosa and Endre Bangerter and Gilles Barthe and Stephan Krenn and Santiago Zanella B{\'{e}}guelin}, title = {Full Proof Cryptography: Verifiable Compilation of Efficient Zero-Knowledge Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {258}, year = {2012}, url = {http://eprint.iacr.org/2012/258}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlmeidaBBBKB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnanthB12, author = {Prabhanjan Ananth and Raghav Bhaskar}, title = {Non Observability in the Random Oracle Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {710}, year = {2012}, url = {http://eprint.iacr.org/2012/710}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnanthB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnanthBGR12, author = {Prabhanjan Ananth and Raghav Bhaskar and Vipul Goyal and Vanishree Rao}, title = {On the (In)security of Fischlin's Paradigm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {721}, year = {2012}, url = {http://eprint.iacr.org/2012/721}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnanthBGR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AndreevaBMPR12, author = {Elena Andreeva and Andrey Bogdanov and Bart Mennink and Bart Preneel and Christian Rechberger}, title = {On Security Arguments of the Second Round {SHA-3} Candidates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {147}, year = {2012}, url = {http://eprint.iacr.org/2012/147}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AndreevaBMPR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AndroulakiKRSC12, author = {Elli Androulaki and Ghassan Karame and Marc Roeschlin and Tobias Scherer and Srdjan Capkun}, title = {Evaluating User Privacy in Bitcoin}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {596}, year = {2012}, url = {http://eprint.iacr.org/2012/596}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AndroulakiKRSC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Aono12, author = {Yoshinori Aono}, title = {Minkowski sum based lattice construction for solving simultaneous modular equations and applications to {RSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {675}, year = {2012}, url = {http://eprint.iacr.org/2012/675}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Aono12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AonoASW12, author = {Yoshinori Aono and Manindra Agrawal and Takakazu Satoh and Osamu Watanabe}, title = {On the Optimality of Lattices for the Coppersmith Technique}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {108}, year = {2012}, url = {http://eprint.iacr.org/2012/108}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AonoASW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AouinatouB12, author = {Rkia Aouinatou and Mostafa Belkasmi}, title = {In the point of view security, An efficient scheme in {IBE} with random oracle}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {237}, year = {2012}, url = {http://eprint.iacr.org/2012/237}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AouinatouB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AouinatouB12a, author = {Rkia Aouinatou and Mostafa Belkasmi}, title = {Cyptanalysis {CDHP} , {BDHP} and Tate pairing under certain conditions The Tate pairing is less secure than Weil}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {277}, year = {2012}, url = {http://eprint.iacr.org/2012/277}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AouinatouB12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Applebaum12, author = {Benny Applebaum}, title = {Garbling {XOR} Gates "For Free" in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {516}, year = {2012}, url = {http://eprint.iacr.org/2012/516}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Applebaum12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ApplebaumIK12, author = {Benny Applebaum and Yuval Ishai and Eyal Kushilevitz}, title = {How to Garble Arithmetic Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {255}, year = {2012}, url = {http://eprint.iacr.org/2012/255}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ApplebaumIK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ApplebaumIKW12, author = {Benny Applebaum and Yuval Ishai and Eyal Kushilevitz and Brent Waters}, title = {Encoding Functions with Constant Online Rate or How to Compress Keys in Garbled Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {693}, year = {2012}, url = {http://eprint.iacr.org/2012/693}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ApplebaumIKW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AranhaFKMR12, author = {Diego F. Aranha and Laura Fuentes{-}Casta{\~{n}}eda and Edward Knapp and Alfred Menezes and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {Implementing Pairings at the 192-bit Security Level}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {232}, year = {2012}, url = {http://eprint.iacr.org/2012/232}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AranhaFKMR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AranhaFLR12, author = {Diego F. Aranha and Armando Faz{-}Hern{\'{a}}ndez and Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {Faster implementation of scalar multiplication on Koblitz curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {519}, year = {2012}, url = {http://eprint.iacr.org/2012/519}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AranhaFLR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArifiGF12, author = {Morteza Arifi and Mahmoud Gardeshi and Mohammad Sabzinejad Farash}, title = {A New Efficient Authenticated ID-Based Group Key Agreement Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {395}, year = {2012}, url = {http://eprint.iacr.org/2012/395}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArifiGF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArriagaBF12, author = {Afonso Arriaga and Manuel Barbosa and Pooya Farshim}, title = {On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {382}, year = {2012}, url = {http://eprint.iacr.org/2012/382}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArriagaBF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AsaarS12, author = {Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh}, title = {A Pairing Based Strong Designated Verifier Signature Scheme without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {61}, year = {2012}, url = {http://eprint.iacr.org/2012/061}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AsaarS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AsaarS12a, author = {Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh}, title = {A Novel Strong Designated Verifier Signature Scheme without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {259}, year = {2012}, url = {http://eprint.iacr.org/2012/259}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AsaarS12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AsaarS12b, author = {Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh}, title = {A Non-delegatable Identity-based Designated Verifier Signature Scheme without Bilinear Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {332}, year = {2012}, url = {http://eprint.iacr.org/2012/332}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AsaarS12b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AsgharLSP12, author = {Hassan Jameel Asghar and Shujun Li and Ron Steinfeld and Josef Pieprzyk}, title = {Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {659}, year = {2012}, url = {http://eprint.iacr.org/2012/659}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AsgharLSP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AsharovO12, author = {Gilad Asharov and Claudio Orlandi}, title = {Calling out Cheaters: Covert Security With Public Verifiability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {708}, year = {2012}, url = {http://eprint.iacr.org/2012/708}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AsharovO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtBOSY12, author = {Nuray At and Jean{-}Luc Beuchat and Eiji Okamoto and Ismail San and Teppei Yamazaki}, title = {A Low-Area Unified Hardware Architecture for the {AES} and the Cryptographic Hash Function Gr{\o}stl}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {535}, year = {2012}, url = {http://eprint.iacr.org/2012/535}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtBOSY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtBS12, author = {Nuray At and Jean{-}Luc Beuchat and Ismail San}, title = {Compact Implementation of Threefish and Skein on {FPGA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {126}, year = {2012}, url = {http://eprint.iacr.org/2012/126}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtBS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseDDV12, author = {Giuseppe Ateniese and {\"{O}}zg{\"{u}}r Dagdelen and Ivan Damg{\aa}rd and Daniele Venturi}, title = {Entangled Cloud Storage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {511}, year = {2012}, url = {http://eprint.iacr.org/2012/511}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseDDV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AumassonB12, author = {Jean{-}Philippe Aumasson and Daniel J. Bernstein}, title = {SipHash: a fast short-input {PRF}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {351}, year = {2012}, url = {http://eprint.iacr.org/2012/351}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AumassonB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesBU12, author = {Michael Backes and Fabian Bendun and Dominique Unruh}, title = {Computational Soundness of Symbolic Zero-knowledge Proofs: Weaker Assumptions and Mechanized Verification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {81}, year = {2012}, url = {http://eprint.iacr.org/2012/081}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesBU12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesDK12, author = {Michael Backes and Amit Datta and Aniket Kate}, title = {Asynchronous Computational {VSS} with Reduced Communication Complexity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {619}, year = {2012}, url = {http://eprint.iacr.org/2012/619}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesDK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesM12, author = {Michael Backes and Sebastian Meiser}, title = {Differentially Private Smart Metering with Battery Recharging}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {183}, year = {2012}, url = {http://eprint.iacr.org/2012/183}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesMU12, author = {Michael Backes and Ankit Malik and Dominique Unruh}, title = {Computational Soundness without Protocol Restrictions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {486}, year = {2012}, url = {http://eprint.iacr.org/2012/486}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesMU12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BagheriSPT12, author = {Nasour Bagheri and Masoumeh Safkhani and Pedro Peris{-}Lopez and Juan E. Tapiador}, title = {Cryptanalysis of RAPP, an {RFID} Authentication Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {702}, year = {2012}, url = {http://eprint.iacr.org/2012/702}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BagheriSPT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaiBT12, author = {Shi Bai and Richard P. Brent and Emmanuel Thom{\'{e}}}, title = {Root Optimization of Polynomials in the Number Field Sieve}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {691}, year = {2012}, url = {http://eprint.iacr.org/2012/691}, timestamp = {Tue, 30 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaiBT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaiTZ12, author = {Shi Bai and Emmanuel Thom{\'{e}} and Paul Zimmermann}, title = {Factorisation of {RSA-704} with {CADO-NFS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {369}, year = {2012}, url = {http://eprint.iacr.org/2012/369}, timestamp = {Tue, 30 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaiTZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaktirS12, author = {Sel{\c{c}}uk Baktir and Erkay Savas}, title = {Highly-Parallel Montgomery Multiplication for Multi-core General-Purpose Microprocessors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {140}, year = {2012}, url = {http://eprint.iacr.org/2012/140}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaktirS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BalaschEEGGGHKKPPRSAKOM12, author = {Josep Balasch and Baris Ege and Thomas Eisenbarth and Beno{\^{\i}}t G{\'{e}}rard and Zheng Gong and Tim G{\"{u}}neysu and Stefan Heyse and St{\'{e}}phanie Kerckhof and Fran{\c{c}}ois Koeune and Thomas Plos and Thomas P{\"{o}}ppelmann and Francesco Regazzoni and Fran{\c{c}}ois{-}Xavier Standaert and Gilles Van Assche and Ronny Van Keer and Lo{\"{\i}}c van Oldeneel tot Oldenzeel and Ingo von Maurich}, title = {Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {507}, year = {2012}, url = {http://eprint.iacr.org/2012/507}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BalaschEEGGGHKKPPRSAKOM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaldimtsiL12, author = {Foteini Baldimtsi and Anna Lysyanskaya}, title = {On The Security of One-Witness Blind Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {197}, year = {2012}, url = {http://eprint.iacr.org/2012/197}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaldimtsiL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaldimtsiL12a, author = {Foteini Baldimtsi and Anna Lysyanskaya}, title = {Anonymous Credentials Light}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {298}, year = {2012}, url = {http://eprint.iacr.org/2012/298}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaldimtsiL12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaldwinM12, author = {Brian Baldwin and William P. Marnane}, title = {Yet Another {SHA-3} Round 3 {FPGA} Results Paper}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {180}, year = {2012}, url = {http://eprint.iacr.org/2012/180}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaldwinM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BanaAS12, author = {Gergei Bana and Pedro Ad{\~{a}}o and Hideki Sakurada}, title = {Computationally Sound Verification of the {NSL} Protocol via Computationally Complete Symbolic Attacker}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {316}, year = {2012}, url = {http://eprint.iacr.org/2012/316}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BanaAS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BanaC12, author = {Gergei Bana and Hubert Comon{-}Lundh}, title = {Towards Unconditional Soundness: Computationally Complete Symbolic Attacker}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {19}, year = {2012}, url = {http://eprint.iacr.org/2012/019}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BanaC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BanikMS12, author = {Subhadeep Banik and Subhamoy Maitra and Santanu Sarkar}, title = {A Differential Fault Attack on Grain-128a using MACs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {349}, year = {2012}, url = {http://eprint.iacr.org/2012/349}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BanikMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaninT12, author = {Matan Banin and Boaz Tsaban}, title = {The Discrete Logarithm Problem in non-representable rings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {320}, year = {2012}, url = {http://eprint.iacr.org/2012/320}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaninT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarbosaF12, author = {Manuel Barbosa and Pooya Farshim}, title = {Semantically Secure Functional Encryption, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {474}, year = {2012}, url = {http://eprint.iacr.org/2012/474}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarbosaF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarbulescuBBKM12, author = {Razvan Barbulescu and Joppe W. Bos and Cyril Bouvier and Thorsten Kleinjung and Peter L. Montgomery}, title = {Finding ECM-Friendly Curves through a Study of Galois Properties}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {70}, year = {2012}, url = {http://eprint.iacr.org/2012/070}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarbulescuBBKM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarbulescuDEZ12, author = {Razvan Barbulescu and J{\'{e}}r{\'{e}}mie Detrey and Nicolas Estibals and Paul Zimmermann}, title = {Finding Optimal Formulae for Bilinear Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {110}, year = {2012}, url = {http://eprint.iacr.org/2012/110}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarbulescuDEZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BardouFKSST12, author = {Romain Bardou and Riccardo Focardi and Yusuke Kawamoto and Lorenzo Simionato and Graham Steel and Joe{-}Kai Tsay}, title = {Efficient Padding Oracle Attacks on Cryptographic Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {417}, year = {2012}, url = {http://eprint.iacr.org/2012/417}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BardouFKSST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaronDMOT12, author = {Joshua Baron and Karim El Defrawy and Kirill Minkovich and Rafail Ostrovsky and Eric Tressler}, title = {5PM: Secure Pattern Matching}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {698}, year = {2012}, url = {http://eprint.iacr.org/2012/698}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaronDMOT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BartheCGKLB12, author = {Gilles Barthe and Juan Manuel Crespo and Benjamin Gr{\'{e}}goire and C{\'{e}}sar Kunz and Yassine Lakhnech and Santiago Zanella B{\'{e}}guelin}, title = {Automated Analysis and Synthesis of Padding-Based Encryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {695}, year = {2012}, url = {http://eprint.iacr.org/2012/695}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BartheCGKLB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarthePB12, author = {Gilles Barthe and David Pointcheval and Santiago Zanella B{\'{e}}guelin}, title = {Verified Security of Redundancy-Free Encryption from Rabin and {RSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {308}, year = {2012}, url = {http://eprint.iacr.org/2012/308}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarthePB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BatteyP12, author = {Matthew Battey and Abhishek Parakh}, title = {A Quasigroup Based Random Number Generator for Resource Constrained Environments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {471}, year = {2012}, url = {http://eprint.iacr.org/2012/471}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BatteyP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeatGPTW12, author = {Robert Beat and Philipp Grabher and Dan Page and Stefan Tillich and Marcin W{\'{o}}jcik}, title = {On Reconfigurable Fabrics and Generic Side-Channel Countermeasures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {353}, year = {2012}, url = {http://eprint.iacr.org/2012/353}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeatGPTW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeckerJMM12, author = {Anja Becker and Antoine Joux and Alexander May and Alexander Meurer}, title = {Decoding Random Binary Linear Codes in 2\({}^{\mbox{n/20}}\): How 1+1=0 Improves Information Set Decoding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {26}, year = {2012}, url = {http://eprint.iacr.org/2012/026}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeckerJMM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Beheshti-AtashgahBGA12, author = {Mohammad Beheshti{-}Atashgah and Majid Bayat and Mahmoud Gardeshi and Mohammad Reza Aref}, title = {Designated Verifier Threshold Proxy Signature Scheme without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {488}, year = {2012}, url = {http://eprint.iacr.org/2012/488}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Beheshti-AtashgahBGA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeimelFM12, author = {Amos Beimel and Oriol Farr{\`{a}}s and Yuval Mintz}, title = {Secret Sharing Schemes for Very Dense Graphs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {404}, year = {2012}, url = {http://eprint.iacr.org/2012/404}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeimelFM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeimelOO12, author = {Amos Beimel and Eran Omri and Ilan Orlov}, title = {Protocols for Multiparty Coin Toss With Dishonest Majority}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {643}, year = {2012}, url = {http://eprint.iacr.org/2012/643}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeimelOO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BelenkyGKE12, author = {Yaacov Belenky and Zeev Geyzel and Michael Kara{-}Ivanov and Avraham Entelis}, title = {Two Exponentiation Algorithms Resistant to Cross-correlation Power Analysis and to Other Known Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {723}, year = {2012}, url = {http://eprint.iacr.org/2012/723}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BelenkyGKE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareBNRSSY12, author = {Mihir Bellare and Zvika Brakerski and Moni Naor and Thomas Ristenpart and Gil Segev and Hovav Shacham and Scott Yilek}, title = {Hedged Public-key Encryption: How to Protect against Bad Randomness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {220}, year = {2012}, url = {http://eprint.iacr.org/2012/220}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareBNRSSY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareHR12, author = {Mihir Bellare and Viet Tung Hoang and Phillip Rogaway}, title = {Garbling Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {265}, year = {2012}, url = {http://eprint.iacr.org/2012/265}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareHR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareHR12a, author = {Mihir Bellare and Viet Tung Hoang and Phillip Rogaway}, title = {Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {564}, year = {2012}, url = {http://eprint.iacr.org/2012/564}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareHR12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareKR12, author = {Mihir Bellare and Sriram Keelveedhi and Thomas Ristenpart}, title = {Message-Locked Encryption and Secure Deduplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {631}, year = {2012}, url = {http://eprint.iacr.org/2012/631}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareKR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareO12, author = {Mihir Bellare and Adam O'Neill}, title = {Semantically-Secure Functional Encryption: Possibility Results, Impossibility Results and the Quest for a General Definition}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {515}, year = {2012}, url = {http://eprint.iacr.org/2012/515}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellarePT12, author = {Mihir Bellare and Kenneth G. Paterson and Susan Thomson}, title = {{RKA} Security beyond the Linear Barrier: IBE, Encryption and Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {514}, year = {2012}, url = {http://eprint.iacr.org/2012/514}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellarePT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareT12, author = {Mihir Bellare and Stefano Tessaro}, title = {Polynomial-Time, Semantically-Secure Encryption Achieving the Secrecy Capacity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {22}, year = {2012}, url = {http://eprint.iacr.org/2012/022}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareTR12, author = {Mihir Bellare and Stefano Tessaro and Thomas Ristenpart}, title = {Multi-Instance Security and its Application to Password-Based Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {196}, year = {2012}, url = {http://eprint.iacr.org/2012/196}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareTR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareTV12, author = {Mihir Bellare and Stefano Tessaro and Alexander Vardy}, title = {A Cryptographic Treatment of the Wiretap Channel}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {15}, year = {2012}, url = {http://eprint.iacr.org/2012/015}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareTV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ben-SassonCGT12, author = {Eli Ben{-}Sasson and Alessandro Chiesa and Daniel Genkin and Eran Tromer}, title = {Fast Reductions from RAMs to Delegatable Succinct Constraint Satisfaction Problems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {71}, year = {2012}, url = {http://eprint.iacr.org/2012/071}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ben-SassonCGT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenderDFK12, author = {Jens Bender and {\"{O}}zg{\"{u}}r Dagdelen and Marc Fischlin and Dennis K{\"{u}}gler}, title = {Domain-Specifi c Pseudonymous Signatures for the German Identity Card}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {558}, year = {2012}, url = {http://eprint.iacr.org/2012/558}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenderDFK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BensonSW12, author = {Karyn Benson and Hovav Shacham and Brent Waters}, title = {The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {687}, year = {2012}, url = {http://eprint.iacr.org/2012/687}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BensonSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BermanHKN12, author = {Itay Berman and Iftach Haitner and Ilan Komargodski and Moni Naor}, title = {Hardness Preserving Reductions via Cuckoo Hashing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {722}, year = {2012}, url = {http://eprint.iacr.org/2012/722}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BermanHKN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernhardFG12, author = {David Bernhard and Georg Fuchsbauer and Essam Ghadafi}, title = {Efficient Signatures of Knowledge and {DAA} in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {475}, year = {2012}, url = {http://eprint.iacr.org/2012/475}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernhardFG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernhardPW12, author = {David Bernhard and Olivier Pereira and Bogdan Warinschi}, title = {On Necessary and Sufficient Conditions for Private Ballot Submission}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {236}, year = {2012}, url = {http://eprint.iacr.org/2012/236}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernhardPW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinCCLNSY12, author = {Daniel J. Bernstein and Hsieh{-}Chung Chen and Chen{-}Mou Cheng and Tanja Lange and Ruben Niederhagen and Peter Schwabe and Bo{-}Yin Yang}, title = {{ECC2K-130} on {NVIDIA} GPUs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {2}, year = {2012}, url = {http://eprint.iacr.org/2012/002}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinCCLNSY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinCCLNSY12a, author = {Daniel J. Bernstein and Hsieh{-}Chung Chen and Chen{-}Mou Cheng and Tanja Lange and Ruben Niederhagen and Peter Schwabe and Bo{-}Yin Yang}, title = {Usable assembly language for GPUs: a success story}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {137}, year = {2012}, url = {http://eprint.iacr.org/2012/137}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinCCLNSY12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinDLO12, author = {Daniel J. Bernstein and Jeroen Doumen and Tanja Lange and Jan{-}Jaap Oosterwijk}, title = {Faster batch forgery identification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {549}, year = {2012}, url = {http://eprint.iacr.org/2012/549}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinDLO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinL12, author = {Daniel J. Bernstein and Tanja Lange}, title = {The new {SHA-3} software shootout}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {4}, year = {2012}, url = {http://eprint.iacr.org/2012/004}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinL12a, author = {Daniel J. Bernstein and Tanja Lange}, title = {Two grumpy giants and a baby}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {294}, year = {2012}, url = {http://eprint.iacr.org/2012/294}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinL12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinL12b, author = {Daniel J. Bernstein and Tanja Lange}, title = {Non-uniform cracks in the concrete: the power of free precomputation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {318}, year = {2012}, url = {http://eprint.iacr.org/2012/318}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinL12b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinL12c, author = {Daniel J. Bernstein and Tanja Lange}, title = {Never trust a bunny}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {355}, year = {2012}, url = {http://eprint.iacr.org/2012/355}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinL12c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinL12d, author = {Daniel J. Bernstein and Tanja Lange}, title = {Computing small discrete logarithms faster}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {458}, year = {2012}, url = {http://eprint.iacr.org/2012/458}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinL12d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhattacherjeeS12, author = {Sanjay Bhattacherjee and Palash Sarkar}, title = {Analysis and Trade-Offs for the (Complete Tree) Layered Subset Difference Broadcast Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {337}, year = {2012}, url = {http://eprint.iacr.org/2012/337}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BhattacherjeeS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BilginNNRS12, author = {Beg{\"{u}}l Bilgin and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen and Georg St{\"{u}}tz}, title = {Threshold Implementations of all 3x3 and 4x4 S-boxes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {300}, year = {2012}, url = {http://eprint.iacr.org/2012/300}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BilginNNRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BiryukovPW12, author = {Alex Biryukov and Ivan Pustogarov and Ralf{-}Philipp Weinmann}, title = {TorScan: Tracing Long-lived Connections and Differential Scanning Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {432}, year = {2012}, url = {http://eprint.iacr.org/2012/432}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BiryukovPW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bisson12, author = {Gaetan Bisson}, title = {Computing endomorphism rings of abelian varieties of dimension two}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {525}, year = {2012}, url = {http://eprint.iacr.org/2012/525}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bisson12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BitanskyC12, author = {Nir Bitansky and Alessandro Chiesa}, title = {Succinct Arguments from Multi-Prover Interactive Proofs and their Efficiency Benefits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {461}, year = {2012}, url = {http://eprint.iacr.org/2012/461}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BitanskyC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BitanskyCCT12, author = {Nir Bitansky and Ran Canetti and Alessandro Chiesa and Eran Tromer}, title = {Recursive Composition and Bootstrapping for SNARKs and Proof-Carrying Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {95}, year = {2012}, url = {http://eprint.iacr.org/2012/095}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BitanskyCCT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BitanskyCIOP12, author = {Nir Bitansky and Alessandro Chiesa and Yuval Ishai and Rafail Ostrovsky and Omer Paneth}, title = {Succinct Non-Interactive Arguments via Linear Interactive Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {718}, year = {2012}, url = {http://eprint.iacr.org/2012/718}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BitanskyCIOP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BitanskyGW12, author = {Nir Bitansky and Sanjam Garg and Daniel Wichs}, title = {Why "Fiat-Shamir for Proofs" Lacks a Proof}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {705}, year = {2012}, url = {http://eprint.iacr.org/2012/705}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BitanskyGW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BitanskyP12, author = {Nir Bitansky and Omer Paneth}, title = {On the Impossibility of Approximate Obfuscation and Applications to Resettable Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {729}, year = {2012}, url = {http://eprint.iacr.org/2012/729}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BitanskyP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Blanchet12, author = {Bruno Blanchet}, title = {Automatically Verified Mechanized Proof of One-Encryption Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {173}, year = {2012}, url = {http://eprint.iacr.org/2012/173}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Blanchet12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlantonA12, author = {Marina Blanton and Mehrdad Aliasgari}, title = {On the (Non-)Reusability of Fuzzy Sketches and Extractors and Security Improvements in the Computational Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {608}, year = {2012}, url = {http://eprint.iacr.org/2012/608}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlantonA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlassNH12, author = {Erik{-}Oliver Blass and Guevara Noubir and Triet Vo Huu}, title = {EPiC: Efficient Privacy-Preserving Counting for MapReduce}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {452}, year = {2012}, url = {http://eprint.iacr.org/2012/452}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlassNH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlazyCPV12, author = {Olivier Blazy and C{\'{e}}line Chevalier and David Pointcheval and Damien Vergnaud}, title = {Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {284}, year = {2012}, url = {http://eprint.iacr.org/2012/284}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlazyCPV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlondeauGN12, author = {C{\'{e}}line Blondeau and Beno{\^{\i}}t G{\'{e}}rard and Kaisa Nyberg}, title = {Multiple Differential Cryptanalysis using {\textbackslash}LLR and {\(\chi\)}\({}^{\mbox{2}}\) Statistics}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {360}, year = {2012}, url = {http://eprint.iacr.org/2012/360}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlondeauGN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoestenS12, author = {Dion Boesten and Boris Skoric}, title = {Asymptotic fingerprinting capacity in the Combined Digit Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {184}, year = {2012}, url = {http://eprint.iacr.org/2012/184}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoestenS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BogdanovKLSST12, author = {Andrey Bogdanov and Lars R. Knudsen and Gregor Leander and Fran{\c{c}}ois{-}Xavier Standaert and John P. Steinberger and Elmar Tischhauser}, title = {Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {35}, year = {2012}, url = {http://eprint.iacr.org/2012/035}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BogdanovKLSST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoldyrevaCLO12, author = {Alexandra Boldyreva and Nathan Chenette and Younho Lee and Adam O'Neill}, title = {Order-Preserving Symmetric Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {624}, year = {2012}, url = {http://eprint.iacr.org/2012/624}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoldyrevaCLO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoldyrevaCO12, author = {Alexandra Boldyreva and Nathan Chenette and Adam O'Neill}, title = {Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {625}, year = {2012}, url = {http://eprint.iacr.org/2012/625}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoldyrevaCO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoldyrevaGK12, author = {Alexandra Boldyreva and Vipul Goyal and Virendra Kumar}, title = {Identity-based Encryption with Efficient Revocation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {52}, year = {2012}, url = {http://eprint.iacr.org/2012/052}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoldyrevaGK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoldyrevaK12, author = {Alexandra Boldyreva and Virendra Kumar}, title = {A New Pseudorandom Generator from Collision-Resistant Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {56}, year = {2012}, url = {http://eprint.iacr.org/2012/056}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoldyrevaK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BondFSW12, author = {Mike Bond and George French and Nigel P. Smart and Gaven J. Watson}, title = {The low-call diet: Authenticated Encryption for call counting {HSM} users}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {497}, year = {2012}, url = {http://eprint.iacr.org/2012/497}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BondFSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehZ12, author = {Dan Boneh and Mark Zhandry}, title = {Quantum-Secure Message Authentication Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {606}, year = {2012}, url = {http://eprint.iacr.org/2012/606}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonnecazeR12, author = {Alexis Bonnecaze and Robert Rolland}, title = {Collecting Data while Preserving Individuals' Privacy: {A} Case Study}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {603}, year = {2012}, url = {http://eprint.iacr.org/2012/603}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonnecazeR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Borghoff12, author = {Julia Borghoff}, title = {Mixed-integer Linear Programming in the Analysis of Trivium and Ktantan}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {676}, year = {2012}, url = {http://eprint.iacr.org/2012/676}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Borghoff12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BorghoffCGKKKLNPRRTY12, author = {Julia Borghoff and Anne Canteaut and Tim G{\"{u}}neysu and Elif Bilge Kavun and Miroslav Knezevic and Lars R. Knudsen and Gregor Leander and Ventzislav Nikov and Christof Paar and Christian Rechberger and Peter Rombouts and S{\o}ren S. Thomsen and Tolga Yal{\c{c}}in}, title = {{PRINCE} - {A} Low-latency Block Cipher for Pervasive Computing Applications (Full version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {529}, year = {2012}, url = {http://eprint.iacr.org/2012/529}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BorghoffCGKKKLNPRRTY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosCHL12, author = {Joppe W. Bos and Craig Costello and H{\"{u}}seyin Hisil and Kristin E. Lauter}, title = {Two is Greater than One}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {670}, year = {2012}, url = {http://eprint.iacr.org/2012/670}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosCHL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosDJ12, author = {Joppe W. Bos and Alina Dudeanu and Dimitar Jetchev}, title = {Collision Bounds for the Additive Pollard Rho Algorithm for Solving Discrete Logarithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {87}, year = {2012}, url = {http://eprint.iacr.org/2012/087}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosDJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosK12, author = {Joppe W. Bos and Thorsten Kleinjung}, title = {{ECM} at Work}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {89}, year = {2012}, url = {http://eprint.iacr.org/2012/089}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BouillaguetDF12, author = {Charles Bouillaguet and Patrick Derbez and Pierre{-}Alain Fouque}, title = {Automatic Search of Attacks on round-reduced {AES} and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {69}, year = {2012}, url = {http://eprint.iacr.org/2012/069}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BouillaguetDF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BouillaguetFV12, author = {Charles Bouillaguet and Pierre{-}Alain Fouque and Amandine V{\'{e}}ber}, title = {Graph-Theoretic Algorithms for the "Isomorphism of Polynomials" Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {607}, year = {2012}, url = {http://eprint.iacr.org/2012/607}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BouillaguetFV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoureanuV12, author = {Ioana Boureanu and Serge Vaudenay}, title = {Several Weak Bit-Commitments Using Seal-Once Tamper-Evident Devices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {380}, year = {2012}, url = {http://eprint.iacr.org/2012/380}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoureanuV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BowersDGJORT12, author = {Kevin D. Bowers and Marten van Dijk and Robert Griffin and Ari Juels and Alina Oprea and Ronald L. Rivest and Nikos Triandopoulos}, title = {Defending Against the Unknown Enemy: Applying FlipIt to System Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {579}, year = {2012}, url = {http://eprint.iacr.org/2012/579}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BowersDGJORT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Boyen12, author = {Xavier Boyen}, title = {Attribute-Based Functional Encryption on Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {716}, year = {2012}, url = {http://eprint.iacr.org/2012/716}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Boyen12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Brakerski12, author = {Zvika Brakerski}, title = {Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {78}, year = {2012}, url = {http://eprint.iacr.org/2012/078}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Brakerski12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Brakerski12a, author = {Zvika Brakerski}, title = {When Homomorphism Becomes a Liability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {225}, year = {2012}, url = {http://eprint.iacr.org/2012/225}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Brakerski12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiGH12, author = {Zvika Brakerski and Craig Gentry and Shai Halevi}, title = {Packed Ciphertexts in LWE-based Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {565}, year = {2012}, url = {http://eprint.iacr.org/2012/565}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiGH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BraunBMW12, author = {Johannes Braun and Johannes Buchmann and Ciaran Mullan and Alexander Wiesmaier}, title = {Long Term Confidentiality: a Survey}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {449}, year = {2012}, url = {http://eprint.iacr.org/2012/449}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BraunBMW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BriaisCCDGJMNP12, author = {S{\'{e}}bastien Briais and St{\'{e}}phane Caron and Jean{-}Michel Cioranesco and Jean{-}Luc Danger and Sylvain Guilley and Jacques{-}Henri Jourdan and Arthur Milchior and David Naccache and Thibault Porteboeuf}, title = {3D Hardware Canaries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {324}, year = {2012}, url = {http://eprint.iacr.org/2012/324}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BriaisCCDGJMNP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BriaisGD12, author = {S{\'{e}}bastien Briais and Sylvain Guilley and Jean{-}Luc Danger}, title = {A formal study of two physical countermeasures against side channel attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {430}, year = {2012}, url = {http://eprint.iacr.org/2012/430}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BriaisGD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrierFKMNAPRV12, author = {Eric Brier and Quentin Fortier and Roman Korkikian and Khalid W. Magld and David Naccache and Guilherme Ozari de Almeida and Adrien Pommellet and A. H. Ragab and Jean Vuillemin}, title = {Defensive Leakage Camouflage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {728}, year = {2012}, url = {http://eprint.iacr.org/2012/728}, timestamp = {Wed, 19 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BrierFKMNAPRV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BringerCP12, author = {Julien Bringer and Herv{\'{e}} Chabanne and Alain Patey}, title = {Cross-Unlinkable Hierarchical Group Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {407}, year = {2012}, url = {http://eprint.iacr.org/2012/407}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BringerCP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BringerCP12a, author = {Julien Bringer and Herv{\'{e}} Chabanne and Alain Patey}, title = {{SHADE:} Secure HAmming DistancE computation from oblivious transfer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {586}, year = {2012}, url = {http://eprint.iacr.org/2012/586}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BringerCP12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Brown12, author = {Daniel R. L. Brown}, title = {Uniform Compression Functions Can Fail to Preserve "Full" Entropy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {665}, year = {2012}, url = {http://eprint.iacr.org/2012/665}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Brown12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrzuskaFSWW12, author = {Christina Brzuska and Marc Fischlin and Nigel P. Smart and Bogdan Warinschi and Stephen C. Williams}, title = {Less is More: Relaxed yet Composable Security Notions for Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {242}, year = {2012}, url = {http://eprint.iacr.org/2012/242}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrzuskaFSWW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BulyginW12, author = {Stanislav Bulygin and Michael Walter}, title = {Study of the invariant coset attack on PRINTcipher: more weak keys with practical key recovery}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {85}, year = {2012}, url = {http://eprint.iacr.org/2012/085}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BulyginW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Camacho12, author = {Philippe Camacho}, title = {Fair Exchange of Short Signatures without Trusted Third Party}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {288}, year = {2012}, url = {http://eprint.iacr.org/2012/288}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Camacho12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CamenischDEN12, author = {Jan Camenisch and Maria Dubovitskaya and Robert R. Enderlein and Gregory Neven}, title = {Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {348}, year = {2012}, url = {http://eprint.iacr.org/2012/348}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CamenischDEN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CamenischLN12, author = {Jan Camenisch and Anna Lysyanskaya and Gregory Neven}, title = {Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {717}, year = {2012}, url = {http://eprint.iacr.org/2012/717}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CamenischLN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CamenischNR12, author = {Jan Camenisch and Gregory Neven and Markus R{\"{u}}ckert}, title = {Fully Anonymous Attribute Tokens from Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {356}, year = {2012}, url = {http://eprint.iacr.org/2012/356}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CamenischNR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiV12, author = {Ran Canetti and Margarita Vald}, title = {Universally Composable Security With Local Adversaries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {117}, year = {2012}, url = {http://eprint.iacr.org/2012/117}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanteautFNPRV12, author = {Anne Canteaut and Thomas Fuhr and Mar{\'{\i}}a Naya{-}Plasencia and Pascal Paillier and Jean{-}Ren{\'{e}} Reinhard and Marion Videau}, title = {A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {363}, year = {2012}, url = {http://eprint.iacr.org/2012/363}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanteautFNPRV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletDGM12, author = {Claude Carlet and Jean{-}Luc Danger and Sylvain Guilley and Houssem Maghrebi}, title = {Leakage Squeezing of Order Two}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {567}, year = {2012}, url = {http://eprint.iacr.org/2012/567}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletDGM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CashKW12, author = {David Cash and Alptekin K{\"{u}}p{\c{c}}{\"{u}} and Daniel Wichs}, title = {Dynamic Proofs of Retrievability via Oblivious {RAM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {550}, year = {2012}, url = {http://eprint.iacr.org/2012/550}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CashKW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaiG12, author = {Qi Chai and Guang Gong}, title = {A Cryptanalysis of HummingBird-2: The Differential Sequence Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {233}, year = {2012}, url = {http://eprint.iacr.org/2012/233}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaiG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChanLSX12, author = {T.{-}H. Hubert Chan and Mingfei Li and Elaine Shi and Wenchang Xu}, title = {Differentially Private Continual Monitoring of Heavy Hitters from Distributed Streams}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {218}, year = {2012}, url = {http://eprint.iacr.org/2012/218}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChanLSX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChanSS12, author = {T.{-}H. Hubert Chan and Elaine Shi and Dawn Song}, title = {Optimal Lower Bound for Differentially Private Multi-Party Aggregation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {373}, year = {2012}, url = {http://eprint.iacr.org/2012/373}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChanSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChandranG12, author = {Nishanth Chandran and Sanjam Garg}, title = {Hardness Preserving Constructions of Pseudorandom Functions, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {616}, year = {2012}, url = {http://eprint.iacr.org/2012/616}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChandranG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChandranGO12, author = {Nishanth Chandran and Juan A. Garay and Rafail Ostrovsky}, title = {Almost-Everywhere Secure Computation with Edge Corruptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {221}, year = {2012}, url = {http://eprint.iacr.org/2012/221}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChandranGO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChandranKOR12, author = {Nishanth Chandran and Bhavana Kanukurthi and Rafail Ostrovsky and Leonid Reyzin}, title = {Privacy Amplification with Asymptotically Optimal Entropy Loss}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {501}, year = {2012}, url = {http://eprint.iacr.org/2012/501}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChandranKOR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChangY12, author = {Donghoon Chang and Moti Yung}, title = {Adaptive Preimage Resistance Analysis Revisited: {\textbackslash}{\textbackslash} Requirements, Subtleties and Implications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {209}, year = {2012}, url = {http://eprint.iacr.org/2012/209}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChangY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaseKLM12, author = {Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn}, title = {Malleable Proof Systems and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {12}, year = {2012}, url = {http://eprint.iacr.org/2012/012}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaseKLM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaseKLM12a, author = {Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn}, title = {Succinct Malleable NIZKs and an Application to Compact Shuffles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {506}, year = {2012}, url = {http://eprint.iacr.org/2012/506}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaseKLM12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaseKLM12b, author = {Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn}, title = {Verifiable Elections That Scale for Free}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {697}, year = {2012}, url = {http://eprint.iacr.org/2012/697}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaseKLM12b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaseV12, author = {Melissa Chase and Ivan Visconti}, title = {Secure Database Commitments and Universal Arguments of Quasi Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {436}, year = {2012}, url = {http://eprint.iacr.org/2012/436}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaseV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChatterjeeKK12, author = {Sanjit Chatterjee and Chethan Kamath and Vikas Kumar}, title = {Galindo-Garcia Identity-Based Signature Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {646}, year = {2012}, url = {http://eprint.iacr.org/2012/646}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChatterjeeKK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chen12, author = {Liqun Chen}, title = {Ring Group Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {289}, year = {2012}, url = {http://eprint.iacr.org/2012/289}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Chen12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenLLWW12, author = {Jie Chen and Hoon Wei Lim and San Ling and Huaxiong Wang and Hoeteck Wee}, title = {Shorter {IBE} and Signatures via Asymmetric Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {224}, year = {2012}, url = {http://eprint.iacr.org/2012/224}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenLLWW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenLY12, author = {Liqun Chen and Hoon Wei Lim and Guomin Yang}, title = {Cross-Domain Password-Based Authenticated Key Exchange Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {397}, year = {2012}, url = {http://eprint.iacr.org/2012/397}, timestamp = {Mon, 29 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenLY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenX12, author = {Shao{-}zhen Chen and Tian{-}min Xu}, title = {Biclique Attack of the Full {ARIA-256}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {11}, year = {2012}, url = {http://eprint.iacr.org/2012/011}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenZHXH12, author = {Danyang Chen and Yongbin Zhou and Yang Han and Rui Xue and Qing He}, title = {On Hardening Leakage Resilience of Random Extractors for Instantiations of Leakage Resilient Cryptographic Primitives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {114}, year = {2012}, url = {http://eprint.iacr.org/2012/114}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenZHXH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenZZL12, author = {Yu Chen and Jiang Zhang and Zhenfeng Zhang and Dongdai Lin}, title = {Integrated {PKE} and {PEKS} - Stronger Security Notions and New Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {692}, year = {2012}, url = {http://eprint.iacr.org/2012/692}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenZZL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Cheng12, author = {Qingfeng Cheng}, title = {Cryptanalysis of an Identity-Based Multiple Key Agreement Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {410}, year = {2012}, url = {http://eprint.iacr.org/2012/410}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Cheng12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Cheng12a, author = {Qingfeng Cheng}, title = {Cryptanalysis of an efficient certificateless two-party authenticated key agreement protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {725}, year = {2012}, url = {http://eprint.iacr.org/2012/725}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Cheng12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Cheong12, author = {Kai{-}Yuen Cheong}, title = {A secret sharing scheme of prime numbers based on hardness of factorization}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {222}, year = {2012}, url = {http://eprint.iacr.org/2012/222}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Cheong12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Cheong12a, author = {Kai{-}Yuen Cheong}, title = {One-way Functions from Chebyshev Polynomials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {263}, year = {2012}, url = {http://eprint.iacr.org/2012/263}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Cheong12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Childers12, author = {Greg Childers}, title = {Factorization of a 1061-bit number by the Special Number Field Sieve}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {444}, year = {2012}, url = {http://eprint.iacr.org/2012/444}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Childers12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoiKWZ12, author = {Seung Geol Choi and Jonathan Katz and Hoeteck Wee and Hong{-}Sheng Zhou}, title = {Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global {CRS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {700}, year = {2012}, url = {http://eprint.iacr.org/2012/700}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoiKWZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChouCHH12, author = {Jue{-}Sam Chou and Yalin Chen and Chun{-}Hui Huang and Yu{-}Siang Huang}, title = {Comments on four multi-server authentication protocols using smart card}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {406}, year = {2012}, url = {http://eprint.iacr.org/2012/406}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChouCHH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoudaryGM12, author = {Omar Choudary and Felix Gr{\"{o}}bert and Joachim Metz}, title = {Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {374}, year = {2012}, url = {http://eprint.iacr.org/2012/374}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoudaryGM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoudhuryHP12, author = {Ashish Choudhury and Martin Hirt and Arpita Patra}, title = {Unconditionally Secure Asynchronous Multiparty Computation with Linear Communication Complexity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {517}, year = {2012}, url = {http://eprint.iacr.org/2012/517}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoudhuryHP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoyYKGPPT12, author = {Jiali Choy and Huihui Yap and Khoongming Khoo and Jian Guo and Thomas Peyrin and Axel Poschmann and Chik How Tan}, title = {SPN-Hash: Improving the Provable Resistance Against Differential Collision Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {234}, year = {2012}, url = {http://eprint.iacr.org/2012/234}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoyYKGPPT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChuGL12, author = {Dalin Chu and Johann Gro{\ss}sch{\"{a}}dl and Zhe Liu}, title = {Twisted Edwards-Form Elliptic Curve Cryptography for 8-bit AVR-based Sensor Nodes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {730}, year = {2012}, url = {http://eprint.iacr.org/2012/730}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChuGL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chun-xiangXA12, author = {X. U. Chun{-}xiang and H. E. Xiao{-}hu and Daniel Abraha}, title = {Cryptanalysis of auditing protocol proposed by Wang et al. for data storage security in Cloud Computing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {115}, year = {2012}, url = {http://eprint.iacr.org/2012/115}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Chun-xiangXA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChungLMP12, author = {Kai{-}Min Chung and Edward Lui and Mohammad Mahmoody and Rafael Pass}, title = {Unprovable Security of Two-Message Zero Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {711}, year = {2012}, url = {http://eprint.iacr.org/2012/711}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChungLMP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChungLP12, author = {Kai{-}Min Chung and Huijia Lin and Rafael Pass}, title = {Constant-Round Concurrent Zero Knowledge From Falsifiable Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {563}, year = {2012}, url = {http://eprint.iacr.org/2012/563}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChungLP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CissS12, author = {Abdoul Aziz Ciss and Djiby Sow}, title = {Pairings on Generalized Huff Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {632}, year = {2012}, url = {http://eprint.iacr.org/2012/632}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CissS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CobanKB12, author = {Mustafa {\c{C}}oban and Ferhat Karako{\c{c}} and {\"{O}}zkan Boztas}, title = {Biclique Cryptanalysis of {TWINE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {422}, year = {2012}, url = {http://eprint.iacr.org/2012/422}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CobanKB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Comon-LundhCS12, author = {Hubert Comon{-}Lundh and V{\'{e}}ronique Cortier and Guillaume Scerri}, title = {Security proof with dishonest keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {8}, year = {2012}, url = {http://eprint.iacr.org/2012/008}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Comon-LundhCS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ConstantinBG12, author = {Jeremy Constantin and Andreas Burg and Frank K. G{\"{u}}rkaynak}, title = {Investigating the Potential of Custom Instruction Set Extensions for {SHA-3} Candidates on a 16-bit Microcontroller Architecture}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {50}, year = {2012}, url = {http://eprint.iacr.org/2012/050}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ConstantinBG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Costello12, author = {Craig Costello}, title = {Particularly Friendly Members of Family Trees}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {72}, year = {2012}, url = {http://eprint.iacr.org/2012/072}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Costello12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Courtois12, author = {Nicolas T. Courtois}, title = {An Improved Differential Attack on Full {GOST}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {138}, year = {2012}, url = {http://eprint.iacr.org/2012/138}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Courtois12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CremersF12, author = {Cas Cremers and Mich{\`{e}}le Feltz}, title = {Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {416}, year = {2012}, url = {http://eprint.iacr.org/2012/416}, timestamp = {Mon, 23 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CremersF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CrepeauK12, author = {Claude Cr{\'{e}}peau and Raza Ali Kazmi}, title = {An Analysis of ZVP-Attack on {ECC} Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {329}, year = {2012}, url = {http://eprint.iacr.org/2012/329}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CrepeauK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CristofaroT12, author = {Emiliano De Cristofaro and Gene Tsudik}, title = {On the performance of certain Private Set Intersection protocols. (And some remarks on the recent paper by Huang et al. in NDSS'12)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {54}, year = {2012}, url = {http://eprint.iacr.org/2012/054}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CristofaroT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Csirmaz12, author = {L{\'{a}}szl{\'{o}} Csirmaz}, title = {Probabilistic Infinite Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {412}, year = {2012}, url = {http://eprint.iacr.org/2012/412}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Csirmaz12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-Soled0KL12, author = {Dana Dachman{-}Soled and Abhishek Jain and Yael Tauman Kalai and Adriana L{\'{o}}pez{-}Alt}, title = {On the (In)security of the Fiat-Shamir Paradigm, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {706}, year = {2012}, url = {http://eprint.iacr.org/2012/706}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-Soled0KL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-Soled12, author = {Dana Dachman{-}Soled}, title = {On the Impossibility of Sender-Deniable Public Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {727}, year = {2012}, url = {http://eprint.iacr.org/2012/727}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-Soled12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledFMO12, author = {Dana Dachman{-}Soled and Georg Fuchsbauer and Payman Mohassel and Adam O'Neill}, title = {Enhanced Chosen-Ciphertext Security and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {543}, year = {2012}, url = {http://eprint.iacr.org/2012/543}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledFMO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledK12, author = {Dana Dachman{-}Soled and Yael Tauman Kalai}, title = {Securing Circuits Against Constant-Rate Tampering}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {366}, year = {2012}, url = {http://eprint.iacr.org/2012/366}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaemenA12, author = {Joan Daemen and Gilles Van Assche}, title = {Differential propagation analysis of Keccak}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {163}, year = {2012}, url = {http://eprint.iacr.org/2012/163}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DaemenA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DagdelenF12, author = {{\"{O}}zg{\"{u}}r Dagdelen and Marc Fischlin}, title = {Unconditionally-Secure Universally Composable Password-Based Key-Exchange based on One-Time Memory Tokens}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {537}, year = {2012}, url = {http://eprint.iacr.org/2012/537}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DagdelenF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DahlNT12, author = {Morten Dahl and Chao Ning and Tomas Toft}, title = {On Secure Two-party Integer Division}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {164}, year = {2012}, url = {http://eprint.iacr.org/2012/164}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DahlNT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardKLMS12, author = {Ivan Damg{\aa}rd and Marcel Keller and Enrique Larraia and Christian Miles and Nigel P. Smart}, title = {Implementing {AES} via an Actively/Covertly Secure Dishonest-Majority {MPC} Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {262}, year = {2012}, url = {http://eprint.iacr.org/2012/262}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardKLMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardKLPSS12, author = {Ivan Damg{\aa}rd and Marcel Keller and Enrique Larraia and Valerio Pastro and Peter Scholl and Nigel P. Smart}, title = {Practical Covertly Secure {MPC} for Dishonest Majority - or: Breaking the {SPDZ} Limits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {642}, year = {2012}, url = {http://eprint.iacr.org/2012/642}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardKLPSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardKM12, author = {Ivan Bjerre Damg{\aa}rd and Jonas K{\"{o}}lker and Peter Bro Miltersen}, title = {Secret Sharing and Secure Computing from Monotone Formulae}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {536}, year = {2012}, url = {http://eprint.iacr.org/2012/536}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardKM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardL12, author = {Ivan Damg{\aa}rd and Adriana L{\'{o}}pez{-}Alt}, title = {Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {364}, year = {2012}, url = {http://eprint.iacr.org/2012/364}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardP12, author = {Ivan Damg{\aa}rd and Sunoo Park}, title = {Is Public-Key Encryption Based on {LPN} Practical?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {699}, year = {2012}, url = {http://eprint.iacr.org/2012/699}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardZ12, author = {Ivan Damg{\aa}rd and Sarah Zakarias}, title = {Constant-Overhead Secure Computation for Boolean Circuits in the Preprocessing Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {512}, year = {2012}, url = {http://eprint.iacr.org/2012/512}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DassanceV12, author = {Fran{\c{c}}ois Dassance and Alexandre Venelli}, title = {Combined Attacks on the {AES} Key Schedule}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {98}, year = {2012}, url = {http://eprint.iacr.org/2012/098}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DassanceV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DebandeBBL12, author = {Nicolas Debande and Ma{\"{e}}l Berthier and Yves Bocktaels and Thanh{-}Ha Le}, title = {Profiled Model Based Power Simulator for Side Channel Evaluation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {703}, year = {2012}, url = {http://eprint.iacr.org/2012/703}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DebandeBBL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DehbaouiDROMT12, author = {Amine Dehbaoui and Jean{-}Max Dutertre and Bruno Robisson and P. Orsatelli and Philippe Maurine and Assia Tria}, title = {Injection of transient faults using electromagnetic pulses -Practical results on a cryptographic system-}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {123}, year = {2012}, url = {http://eprint.iacr.org/2012/123}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DehbaouiDROMT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DemayGHM12, author = {Gr{\'{e}}gory Demay and Peter Gazi and Martin Hirt and Ueli Maurer}, title = {Resource-Restricted Indifferentiability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {613}, year = {2012}, url = {http://eprint.iacr.org/2012/613}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DemayGHM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DemirelG12, author = {Denise Demirel and Jeroen van de Graaf}, title = {A Publicly-Veri able Mix-net with Everlasting Privacy Towards Observers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {420}, year = {2012}, url = {http://eprint.iacr.org/2012/420}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DemirelG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DengGLWY12, author = {Yi Deng and Juan A. Garay and San Ling and Huaxiong Wang and Moti Yung}, title = {On the (Im)Plausibility of Constant-Round Public-Coin Straight-Line-Simulatable Zero-Knowledge Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {508}, year = {2012}, url = {http://eprint.iacr.org/2012/508}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DengGLWY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DengP12, author = {Yingpu Deng and Yanbin Pan}, title = {An algorithm for factoring integers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {97}, year = {2012}, url = {http://eprint.iacr.org/2012/097}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DengP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dent12, author = {Alexander W. Dent}, title = {Aggregate Signcryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {200}, year = {2012}, url = {http://eprint.iacr.org/2012/200}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dent12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DerbezFJ12, author = {Patrick Derbez and Pierre{-}Alain Fouque and J{\'{e}}r{\'{e}}my Jean}, title = {Improved Key Recovery Attacks on Reduced-Round {AES} in the Single-Key Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {477}, year = {2012}, url = {http://eprint.iacr.org/2012/477}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DerbezFJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DevetGH12, author = {Casey Devet and Ian Goldberg and Nadia Heninger}, title = {Optimally Robust Private Information Retrieval}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {83}, year = {2012}, url = {http://eprint.iacr.org/2012/083}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DevetGH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DiaoF12, author = {Oumar Diao and Emmanuel Fouotsa}, title = {Edwards model of elliptic curves defined over any fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {346}, year = {2012}, url = {http://eprint.iacr.org/2012/346}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DiaoF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Diaz-SantiagoC12, author = {Sandra Diaz{-}Santiago and Debrup Chakraborty}, title = {On Securing Communication From Profilers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {124}, year = {2012}, url = {http://eprint.iacr.org/2012/124}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Diaz-SantiagoC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DibertC12, author = {Alexander Dibert and L{\'{a}}szl{\'{o}} Csirmaz}, title = {Infinite Secret Sharing - Examples}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {411}, year = {2012}, url = {http://eprint.iacr.org/2012/411}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DibertC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DichtlB12, author = {Markus Dichtl and Pascale B{\"{o}}ffgen}, title = {Breaking Another Quasigroup-Based Cryptographic Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {661}, year = {2012}, url = {http://eprint.iacr.org/2012/661}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DichtlB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DijkJOR12, author = {Marten van Dijk and Ari Juels and Alina Oprea and Ronald L. Rivest}, title = {FlipIt: The Game of "Stealthy Takeover"}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {103}, year = {2012}, url = {http://eprint.iacr.org/2012/103}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DijkJOR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DijkR12, author = {Marten van Dijk and Ulrich R{\"{u}}hrmair}, title = {Physical Unclonable Functions in Cryptographic Protocols: Security Proofs and Impossibility Results}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {228}, year = {2012}, url = {http://eprint.iacr.org/2012/228}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DijkR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ding12, author = {Jintai Ding}, title = {New cryptographic constructions using generalized learning with errors problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {387}, year = {2012}, url = {http://eprint.iacr.org/2012/387}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ding12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ding12a, author = {Jintai Ding}, title = {A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {688}, year = {2012}, url = {http://eprint.iacr.org/2012/688}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ding12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DingG12, author = {Lin Ding and Jie Guan}, title = {Cryptanalysis of {RAKAPOSHI} Stream Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {696}, year = {2012}, url = {http://eprint.iacr.org/2012/696}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DingG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DingS12, author = {Jintai Ding and Dieter Schmidt}, title = {Algebraic attack on lattice based cryptosystems via solving equations over real numbers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {94}, year = {2012}, url = {http://eprint.iacr.org/2012/094}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DingS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DinurDKS12, author = {Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {217}, year = {2012}, url = {http://eprint.iacr.org/2012/217}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DinurDKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DinurDS12, author = {Itai Dinur and Orr Dunkelman and Adi Shamir}, title = {Self-Differential Cryptanalysis of Up to 5 Rounds of {SHA-3}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {672}, year = {2012}, url = {http://eprint.iacr.org/2012/672}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DinurDS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DmitrienkoSTW12, author = {Alexandra Dmitrienko and Ahmad{-}Reza Sadeghi and Sandeep Tamrakar and Christian Wachsmann}, title = {SmartTokens: Delegable Access Control with NFC-enabled Smartphones (Full Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {187}, year = {2012}, url = {http://eprint.iacr.org/2012/187}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DmitrienkoSTW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dodis12, author = {Yevgeniy Dodis}, title = {Beating Shannon requires {BOTH} efficient adversaries {AND} non-zero advantage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {53}, year = {2012}, url = {http://eprint.iacr.org/2012/053}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dodis12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisJMW12, author = {Yevgeniy Dodis and Abhishek Jain and Tal Moran and Daniel Wichs}, title = {Counterexamples to Hardness Amplification Beyond Negligible}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {32}, year = {2012}, url = {http://eprint.iacr.org/2012/032}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisJMW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisKPW12, author = {Yevgeniy Dodis and Eike Kiltz and Krzysztof Pietrzak and Daniel Wichs}, title = {Message Authentication, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {59}, year = {2012}, url = {http://eprint.iacr.org/2012/059}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisKPW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisLMV12, author = {Yevgeniy Dodis and Adriana L{\'{o}}pez{-}Alt and Ilya Mironov and Salil P. Vadhan}, title = {Differential Privacy with Imperfect Randomness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {435}, year = {2012}, url = {http://eprint.iacr.org/2012/435}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisLMV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DongCCR12, author = {Changyu Dong and Liqun Chen and Jan Camenisch and Giovanni Russello}, title = {Fair Private Set Intersection with a Semi-trusted Arbiter}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {252}, year = {2012}, url = {http://eprint.iacr.org/2012/252}, timestamp = {Sat, 28 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DongCCR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DoshiJ12, author = {Nishant Doshi and Devesh Jinwala}, title = {Updating attribute in {CP-ABE:} {A} New Approach}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {496}, year = {2012}, url = {http://eprint.iacr.org/2012/496}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DoshiJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DoshiJ12a, author = {Nishant Doshi and Devesh Jinwala}, title = {Constant Ciphertext Length in {CP-ABE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {500}, year = {2012}, url = {http://eprint.iacr.org/2012/500}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DoshiJ12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingKM12, author = {Nico D{\"{o}}ttling and Daniel Kraschewski and J{\"{o}}rn M{\"{u}}ller{-}Quade}, title = {David {\&} Goliath Oblivious Affine Function Evaluation - Asymptotically Optimal Building Blocks for Universally Composable Two-Party Computation from a Single Untrusted Stateful Tamper-Proof Hardware Token}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {135}, year = {2012}, url = {http://eprint.iacr.org/2012/135}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingKM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Driessen12, author = {Benedikt Driessen}, title = {Eavesdropping on Satellite Telecommunication Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {51}, year = {2012}, url = {http://eprint.iacr.org/2012/051}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Driessen12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Drylo12, author = {Robert Drylo}, title = {Constructing Pairing-Friendly Genus 2 Curves with Split Jacobian}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {427}, year = {2012}, url = {http://eprint.iacr.org/2012/427}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Drylo12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuZ12, author = {Yusong Du and Fangguo Zhang}, title = {On the Existence of Boolean Functions with Optimal Resistance against Fast Algebraic Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {210}, year = {2012}, url = {http://eprint.iacr.org/2012/210}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuboisGB12, author = {Renaud Dubois and Aurore Guillevic and Marine Sengelin Le Breton}, title = {Improved Broadcast Encryption Scheme with Constant-Size Ciphertext}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {370}, year = {2012}, url = {http://eprint.iacr.org/2012/370}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuboisGB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dubrova12, author = {Elena Dubrova}, title = {A List of Maximum Period NLFSRs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {166}, year = {2012}, url = {http://eprint.iacr.org/2012/166}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dubrova12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dubrova12a, author = {Elena Dubrova}, title = {A Method for Generating Full Cycles by a Composition of NLFSRs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {492}, year = {2012}, url = {http://eprint.iacr.org/2012/492}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dubrova12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DucasD12, author = {L{\'{e}}o Ducas and Alain Durmus}, title = {Ring-LWE in Polynomial Rings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {235}, year = {2012}, url = {http://eprint.iacr.org/2012/235}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DucasD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DupuisNS12, author = {Fr{\'{e}}d{\'{e}}ric Dupuis and Jesper Buus Nielsen and Louis Salvail}, title = {Actively Secure Two-Party Evaluation of any Quantum Operation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {304}, year = {2012}, url = {http://eprint.iacr.org/2012/304}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DupuisNS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DurvauxRSOV12, author = {Fran{\c{c}}ois Durvaux and Mathieu Renauld and Fran{\c{c}}ois{-}Xavier Standaert and Lo{\"{\i}}c van Oldeneel tot Oldenzeel and Nicolas Veyrat{-}Charvillon}, title = {Cryptanalysis of the {CHES} 2009/2010 Random Delay Countermeasure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {38}, year = {2012}, url = {http://eprint.iacr.org/2012/038}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DurvauxRSOV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DyerCRS12, author = {Kevin P. Dyer and Scott E. Coull and Thomas Ristenpart and Thomas Shrimpton}, title = {Format-Transforming Encryption: More than Meets the {DPI}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {494}, year = {2012}, url = {http://eprint.iacr.org/2012/494}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DyerCRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EjgenbergFLL12, author = {Yael Ejgenberg and Moriya Farbstein and Meital Levy and Yehuda Lindell}, title = {{SCAPI:} The Secure Computation Application Programming Interface}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {629}, year = {2012}, url = {http://eprint.iacr.org/2012/629}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EjgenbergFLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ElkhiyaouiBM12, author = {Kaoutar Elkhiyaoui and Erik{-}Oliver Blass and Refik Molva}, title = {{T-MATCH:} Privacy-Preserving Item Matching for Storage-Only {RFID} Tags}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {465}, year = {2012}, url = {http://eprint.iacr.org/2012/465}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ElkhiyaouiBM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EnosZ12, author = {Graham Enos and Yuliang Zheng}, title = {An ID-Based Signcryption Scheme with Compartmented Secret Sharing for Unsigncryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {528}, year = {2012}, url = {http://eprint.iacr.org/2012/528}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/EnosZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EscalaHLR12, author = {Alex Escala and Javier Herranz and Beno{\^{\i}}t Libert and Carla R{\`{a}}fols}, title = {Hierarchical Identity-Based (Lossy) Trapdoor Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {503}, year = {2012}, url = {http://eprint.iacr.org/2012/503}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EscalaHLR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EssexCHA12, author = {Aleksander Essex and Jeremy Clark and Urs Hengartner and Carlisle Adams}, title = {Eperio: Mitigating Technical Complexity in Cryptographic Election Verification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {178}, year = {2012}, url = {http://eprint.iacr.org/2012/178}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EssexCHA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FanV12, author = {Junfeng Fan and Frederik Vercauteren}, title = {Somewhat Practical Fully Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {144}, year = {2012}, url = {http://eprint.iacr.org/2012/144}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FanV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FarashA12, author = {Mohammad Sabzinejad Farash and Mahmoud Ahmadian{-}Attari}, title = {An ID-Based Key Agreement Protocol Based on {ECC} Among Users of Separate Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {394}, year = {2012}, url = {http://eprint.iacr.org/2012/394}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FarashA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FarashAB12, author = {Mohammad Sabzinejad Farash and Mahmoud Ahmadian{-}Attari and Majid Bayat}, title = {A Certificateless Multiple-key Agreement Protocol Based on Bilinear Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {393}, year = {2012}, url = {http://eprint.iacr.org/2012/393}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FarashAB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FarashahiWZ12, author = {Reza Rezaeian Farashahi and Hongfeng Wu and Changan Zhao}, title = {Efficient Arithmetic on Hessian Curves over Fields of Characteristic Three}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {122}, year = {2012}, url = {http://eprint.iacr.org/2012/122}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FarashahiWZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FarrasP12, author = {Oriol Farr{\`{a}}s and Carles Padr{\'{o}}}, title = {Extending Brickell-Davenport Theorem to Non-Perfect Secret Sharing Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {595}, year = {2012}, url = {http://eprint.iacr.org/2012/595}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FarrasP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FarrasPXY12, author = {Oriol Farr{\`{a}}s and Carles Padr{\'{o}} and Chaoping Xing and An Yang}, title = {Natural Generalizations of Threshold Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {680}, year = {2012}, url = {http://eprint.iacr.org/2012/680}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FarrasPXY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FarshimLPQ12, author = {Pooya Farshim and Beno{\^{\i}}t Libert and Kenneth G. Paterson and Elizabeth A. Quaglia}, title = {Robust Encryption, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {673}, year = {2012}, url = {http://eprint.iacr.org/2012/673}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FarshimLPQ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FatemiEA12, author = {Mitra Fatemi and Taraneh Eghlidos and Mohammad Reza Aref}, title = {An Efficient Multistage Secret Sharing Scheme Using Linear One-way Functions and Bilinear Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {121}, year = {2012}, url = {http://eprint.iacr.org/2012/121}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FatemiEA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaugereGHR12, author = {Jean{-}Charles Faug{\`{e}}re and Pierrick Gaudry and Louise Huot and Gu{\'{e}}na{\"{e}}l Renault}, title = {Using Symmetries in the Index Calculus for Elliptic Curves Discrete Logarithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {199}, year = {2012}, url = {http://eprint.iacr.org/2012/199}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaugereGHR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustHNNZ12, author = {Sebastian Faust and Carmit Hazay and Jesper Buus Nielsen and Peter Sebastian Nordholt and Angela Zottarel}, title = {Signature Schemes Secure against Hard-to-Invert Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {45}, year = {2012}, url = {http://eprint.iacr.org/2012/045}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaustHNNZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustKMV12, author = {Sebastian Faust and Markulf Kohlweiss and Giorgia Azzurra Marson and Daniele Venturi}, title = {On the Non-malleability of the Fiat-Shamir Transform}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {704}, year = {2012}, url = {http://eprint.iacr.org/2012/704}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaustKMV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FazioP12, author = {Nelly Fazio and Irippuge Milinda Perera}, title = {Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {129}, year = {2012}, url = {http://eprint.iacr.org/2012/129}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FazioP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FioreG12, author = {Dario Fiore and Rosario Gennaro}, title = {Publicly Verifiable Delegation of Large Polynomials and Matrix Computations, with Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {281}, year = {2012}, url = {http://eprint.iacr.org/2012/281}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FioreG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FioreG12a, author = {Dario Fiore and Rosario Gennaro}, title = {Improved Publicly Verifiable Delegation of Large Polynomials and Matrix Computations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {434}, year = {2012}, url = {http://eprint.iacr.org/2012/434}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FioreG12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FischlinO12, author = {Marc Fischlin and Cristina Onete}, title = {Provably Secure Distance-Bounding: an Analysis of Prominent Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {128}, year = {2012}, url = {http://eprint.iacr.org/2012/128}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FischlinO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FleischhackerMS12, author = {Nils Fleischhacker and Mark Manulis and Amir Azodi}, title = {Modular Design and Analysis Framework for Multi-Factor Authentication and Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {181}, year = {2012}, url = {http://eprint.iacr.org/2012/181}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FleischhackerMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FleischmannFLW12, author = {Ewan Fleischmann and Christian Forler and Stefan Lucks and Jakob Wenzel}, title = {The Collision Security of {MDC-4} The Collision Security of {MDC-4}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {96}, year = {2012}, url = {http://eprint.iacr.org/2012/096}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FleischmannFLW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FletcherDD12, author = {Christopher W. Fletcher and Marten van Dijk and Srinivas Devadas}, title = {Compilation Techniques for Efficient Encrypted Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {266}, year = {2012}, url = {http://eprint.iacr.org/2012/266}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FletcherDD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FloriM12, author = {Jean{-}Pierre Flori and Sihem Mesnager}, title = {Dickson polynomials, hyperelliptic curves and hyper-bent functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {20}, year = {2012}, url = {http://eprint.iacr.org/2012/020}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FloriM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FouqueGLTZ12, author = {Pierre{-}Alain Fouque and Nicolas Guillermin and Delphine Leresteux and Mehdi Tibouchi and Jean{-}Christophe Zapalowicz}, title = {Attacking {RSA-CRT} Signatures with Faults on Montgomery Multiplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {172}, year = {2012}, url = {http://eprint.iacr.org/2012/172}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FouqueGLTZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FrancillonNRT12, author = {Aur{\'{e}}lien Francillon and Quan Nguyen and Kasper Bonne Rasmussen and Gene Tsudik}, title = {Systematic Treatment of Remote Attestation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {713}, year = {2012}, url = {http://eprint.iacr.org/2012/713}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FrancillonNRT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FranklinZ12, author = {Matthew K. Franklin and Haibin Zhang}, title = {Unique Group Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {204}, year = {2012}, url = {http://eprint.iacr.org/2012/204}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FranklinZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FranklinZ12a, author = {Matthew K. Franklin and Haibin Zhang}, title = {A Framework for Unique Ring Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {577}, year = {2012}, url = {http://eprint.iacr.org/2012/577}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FranklinZ12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Freeman12, author = {David Mandell Freeman}, title = {Improved Security for Linearly Homomorphic Signatures: {A} Generic Framework}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {60}, year = {2012}, url = {http://eprint.iacr.org/2012/060}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Freeman12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FreireHKP12, author = {Eduarda S. V. Freire and Dennis Hofheinz and Eike Kiltz and Kenneth G. Paterson}, title = {Non-Interactive Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {732}, year = {2012}, url = {http://eprint.iacr.org/2012/732}, timestamp = {Wed, 22 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FreireHKP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FreirePP12, author = {Eduarda S. V. Freire and Kenneth G. Paterson and Bertram Poettering}, title = {Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {645}, year = {2012}, url = {http://eprint.iacr.org/2012/645}, timestamp = {Wed, 22 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FreirePP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FujiokaSXY12, author = {Atsushi Fujioka and Koutarou Suzuki and Keita Xagawa and Kazuki Yoneyama}, title = {Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {211}, year = {2012}, url = {http://eprint.iacr.org/2012/211}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FujiokaSXY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Fujisaki12, author = {Eiichiro Fujisaki}, title = {A Framework for Efficient Fully-Equipped {UC} Commitments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {379}, year = {2012}, url = {http://eprint.iacr.org/2012/379}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Fujisaki12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FullerOR12, author = {Benjamin Fuller and Adam O'Neill and Leonid Reyzin}, title = {A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {5}, year = {2012}, url = {http://eprint.iacr.org/2012/005}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FullerOR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FullerR12, author = {Benjamin Fuller and Leonid Reyzin}, title = {Computational Entropy and Information Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {466}, year = {2012}, url = {http://eprint.iacr.org/2012/466}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FullerR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GajHRSS12, author = {Kris Gaj and Ekawat Homsirikamol and Marcin Rogawski and Rabia Shahid and Malik Umar Sharif}, title = {Comprehensive Evaluation of High-Speed and Medium-Speed Implementations of Five {SHA-3} Finalists Using Xilinx and Altera FPGAs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {368}, year = {2012}, url = {http://eprint.iacr.org/2012/368}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GajHRSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithZ12, author = {Steven D. Galbraith and Chang{-}An Zhao}, title = {Self-pairings on Hyperelliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {267}, year = {2012}, url = {http://eprint.iacr.org/2012/267}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalindoHV12, author = {David Galindo and Javier Herranz and Jorge Luis Villar}, title = {Identity-Based Encryption with Master Key-Dependent Message Security and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {142}, year = {2012}, url = {http://eprint.iacr.org/2012/142}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalindoHV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GangopadhyayPS12, author = {Sugata Gangopadhyay and Enes Pasalic and Pantelimon Stanica}, title = {A note on generalized bent criteria for Boolean functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {325}, year = {2012}, url = {http://eprint.iacr.org/2012/325}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GangopadhyayPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaoWCW12, author = {Wei Gao and Guilin Wang and Kefei Chen and Xueli Wang}, title = {Provably Secure Generic Construction of Certificate Based Signature from Certificateless Signature in Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {104}, year = {2012}, url = {http://eprint.iacr.org/2012/104}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaoWCW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaoWCW12a, author = {Wei Gao and Guilin Wang and Kefei Chen and Xueli Wang}, title = {Generic Construction of Certificate Based Encryption from Certificateless Encryption Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {105}, year = {2012}, url = {http://eprint.iacr.org/2012/105}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaoWCW12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaoWCWZ12, author = {Wei Gao and Guilin Wang and Kefei Chen and Xueli Wang and Guoyan Zhang}, title = {Efficient identity-based threshold decryption scheme from bilinear pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {75}, year = {2012}, url = {http://eprint.iacr.org/2012/075}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaoWCWZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaoWWC12, author = {Wei Gao and Guilin Wang and Xueli Wang and Kefei Chen}, title = {Efficient identity-based threshold signature scheme from bilinear pairings in the standard model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {73}, year = {2012}, url = {http://eprint.iacr.org/2012/073}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaoWWC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarayGO12, author = {Juan A. Garay and Clint Givens and Rafail Ostrovsky}, title = {Broadcast-Efficient Secure Multiparty Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {130}, year = {2012}, url = {http://eprint.iacr.org/2012/130}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarayGO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarayJKY12, author = {Juan A. Garay and David S. Johnson and Aggelos Kiayias and Moti Yung}, title = {Resource-based Corruptions and the Combinatorics of Hidden Diversity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {556}, year = {2012}, url = {http://eprint.iacr.org/2012/556}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarayJKY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargGH12, author = {Sanjam Garg and Craig Gentry and Shai Halevi}, title = {Candidate Multilinear Maps from Ideal Lattices and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {610}, year = {2012}, url = {http://eprint.iacr.org/2012/610}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargGH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargKOV12, author = {Sanjam Garg and Abishek Kumarasubramanian and Rafail Ostrovsky and Ivan Visconti}, title = {Impossibility Results for Static Input Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {433}, year = {2012}, url = {http://eprint.iacr.org/2012/433}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargKOV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargS12, author = {Sanjam Garg and Amit Sahai}, title = {Adaptively Secure Multi-Party Computation with Dishonest Majority}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {441}, year = {2012}, url = {http://eprint.iacr.org/2012/441}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GauthierOT12, author = {Val{\'{e}}rie Gauthier and Ayoub Otmani and Jean{-}Pierre Tillich}, title = {A Distinguisher-Based Attack of a Homomorphic Encryption Scheme Relying on Reed-Solomon Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {168}, year = {2012}, url = {http://eprint.iacr.org/2012/168}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GauthierOT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gavin12, author = {G{\'{e}}rald Gavin}, title = {{RSA} modulus generation in the two-party case}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {336}, year = {2012}, url = {http://eprint.iacr.org/2012/336}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gavin12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaziT12, author = {Peter Gazi and Stefano Tessaro}, title = {Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {158}, year = {2012}, url = {http://eprint.iacr.org/2012/158}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaziT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GehrkeHLP12, author = {Johannes Gehrke and Michael Hay and Edward Lui and Rafael Pass}, title = {Crowd-Blending Privacy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {456}, year = {2012}, url = {http://eprint.iacr.org/2012/456}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GehrkeHLP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GellesOW12, author = {Ran Gelles and Rafail Ostrovsky and Kina Winoto}, title = {Multiparty Proximity Testing with Dishonest Majority from Equality Testing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {378}, year = {2012}, url = {http://eprint.iacr.org/2012/378}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GellesOW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GennaroGPR12, author = {Rosario Gennaro and Craig Gentry and Bryan Parno and Mariana Raykova}, title = {Quadratic Span Programs and Succinct NIZKs without PCPs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {215}, year = {2012}, url = {http://eprint.iacr.org/2012/215}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GennaroGPR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GennaroW12, author = {Rosario Gennaro and Daniel Wichs}, title = {Fully Homomorphic Message Authenticators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {290}, year = {2012}, url = {http://eprint.iacr.org/2012/290}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GennaroW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryHS12, author = {Craig Gentry and Shai Halevi and Nigel P. Smart}, title = {Homomorphic Evaluation of the {AES} Circuit}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {99}, year = {2012}, url = {http://eprint.iacr.org/2012/099}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryHS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryHS12a, author = {Craig Gentry and Shai Halevi and Nigel P. Smart}, title = {Ring Switching in BGV-Style Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {240}, year = {2012}, url = {http://eprint.iacr.org/2012/240}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryHS12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GerbushLOW12, author = {Michael Gerbush and Allison B. Lewko and Adam O'Neill and Brent Waters}, title = {Dual Form Signatures: An Approach for Proving Security from Static Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {261}, year = {2012}, url = {http://eprint.iacr.org/2012/261}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GerbushLOW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhoshD12, author = {Satrajit Ghosh and Abhijit Das}, title = {Improvements of Algebraic Attacks Based on Structured Gaussian Elimination}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {176}, year = {2012}, url = {http://eprint.iacr.org/2012/176}, timestamp = {Sat, 26 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GhoshD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GierlichsST12, author = {Benedikt Gierlichs and J{\"{o}}rn{-}Marc Schmidt and Michael Tunstall}, title = {Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {678}, year = {2012}, url = {http://eprint.iacr.org/2012/678}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GierlichsST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GiesenKS12, author = {Florian Giesen and Florian Kohlar and Douglas Stebila}, title = {On the Security of {TLS} Renegotiation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {630}, year = {2012}, url = {http://eprint.iacr.org/2012/630}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GiesenKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GligoroskiS12, author = {Danilo Gligoroski and Simona Samardjiska}, title = {The Multivariate Probabilistic Encryption Scheme {MQQ-ENC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {328}, year = {2012}, url = {http://eprint.iacr.org/2012/328}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GligoroskiS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldwasserKPVZ12, author = {Shafi Goldwasser and Yael Tauman Kalai and Raluca A. Popa and Vinod Vaikuntanathan and Nickolai Zeldovich}, title = {Succinct Functional Encryption and Applications: Reusable Garbled Circuits and Beyond}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {733}, year = {2012}, url = {http://eprint.iacr.org/2012/733}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoldwasserKPVZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GongAF12, author = {Guang Gong and Mark D. Aagaard and Xinxin Fan}, title = {Resilience to Distinguishing Attacks on {WG-7} Cipher and Their Generalizations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {681}, year = {2012}, url = {http://eprint.iacr.org/2012/681}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GongAF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GorbunovVW12, author = {Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee}, title = {Functional Encryption with Bounded Collusions via Multi-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {521}, year = {2012}, url = {http://eprint.iacr.org/2012/521}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GorbunovVW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalPS12, author = {Vipul Goyal and Omkant Pandey and Amit Sahai}, title = {Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {652}, year = {2012}, url = {http://eprint.iacr.org/2012/652}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GraepelLN12, author = {Thore Graepel and Kristin E. Lauter and Michael Naehrig}, title = {{ML} Confidential: Machine Learning on Encrypted Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {323}, year = {2012}, url = {http://eprint.iacr.org/2012/323}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GraepelLN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrewalALHJ12, author = {Gurleen Grewal and Reza Azarderakhsh and Patrick Longa and Shi Hu and David Jao}, title = {Efficient Implementation of Bilinear Pairings on {ARM} Processors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {408}, year = {2012}, url = {http://eprint.iacr.org/2012/408}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrewalALHJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrootSVL12, author = {Joep A. de Groot and Boris Skoric and Niels de Vreede and Jean{-}Paul M. G. Linnartz}, title = {Information Leakage of Continuous-Source Zero Secrecy Leakage Helper Data Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {566}, year = {2012}, url = {http://eprint.iacr.org/2012/566}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrootSVL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gu12, author = {Chunsheng Gu}, title = {Attack on Fully Homomorphic Encryption over the Integers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {157}, year = {2012}, url = {http://eprint.iacr.org/2012/157}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gu12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gueron12, author = {Shay Gueron}, title = {A j-lanes tree hashing mode and j-lanes {SHA-256}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {476}, year = {2012}, url = {http://eprint.iacr.org/2012/476}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gueron12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GueronK12, author = {Shay Gueron and Vlad Krasnov}, title = {Parallelizing message schedules to accelerate the computations of hash functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {67}, year = {2012}, url = {http://eprint.iacr.org/2012/067}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GueronK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GueronK12a, author = {Shay Gueron and Vlad Krasnov}, title = {Simultaneous hashing of multiple messages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {371}, year = {2012}, url = {http://eprint.iacr.org/2012/371}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GueronK12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoGZ12, author = {Ying{-}ming Guo and Guang{-}pu Gao and Ya{-}qun Zhao}, title = {Recent Results on Balanced Symmetric Boolean Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {93}, year = {2012}, url = {http://eprint.iacr.org/2012/093}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoGZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoLWH12, author = {Teng Guo and Feng Liu and Chuan Kun Wu and YoungChang Hou}, title = {Using Variance to Analyze Visual Cryptography Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {315}, year = {2012}, url = {http://eprint.iacr.org/2012/315}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoLWH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoMK12, author = {Xiaofei Guo and Debdeep Mukhopadhyay and Ramesh Karri}, title = {Provably Secure Concurrent Error Detection Against Differential Fault Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {552}, year = {2012}, url = {http://eprint.iacr.org/2012/552}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GuoMK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoXSF12, author = {Xiaopei Guo and Kejian Xu and Tongsen Sun and Xiubin Fan}, title = {Analysis of Minimum Numbers of Linearly Active S-Boxes of a Class of Generalized Feistel Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {169}, year = {2012}, url = {http://eprint.iacr.org/2012/169}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoXSF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuptaCK12, author = {Sourav Sen Gupta and Anupam Chattopadhyay and Ayesha Khalid}, title = {Designing Integrated Accelerator for Stream Ciphers with Structural Similarities}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {48}, year = {2012}, url = {http://eprint.iacr.org/2012/048}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GuptaCK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuptaS12, author = {Divya Gupta and Amit Sahai}, title = {On Constant-Round Concurrent Zero-Knowledge from a Knowledge Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {572}, year = {2012}, url = {http://eprint.iacr.org/2012/572}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuptaS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GyorfiCHB12, author = {Tamas Gy{\"{o}}rfi and Octavian Cret and Guillaume Hanrot and Nicolas Brisebarre}, title = {High-Throughput Hardware Architecture for the {SWIFFT} / {SWIFFTX} Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {343}, year = {2012}, url = {http://eprint.iacr.org/2012/343}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GyorfiCHB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HabeebKS12, author = {Maggie E. Habeeb and Delaram Kahrobaei and Vladimir Shpilrain}, title = {A Secret Sharing Scheme Based on Group Presentations and the Word Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {246}, year = {2012}, url = {http://eprint.iacr.org/2012/246}, timestamp = {Tue, 03 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HabeebKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaitnerOZ12, author = {Iftach Haitner and Eran Omri and Hila Zarosim}, title = {On the Power of Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {573}, year = {2012}, url = {http://eprint.iacr.org/2012/573}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaitnerOZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HajiabadiK12, author = {Mohammad Hajiabadi and Bruce M. Kapron}, title = {Computational Soundness of Coinductive Symbolic Security under Active Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {560}, year = {2012}, url = {http://eprint.iacr.org/2012/560}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HajiabadiK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hamburg12, author = {Mike Hamburg}, title = {Fast and compact elliptic-curve cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {309}, year = {2012}, url = {http://eprint.iacr.org/2012/309}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hamburg12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HanWL12, author = {Lidong Han and Wei Wei and Mingjie Liu}, title = {On the Multiple Fault Attack on {RSA} Signatures with LSBs of Messages Unknown}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {491}, year = {2012}, url = {http://eprint.iacr.org/2012/491}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HanWL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HanaokaMS12, author = {Goichiro Hanaoka and Takahiro Matsuda and Jacob C. N. Schuldt}, title = {On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {448}, year = {2012}, url = {http://eprint.iacr.org/2012/448}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HanaokaMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HanleyKT12, author = {Neil Hanley and HeeSeok Kim and Michael Tunstall}, title = {Exploiting Collisions in Addition Chain-based Exponentiation Algorithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {485}, year = {2012}, url = {http://eprint.iacr.org/2012/485}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HanleyKT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaoC12, author = {Feng Hao and Dylan Clarke}, title = {Security Analysis of a Multi-Factor Authenticated Key Exchange Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {39}, year = {2012}, url = {http://eprint.iacr.org/2012/039}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaoC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HayashiSST12, author = {Takuya Hayashi and Takeshi Shimoyama and Naoyuki Shinohara and Tsuyoshi Takagi}, title = {Breaking pairing-based cryptosystems using {\(\eta\)}\({}_{\mbox{T}}\) pairing over GF(3\({}^{\mbox{97}}\))}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {345}, year = {2012}, url = {http://eprint.iacr.org/2012/345}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HayashiSST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HazayLWW12, author = {Carmit Hazay and Adriana L{\'{o}}pez{-}Alt and Hoeteck Wee and Daniel Wichs}, title = {Leakage-Resilient Cryptography from Minimal Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {604}, year = {2012}, url = {http://eprint.iacr.org/2012/604}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HazayLWW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/He12, author = {Debiao He}, title = {Robust biometric-based user authentication scheme for wireless sensor networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {203}, year = {2012}, url = {http://eprint.iacr.org/2012/203}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/He12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/He12a, author = {Debiao He}, title = {Cryptanalysis of a Provably Secure Gateway-Oriented Password-Based Authenticated Key Exchange Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {312}, year = {2012}, url = {http://eprint.iacr.org/2012/312}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/He12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeT12, author = {Debiao He and Miaomiao Tian}, title = {A note on 'An efficient certificateless aggregate signature with constant pairing computations'}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {445}, year = {2012}, url = {http://eprint.iacr.org/2012/445}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HirtLMR12, author = {Martin Hirt and Christoph Lucas and Ueli Maurer and Dominik Raub}, title = {Passive Corruption in Statistical Multi-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {272}, year = {2012}, url = {http://eprint.iacr.org/2012/272}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HirtLMR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hofheinz12, author = {Dennis Hofheinz}, title = {Circular chosen-ciphertext security with compact ciphertexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {150}, year = {2012}, url = {http://eprint.iacr.org/2012/150}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hofheinz12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HofheinzJ12, author = {Dennis Hofheinz and Tibor Jager}, title = {Tightly Secure Signatures and Public-Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {311}, year = {2012}, url = {http://eprint.iacr.org/2012/311}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HofheinzJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HohenbergerLW12, author = {Susan Hohenberger and Allison B. Lewko and Brent Waters}, title = {Detecting Dangerous Queries: {A} New Approach for Chosen Ciphertext Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {6}, year = {2012}, url = {http://eprint.iacr.org/2012/006}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HohenbergerLW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HomsirikamolMRS12, author = {Ekawat Homsirikamol and Pawel Morawiecki and Marcin Rogawski and Marian Srebrny}, title = {Security margin evaluation of {SHA-3} contest finalists through SAT-based attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {421}, year = {2012}, url = {http://eprint.iacr.org/2012/421}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HomsirikamolMRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HongK12, author = {Deukjo Hong and Daesung Kwon}, title = {New Preimage Attack on {MDC-4}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {633}, year = {2012}, url = {http://eprint.iacr.org/2012/633}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HongK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HongK12a, author = {Deukjo Hong and Daesung Kwon}, title = {Cryptanalysis of Double-Block-Length Hash Mode {MJH}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {634}, year = {2012}, url = {http://eprint.iacr.org/2012/634}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HongK12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HsuZCC12, author = {Ching{-}Fang Hsu and Bing Zeng and Qi Cheng and Guohua Cui}, title = {A novel Group Key Transfer Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {43}, year = {2012}, url = {http://eprint.iacr.org/2012/043}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HsuZCC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuW12, author = {Yupu Hu and Fenghe Wang}, title = {An Attack on a Fully Homomorphic Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {561}, year = {2012}, url = {http://eprint.iacr.org/2012/561}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuangL12, author = {Jialin Huang and Xuejia Lai}, title = {Transposition of {AES} Key Schedule}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {260}, year = {2012}, url = {http://eprint.iacr.org/2012/260}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuangL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuangL12a, author = {Jialin Huang and Xuejia Lai}, title = {Revisiting Key Schedule's Diffusion In Relation With Round Function's Diffusion}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {415}, year = {2012}, url = {http://eprint.iacr.org/2012/415}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuangL12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuangL12b, author = {Jialin Huang and Xuejia Lai}, title = {What is the Effective Key Length for a Block Cipher: an Attack on Every Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {677}, year = {2012}, url = {http://eprint.iacr.org/2012/677}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuangL12b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuangLQ12, author = {Zhengan Huang and Shengli Liu and Baodong Qin}, title = {Sender Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {473}, year = {2012}, url = {http://eprint.iacr.org/2012/473}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuangLQ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuangLY12, author = {Yun{-}Ju Huang and Feng{-}Hao Liu and Bo{-}Yin Yang}, title = {Public-Key Cryptography from New Multivariate Quadratic Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {273}, year = {2012}, url = {http://eprint.iacr.org/2012/273}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuangLY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Iftene12, author = {Sorin Iftene}, title = {Some Connections Between Primitive Roots and Quadratic Non-Residues Modulo a Prime}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {470}, year = {2012}, url = {http://eprint.iacr.org/2012/470}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Iftene12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ionica12, author = {Sorina Ionica}, title = {Pairing-based algorithms for jacobians of genus 2 curves with maximal endomorphism ring}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {167}, year = {2012}, url = {http://eprint.iacr.org/2012/167}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ionica12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ishiguro12, author = {Tsukasa Ishiguro}, title = {Modified version of "Latin Dances Revisited: New Analytic Results of Salsa20 and ChaCha"}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {65}, year = {2012}, url = {http://eprint.iacr.org/2012/065}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ishiguro12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IwataOM12, author = {Tetsu Iwata and Keisuke Ohashi and Kazuhiko Minematsu}, title = {Breaking and Repairing {GCM} Security Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {438}, year = {2012}, url = {http://eprint.iacr.org/2012/438}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IwataOM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JainORV12, author = {Abhishek Jain and Rafail Ostrovsky and Silas Richelson and Ivan Visconti}, title = {Concurrent Zero Knowledge in the Bounded Player Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {279}, year = {2012}, url = {http://eprint.iacr.org/2012/279}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JainORV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Jeong12, author = {Kitae Jeong}, title = {Differential Fault Analysis on Block Cipher Piccolo}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {399}, year = {2012}, url = {http://eprint.iacr.org/2012/399}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Jeong12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JeongKLSH12, author = {Kitae Jeong and HyungChul Kang and Changhoon Lee and Jaechul Sung and Seokhie Hong}, title = {Biclique Cryptanalysis of Lightweight Block Ciphers PRESENT, Piccolo and {LED}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {621}, year = {2012}, url = {http://eprint.iacr.org/2012/621}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JeongKLSH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JiangD12, author = {Yupeng Jiang and Yingpu Deng}, title = {New results on nonexistence of generalized bent functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {467}, year = {2012}, url = {http://eprint.iacr.org/2012/467}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JiangD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Joux12, author = {Antoine Joux}, title = {Faster index calculus for the medium prime case. Application to 1175-bit and 1425-bit finite fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {720}, year = {2012}, url = {http://eprint.iacr.org/2012/720}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Joux12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JovanovicKP12, author = {Philipp Jovanovic and Martin Kreuzer and Ilia Polian}, title = {An Algebraic Fault Attack on the {LED} Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {400}, year = {2012}, url = {http://eprint.iacr.org/2012/400}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JovanovicKP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JutlaY12, author = {Charanjit S. Jutla and Moti Yung}, title = {PayTree: "Amortized Signature" for Flexible Micro-Payments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {10}, year = {2012}, url = {http://eprint.iacr.org/2012/010}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JutlaY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KVR12, author = {K. Preetha Mathew and Sachin Vasant and C. Pandu Rangan}, title = {On Provably Secure Code-Based Signature and Signcryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {585}, year = {2012}, url = {http://eprint.iacr.org/2012/585}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KVR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KalyanaramanO12, author = {Mukund Kalyanaraman and Michael Orshansky}, title = {Highly Secure Strong {PUF} based on Nonlinearity of {MOSFET} Subthreshold Operation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {413}, year = {2012}, url = {http://eprint.iacr.org/2012/413}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KalyanaramanO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KamaraMR12, author = {Seny Kamara and Payman Mohassel and Ben Riva}, title = {Salus: {A} System for Server-Aided Secure Function Evaluation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {542}, year = {2012}, url = {http://eprint.iacr.org/2012/542}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KamaraMR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KamaraPR12, author = {Seny Kamara and Charalampos Papamanthou and Tom Roeder}, title = {Dynamic Searchable Symmetric Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {530}, year = {2012}, url = {http://eprint.iacr.org/2012/530}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KamaraPR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kar12, author = {Jayaprakash Kar}, title = {Provably Secure Online/Off-line Identity-Based Signature Scheme for Wireless Sensor Network}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {162}, year = {2012}, url = {http://eprint.iacr.org/2012/162}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kar12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kar12a, author = {Jayaprakash Kar}, title = {An Efficient Signcryption Scheme from q-Diffie-Hellman Problems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {483}, year = {2012}, url = {http://eprint.iacr.org/2012/483}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kar12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KarameAC12, author = {Ghassan Karame and Elli Androulaki and Srdjan Capkun}, title = {Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {248}, year = {2012}, url = {http://eprint.iacr.org/2012/248}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KarameAC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KaratiDC12, author = {Sabyasachi Karati and Abhijit Das and Dipanwita Roy Chowdhury}, title = {Using Randomizers for Batch Verification of {ECDSA} Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {582}, year = {2012}, url = {http://eprint.iacr.org/2012/582}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KaratiDC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kasahara12, author = {Masao Kasahara}, title = {Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XV)SE(2)PKC, Realizing Coding Rate of Exactly 1.0}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {79}, year = {2012}, url = {http://eprint.iacr.org/2012/079}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kasahara12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kasahara12a, author = {Masao Kasahara}, title = {Construction of New Classes of Knapsack Type Public Key Cryptosystem Using Uniform Secret Sequence, K(II){\(\Sigma\)}{\(\Pi\)}PKC, Constructed Based on Maximum Length Code}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {344}, year = {2012}, url = {http://eprint.iacr.org/2012/344}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kasahara12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KateHG12, author = {Aniket Kate and Yizhou Huang and Ian Goldberg}, title = {Distributed Key Generation in the Wild}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {377}, year = {2012}, url = {http://eprint.iacr.org/2012/377}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KateHG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KatzenbeisserKRSVW12, author = {Stefan Katzenbeisser and {\"{U}}nal Ko{\c{c}}abas and Vladimir Rozic and Ahmad{-}Reza Sadeghi and Ingrid Verbauwhede and Christian Wachsmann}, title = {PUFs: Myth, Fact or Busted? {A} Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon (Extended Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {557}, year = {2012}, url = {http://eprint.iacr.org/2012/557}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KatzenbeisserKRSVW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KellerMR12, author = {Marcel Keller and Gert L{\ae}ss{\o}e Mikkelsen and Andy Rupp}, title = {Efficient Threshold Zero-Knowledge with Applications to User-Centric Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {306}, year = {2012}, url = {http://eprint.iacr.org/2012/306}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KellerMR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KendallKK12, author = {Ed Kendall and Michelle Kendall and Wilfrid S. Kendall}, title = {A Generalised Formula for Calculating the Resilience of Random Key Predistribution Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {426}, year = {2012}, url = {http://eprint.iacr.org/2012/426}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KendallKK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KendallMNPS12, author = {Michelle Kendall and Keith M. Martin and Siaw{-}Lynn Ng and Maura B. Paterson and Douglas R. Stinson}, title = {Broadcast-enhanced Key Predistribution Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {295}, year = {2012}, url = {http://eprint.iacr.org/2012/295}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KendallMNPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhazaeiTW12, author = {Shahram Khazaei and Bj{\"{o}}rn Terelius and Douglas Wikstr{\"{o}}m}, title = {Cryptanalysis of a Universally Verifiable Efficient Re-encryption Mixnet}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {100}, year = {2012}, url = {http://eprint.iacr.org/2012/100}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhazaeiTW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhazaeiW12, author = {Shahram Khazaei and Douglas Wikstr{\"{o}}m}, title = {Randomized Partial Checking Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {63}, year = {2012}, url = {http://eprint.iacr.org/2012/063}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhazaeiW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Khovratovich12, author = {Dmitry Khovratovich}, title = {Bicliques for permutations: collision and preimage attacks in stronger settings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {141}, year = {2012}, url = {http://eprint.iacr.org/2012/141}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Khovratovich12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiltzPS12, author = {Eike Kiltz and Krzysztof Pietrzak and Mario Szegedy}, title = {Digital Signatures with Minimal Overhead}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {658}, year = {2012}, url = {http://eprint.iacr.org/2012/658}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiltzPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimC12, author = {Taechan Kim and Jung Hee Cheon}, title = {A New Approach to Discrete Logarithm Problem with Auxiliary Inputs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {609}, year = {2012}, url = {http://eprint.iacr.org/2012/609}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimC12a, author = {Sungwook Kim and Jung Hee Cheon}, title = {Fixed Argument Pairing Inversion on Elliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {657}, year = {2012}, url = {http://eprint.iacr.org/2012/657}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimC12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimH12, author = {Byoung{-}Il Kim and Jin Hong}, title = {Analysis of the Non-Perfect Table Fuzzy Rainbow Tradeoff}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {612}, year = {2012}, url = {http://eprint.iacr.org/2012/612}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimKC12, author = {Taechan Kim and Sungwook Kim and Jung Hee Cheon}, title = {Accelerating the Final Exponentiation in the Computation of the Tate Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {119}, year = {2012}, url = {http://eprint.iacr.org/2012/119}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimKC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimKC12a, author = {Myungsun Kim and Jihye Kim and Jung Hee Cheon}, title = {Compress Multiple Ciphertexts Using ElGamal Encryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {243}, year = {2012}, url = {http://eprint.iacr.org/2012/243}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimKC12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimKC12b, author = {Myungsun Kim and Jinsu Kim and Jung Hee Cheon}, title = {A Public Shuffle without Private Permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {301}, year = {2012}, url = {http://eprint.iacr.org/2012/301}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimKC12b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimMCK12, author = {Myungsun Kim and Abedelaziz Mohaisen and Jung Hee Cheon and Yongdae Kim}, title = {Private Top-k Aggregation Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {538}, year = {2012}, url = {http://eprint.iacr.org/2012/538}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimMCK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KipnisH12, author = {Aviad Kipnis and Eliphaz Hibshoosh}, title = {Efficient Methods for Practical Fully Homomorphic Symmetric-key Encrypton, Randomization and Verification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {637}, year = {2012}, url = {http://eprint.iacr.org/2012/637}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KipnisH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KircanskiY12, author = {Aleksandar Kircanski and Amr M. Youssef}, title = {Boomerang and Slide-Rotational Analysis of the {SM3} Hash Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {274}, year = {2012}, url = {http://eprint.iacr.org/2012/274}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KircanskiY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KnellwolfK12, author = {Simon Knellwolf and Dmitry Khovratovich}, title = {New Preimage Attacks Against Reduced {SHA-1}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {440}, year = {2012}, url = {http://eprint.iacr.org/2012/440}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KnellwolfK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Knobloch12, author = {Hans{-}Joachim Knobloch}, title = {Breaking Public Keys - How to Determine an Unknown {RSA} Public Modulus}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {588}, year = {2012}, url = {http://eprint.iacr.org/2012/588}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Knobloch12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KoblitzM12, author = {Neal Koblitz and Alfred Menezes}, title = {Another look at {HMAC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {74}, year = {2012}, url = {http://eprint.iacr.org/2012/074}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KoblitzM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KoblitzM12a, author = {Neal Koblitz and Alfred Menezes}, title = {Another look at non-uniformity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {359}, year = {2012}, url = {http://eprint.iacr.org/2012/359}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KoblitzM12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KoenigH12, author = {Reto E. Koenig and Rolf Haenni}, title = {How to Store some Secrets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {375}, year = {2012}, url = {http://eprint.iacr.org/2012/375}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KoenigH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KopfMO12, author = {Boris K{\"{o}}pf and Laurent Mauborgne and Mart{\'{\i}}n Ochoa}, title = {Automatic Quantification of Cache Side-Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {34}, year = {2012}, url = {http://eprint.iacr.org/2012/034}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KopfMO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KovtunO12, author = {Vladyslav Kovtun and Andrew Okhrimenko}, title = {Approaches for the performance increasing of software implementation of integer multiplication in prime fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {170}, year = {2012}, url = {http://eprint.iacr.org/2012/170}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KovtunO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KovtunO12a, author = {Vladyslav Kovtun and Andrew Okhrimenko}, title = {Approaches for the Parallelization of Software Implementation of Integer Multiplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {482}, year = {2012}, url = {http://eprint.iacr.org/2012/482}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KovtunO12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KremerKS12, author = {Steve Kremer and Robert K{\"{u}}nnemann and Graham Steel}, title = {Universally Composable Key-Management}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {189}, year = {2012}, url = {http://eprint.iacr.org/2012/189}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KremerKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KreuterSS12, author = {Benjamin Kreuter and Abhi Shelat and Chih{-}Hao Shen}, title = {Towards Billion-Gate Secure Computation with Malicious Adversaries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {179}, year = {2012}, url = {http://eprint.iacr.org/2012/179}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KreuterSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KumarasubramanianOPW12, author = {Abishek Kumarasubramanian and Rafail Ostrovsky and Omkant Pandey and Akshay Wadia}, title = {Cryptography Using {CAPTCHA} Puzzles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {689}, year = {2012}, url = {http://eprint.iacr.org/2012/689}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KumarasubramanianOPW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KunduAB12, author = {Ashish Kundu and Mikhail J. Atallah and Elisa Bertino}, title = {Efficient Leakage-free Authentication of Trees, Graphs and Forests}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {36}, year = {2012}, url = {http://eprint.iacr.org/2012/036}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KunduAB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KunduB12, author = {Ashish Kundu and Elisa Bertino}, title = {On Hashing Graphs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {352}, year = {2012}, url = {http://eprint.iacr.org/2012/352}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KunduB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KunihiroSI12, author = {Noboru Kunihiro and Naoyuki Shinohara and Tetsuya Izu}, title = {Recovering {RSA} Secret Keys from Noisy Key Bits with Erasures and Errors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {701}, year = {2012}, url = {http://eprint.iacr.org/2012/701}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KunihiroSI12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kupu12, author = {Alptekin K{\"{u}}p{\c{c}}{\"{u}}}, title = {Official Arbitration and its Application to Secure Cloud Storage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {276}, year = {2012}, url = {http://eprint.iacr.org/2012/276}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kupu12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KurosawaNP12, author = {Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong}, title = {Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {213}, year = {2012}, url = {http://eprint.iacr.org/2012/213}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KurosawaNP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KurosawaNP12a, author = {Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong}, title = {New Leakage Resilient CCA-Secure Public Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {453}, year = {2012}, url = {http://eprint.iacr.org/2012/453}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KurosawaNP12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KustersTG12, author = {Ralf K{\"{u}}sters and Tomasz Truderung and Juergen Graf}, title = {A Framework for the Cryptographic Verification of Java-like Programs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {153}, year = {2012}, url = {http://eprint.iacr.org/2012/153}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KustersTG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KustersTV12, author = {Ralf K{\"{u}}sters and Tomasz Truderung and Andreas Vogt}, title = {Clash Attacks on the Verifiability of E-Voting Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {116}, year = {2012}, url = {http://eprint.iacr.org/2012/116}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KustersTV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KutylowskiG12, author = {Miroslaw Kutylowski and Maciej Gebala}, title = {Optimizing Segment Based Document Protection (Corrected Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {520}, year = {2012}, url = {http://eprint.iacr.org/2012/520}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KutylowskiG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KutznerNP12, author = {Sebastian Kutzner and Phuong Ha Nguyen and Axel Poschmann}, title = {Enabling 3-share Threshold Implementations for any 4-bit S-box}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {510}, year = {2012}, url = {http://eprint.iacr.org/2012/510}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KutznerNP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KutznerNPW12, author = {Sebastian Kutzner and Phuong Ha Nguyen and Axel Poschmann and Huaxiong Wang}, title = {On 3-share Threshold Implementations for 4-bit S-boxes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {509}, year = {2012}, url = {http://eprint.iacr.org/2012/509}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KutznerNPW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LaarhovenPW12, author = {Thijs Laarhoven and Joop van de Pol and Benne de Weger}, title = {Solving Hard Lattice Problems and the Security of Lattice-Based Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {533}, year = {2012}, url = {http://eprint.iacr.org/2012/533}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LaarhovenPW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LacharmeRSV12, author = {Patrick Lacharme and Andrea R{\"{o}}ck and Vincent Strubel and Marion Videau}, title = {The Linux Pseudorandom Number Generator Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {251}, year = {2012}, url = {http://eprint.iacr.org/2012/251}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LacharmeRSV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LampeP12, author = {Rodolphe Lampe and Jacques Patarin}, title = {Security of Feistel Schemes with New and Various Tools}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {131}, year = {2012}, url = {http://eprint.iacr.org/2012/131}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LampeP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LandaisS12, author = {Gr{\'{e}}gory Landais and Nicolas Sendrier}, title = {{CFS} Software Implementation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {132}, year = {2012}, url = {http://eprint.iacr.org/2012/132}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LandaisS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LandeckerST12, author = {Will Landecker and Thomas Shrimpton and R. Seth Terashima}, title = {Tweakable Blockciphers with Beyond Birthday-Bound Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {450}, year = {2012}, url = {http://eprint.iacr.org/2012/450}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LandeckerST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LangloisS12, author = {Adeline Langlois and Damien Stehl{\'{e}}}, title = {Worst-Case to Average-Case Reductions for Module Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {90}, year = {2012}, url = {http://eprint.iacr.org/2012/090}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LangloisS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LauterR12, author = {Kristin E. Lauter and Damien Robert}, title = {Improved {CRT} Algorithm for Class Polynomials in Genus 2}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {443}, year = {2012}, url = {http://eprint.iacr.org/2012/443}, timestamp = {Wed, 16 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LauterR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LauterV12, author = {Kristin E. Lauter and Bianca Viray}, title = {An arithmetic intersection formula for denominators of Igusa class polynomials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {614}, year = {2012}, url = {http://eprint.iacr.org/2012/614}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LauterV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeH12, author = {Ga Won Lee and Jin Hong}, title = {A Comparison of Perfect Table Cryptanalytic Tradeoff Algorithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {540}, year = {2012}, url = {http://eprint.iacr.org/2012/540}, timestamp = {Wed, 18 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LeeH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeHC12, author = {Hyung Tae Lee and Hyunsook Hong and Jung Hee Cheon}, title = {Invertible Polynomial Representation for Private Set Operations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {526}, year = {2012}, url = {http://eprint.iacr.org/2012/526}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeHC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeKH12, author = {Kwangsu Lee and Intae Kim and Seong Oun Hwang}, title = {Privacy Preserving Revocable Predicate Encryption Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {655}, year = {2012}, url = {http://eprint.iacr.org/2012/655}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeKH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeLY12, author = {Kwangsu Lee and Dong Hoon Lee and Moti Yung}, title = {Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {518}, year = {2012}, url = {http://eprint.iacr.org/2012/518}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeLY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeLY12a, author = {Kwangsu Lee and Dong Hoon Lee and Moti Yung}, title = {Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {562}, year = {2012}, url = {http://eprint.iacr.org/2012/562}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeLY12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LenstraHABKW12, author = {Arjen K. Lenstra and James P. Hughes and Maxime Augier and Joppe W. Bos and Thorsten Kleinjung and Christophe Wachter}, title = {Ron was wrong, Whit is right}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {64}, year = {2012}, url = {http://eprint.iacr.org/2012/064}, timestamp = {Mon, 29 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LenstraHABKW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LermanMVMBM12, author = {Liran Lerman and Stephane Fernandes Medeiros and Nikita Veshchikov and C{\'{e}}dric Meuter and Gianluca Bontempi and Olivier Markowitch}, title = {Semi-Supervised Template Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {82}, year = {2012}, url = {http://eprint.iacr.org/2012/082}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LermanMVMBM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Leurent12, author = {Ga{\"{e}}tan Leurent}, title = {Construction of Differential Characteristics in {ARX} Designs - Application to Skein}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {668}, year = {2012}, url = {http://eprint.iacr.org/2012/668}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Leurent12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Leurent12a, author = {Ga{\"{e}}tan Leurent}, title = {Cryptanalysis of {WIDEA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {707}, year = {2012}, url = {http://eprint.iacr.org/2012/707}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Leurent12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Leurent12b, author = {Ga{\"{e}}tan Leurent}, title = {Time-memory Trade-offs for Near-collisions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {731}, year = {2012}, url = {http://eprint.iacr.org/2012/731}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Leurent12b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LewkoW12, author = {Allison B. Lewko and Brent Waters}, title = {New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {326}, year = {2012}, url = {http://eprint.iacr.org/2012/326}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LewkoW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Li0LJWS12, author = {Jin Li and Xiaofeng Chen and Jingwei Li and Chunfu Jia and Duncan S. Wong and Willy Susilo}, title = {Secure Outsourced Attribute-Based Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {605}, year = {2012}, url = {http://eprint.iacr.org/2012/605}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Li0LJWS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Li12a, author = {Xin Li}, title = {Non-Malleable Extractors, Two-Source Extractors and Privacy Amplification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {188}, year = {2012}, url = {http://eprint.iacr.org/2012/188}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Li12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiCX12, author = {Yin Li and Gongliang Chen and Xiao{-}ning Xie}, title = {Low complexity bit-parallel GF(2\({}^{\mbox{m}}\)) multiplier for all-one polynomials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {414}, year = {2012}, url = {http://eprint.iacr.org/2012/414}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiCX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiLZC12, author = {Qiang Li and Xiangxue Li and Dong Zheng and Kefei Chen}, title = {Optimal Multiple Assignments with (m, m)-Scheme for General Access Structures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {7}, year = {2012}, url = {http://eprint.iacr.org/2012/007}, timestamp = {Thu, 16 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiLZC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiLZHC12, author = {Qiang Li and Xiangxue Li and Dong Zheng and Zheng Huang and Kefei Chen}, title = {On the Equivalence between the Set Covering Problem and the Problem of Finding Optimal Cumulative Assignment Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {245}, year = {2012}, url = {http://eprint.iacr.org/2012/245}, timestamp = {Thu, 16 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiLZHC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiWZ12, author = {Liangze Li and Hongfeng Wu and Fan Zhang}, title = {Pairing computation on Edwards curves with high-degree twists}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {532}, year = {2012}, url = {http://eprint.iacr.org/2012/532}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiWZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiWZ12a, author = {Liangze Li and Hongfeng Wu and Fan Zhang}, title = {Faster Pairing Computation on Jacobi quartic Curves with High-Degree Twists}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {551}, year = {2012}, url = {http://eprint.iacr.org/2012/551}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiWZ12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertPY12, author = {Beno{\^{\i}}t Libert and Thomas Peters and Moti Yung}, title = {Scalable Group Signatures with Revocation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {424}, year = {2012}, url = {http://eprint.iacr.org/2012/424}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LibertPY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertPY12a, author = {Beno{\^{\i}}t Libert and Thomas Peters and Moti Yung}, title = {Group Signatures with Almost-for-free Revocation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {442}, year = {2012}, url = {http://eprint.iacr.org/2012/442}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LibertPY12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LimniotisKK12, author = {Konstantinos Limniotis and Nicholas Kolokotronis and Nicholas Kalouptsidis}, title = {Modifying Boolean Functions to Ensure Maximum Algebraic Immunity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {46}, year = {2012}, url = {http://eprint.iacr.org/2012/046}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LimniotisKK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LindellNO12, author = {Yehuda Lindell and Kobbi Nissim and Claudio Orlandi}, title = {Hiding the Input-Size in Secure Two-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {679}, year = {2012}, url = {http://eprint.iacr.org/2012/679}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LindellNO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LindellZ12, author = {Yehuda Lindell and Hila Zarosim}, title = {On the Feasibility of Extending Oblivious Transfer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {333}, year = {2012}, url = {http://eprint.iacr.org/2012/333}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LindellZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LingNSW12, author = {San Ling and Khoa Nguyen and Damien Stehl{\'{e}} and Huaxiong Wang}, title = {Improved Zero-knowledge Proofs of Knowledge for the {ISIS} Problem, and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {569}, year = {2012}, url = {http://eprint.iacr.org/2012/569}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LingNSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LipmaaZ12, author = {Helger Lipmaa and Bingsheng Zhang}, title = {New Non-Interactive Zero-Knowledge Subset Sum, Decision Knapsack And Range Arguments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {548}, year = {2012}, url = {http://eprint.iacr.org/2012/548}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LipmaaZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuASZ12, author = {Joseph K. Liu and Man Ho Au and Willy Susilo and Jianying Zhou}, title = {Enhancing Location Privacy for Electric Vehicles (at the right time)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {342}, year = {2012}, url = {http://eprint.iacr.org/2012/342}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuASZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuCW12, author = {Zhen Liu and Zhenfu Cao and Duncan S. Wong}, title = {Expressive Black-box Traceable Ciphertext-Policy Attribute-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {669}, year = {2012}, url = {http://eprint.iacr.org/2012/669}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuCW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuGLL12, author = {Ya Liu and Dawu Gu and Zhiqiang Liu and Wei Li}, title = {Improved Impossible Differential Attack on Reduced Version of Camellia-192/256}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {594}, year = {2012}, url = {http://eprint.iacr.org/2012/594}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuGLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuL12, author = {Feng{-}Hao Liu and Anna Lysyanskaya}, title = {Tamper and Leakage Resilience in the Split-State Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {297}, year = {2012}, url = {http://eprint.iacr.org/2012/297}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuY12, author = {Rock C. Liu and Zhiwi Yeh}, title = {Estimating the {\(\varphi\)}(n) of Upper/Lower Bound in its {RSA} Cryptosystem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {666}, year = {2012}, url = {http://eprint.iacr.org/2012/666}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuZL12, author = {Meicheng Liu and Yin Zhang and Dongdai Lin}, title = {Perfect Algebraic Immune Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {212}, year = {2012}, url = {http://eprint.iacr.org/2012/212}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuZL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuZL12a, author = {Meicheng Liu and Yin Zhang and Dongdai Lin}, title = {On the immunity of Boolean functions against fast algebraic attacks using bivariate polynomial representation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {498}, year = {2012}, url = {http://eprint.iacr.org/2012/498}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuZL12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuZYC12, author = {Chang Liu and Xuyun Zhang and Chi Yang and Jinjun Chen}, title = {{CCBKE} - Session Key Negotiation for Fast and Secure Scheduling of Scientific Applications in Cloud Computing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {385}, year = {2012}, url = {http://eprint.iacr.org/2012/385}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuZYC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LoebenbergerN12, author = {Daniel Loebenberger and Michael N{\"{u}}sken}, title = {Coarse-grained integer - Smooth? Rough? Both!}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {639}, year = {2012}, url = {http://eprint.iacr.org/2012/639}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LoebenbergerN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LorchMPRS12, author = {Jacob R. Lorch and James W. Mickens and Bryan Parno and Mariana Raykova and Joshua Schiffman}, title = {Toward Practical Private Access to Data Centers via Parallel {ORAM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {133}, year = {2012}, url = {http://eprint.iacr.org/2012/133}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LorchMPRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LouHTX12, author = {Yu Lou and Huiting Han and Chunming Tang and Maozhi Xu}, title = {Constructing Vectorial Boolean Functions with High Algebraic Immunity Based on Group Decomposition}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {335}, year = {2012}, url = {http://eprint.iacr.org/2012/335}, timestamp = {Mon, 25 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LouHTX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuO12, author = {Steve Lu and Rafail Ostrovsky}, title = {How to Garble {RAM} Programs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {601}, year = {2012}, url = {http://eprint.iacr.org/2012/601}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LuO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuYW12, author = {Jiqiang Lu and Wun{-}She Yap and Yongzhuang Wei}, title = {Weak Keys of the Full {MISTY1} Block Cipher for Related-Key Cryptanalysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {66}, year = {2012}, url = {http://eprint.iacr.org/2012/066}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuYW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuykxAMP12, author = {Atul Luykx and Elena Andreeva and Bart Mennink and Bart Preneel}, title = {Impossibility Results for Indifferentiability with Resets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {644}, year = {2012}, url = {http://eprint.iacr.org/2012/644}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuykxAMP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LyubashevskyPR12, author = {Vadim Lyubashevsky and Chris Peikert and Oded Regev}, title = {On Ideal Lattices and Learning with Errors Over Rings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {230}, year = {2012}, url = {http://eprint.iacr.org/2012/230}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LyubashevskyPR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaghrebiCGD12, author = {Houssem Maghrebi and Claude Carlet and Sylvain Guilley and Jean{-}Luc Danger}, title = {Optimal First-Order Masking with Linear and Non-Linear Bijections}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {175}, year = {2012}, url = {http://eprint.iacr.org/2012/175}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaghrebiCGD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaghrebiPGD12, author = {Houssem Maghrebi and Emmanuel Prouff and Sylvain Guilley and Jean{-}Luc Danger}, title = {A First-Order Leak-Free Masking Countermeasure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {28}, year = {2012}, url = {http://eprint.iacr.org/2012/028}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaghrebiPGD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MahmoodyP12, author = {Mohammad Mahmoody and Rafael Pass}, title = {The Curious Case of Non-Interactive Commitments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {523}, year = {2012}, url = {http://eprint.iacr.org/2012/523}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MahmoodyP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MahmoodyX12, author = {Mohammad Mahmoody and David Xiao}, title = {Languages with Efficient Zero-Knowledge PCP's are in {SZK}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {229}, year = {2012}, url = {http://eprint.iacr.org/2012/229}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MahmoodyX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Malik12, author = {Muhammad Yasir Malik}, title = {Efficient Group Key Management Schemes for Multicast Dynamic Communication Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {628}, year = {2012}, url = {http://eprint.iacr.org/2012/628}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Malik12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ManulisPS12, author = {Mark Manulis and Bertram Poettering and Douglas Stebila}, title = {Plaintext Awareness in Identity-Based Key Encapsulation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {559}, year = {2012}, url = {http://eprint.iacr.org/2012/559}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ManulisPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Martinez-PelaezR12, author = {Rafael Mart{\'{\i}}nez{-}Pel{\'{a}}ez and Francisco Rico{-}Novella}, title = {Cryptanalysis of Sood et al.'s Authentication Scheme using Smart Cards}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {386}, year = {2012}, url = {http://eprint.iacr.org/2012/386}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Martinez-PelaezR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Martinez-PelaezR12a, author = {Rafael Mart{\'{\i}}nez{-}Pel{\'{a}}ez and Francisco Rico{-}Novella}, title = {Weaknesses of an Improvement Authentication Scheme using}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {418}, year = {2012}, url = {http://eprint.iacr.org/2012/418}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Martinez-PelaezR12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MatherO12, author = {Luke Mather and Elisabeth Oswald}, title = {Quantifying Side-Channel Information Leakage from Web Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {269}, year = {2012}, url = {http://eprint.iacr.org/2012/269}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MatherO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MayberryBC12, author = {Travis Mayberry and Erik{-}Oliver Blass and Agnes Hui Chan}, title = {{PIRMAP:} Efficient Private Information Retrieval for MapReduce}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {398}, year = {2012}, url = {http://eprint.iacr.org/2012/398}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MayberryBC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MazumdarMS12, author = {Bodhisatwa Mazumdar and Debdeep Mukhopadhyay and Indranil Sengupta}, title = {Constrained Search for a Class of Good S-Boxes with Improved {DPA} Resistivity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {547}, year = {2012}, url = {http://eprint.iacr.org/2012/547}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MazumdarMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/McGrew12, author = {David A. McGrew}, title = {Impossible plaintext cryptanalysis and probable-plaintext collision attacks of 64-bit block cipher modes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {623}, year = {2012}, url = {http://eprint.iacr.org/2012/623}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/McGrew12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MeiklejohnEKHL12, author = {Sarah Meiklejohn and C. Christopher Erway and Alptekin K{\"{u}}p{\c{c}}{\"{u}} and Theodora Hinkle and Anna Lysyanskaya}, title = {{ZKPDL:} {A} Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {226}, year = {2012}, url = {http://eprint.iacr.org/2012/226}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MeiklejohnEKHL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MendelRTV12, author = {Florian Mendel and Vincent Rijmen and Deniz Toz and Kerem Varici}, title = {Differential Analysis of the {LED} Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {544}, year = {2012}, url = {http://eprint.iacr.org/2012/544}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MendelRTV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Mennink12, author = {Bart Mennink}, title = {On the Collision and Preimage Security of {MDC-4} in the Ideal Cipher Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {113}, year = {2012}, url = {http://eprint.iacr.org/2012/113}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Mennink12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MesnagerF12, author = {Sihem Mesnager and Jean{-}Pierre Flori}, title = {A note on hyper-bent functions via Dillon-like exponents}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {33}, year = {2012}, url = {http://eprint.iacr.org/2012/033}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MesnagerF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MinematsuMI12, author = {Kazuhiko Minematsu and Hiraku Morita and Tetsu Iwata}, title = {Cryptanalysis of EAXprime}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {18}, year = {2012}, url = {http://eprint.iacr.org/2012/018}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MinematsuMI12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MironovPRS12, author = {Ilya Mironov and Omkant Pandey and Omer Reingold and Gil Segev}, title = {Incremental Deterministic Public-Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {47}, year = {2012}, url = {http://eprint.iacr.org/2012/047}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MironovPRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MisoczkiTSB12, author = {Rafael Misoczki and Jean{-}Pierre Tillich and Nicolas Sendrier and Paulo S. L. M. Barreto}, title = {MDPC-McEliece: New McEliece Variants from Moderate Density Parity-Check Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {409}, year = {2012}, url = {http://eprint.iacr.org/2012/409}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MisoczkiTSB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MitchellSSZ12, author = {John C. Mitchell and Rahul Sharma and Deian Stefan and Joe Zimmerman}, title = {Information-flow control for programming on encrypted data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {205}, year = {2012}, url = {http://eprint.iacr.org/2012/205}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MitchellSSZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Mittelbach12, author = {Arno Mittelbach}, title = {Hash Combiners for Second Pre-Image Resistance, Target Collision Resistance and Pre-Image Resistance have Long Output}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {354}, year = {2012}, url = {http://eprint.iacr.org/2012/354}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Mittelbach12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MohamedBZHW12, author = {Mohamed Saied Emam Mohamed and Stanislav Bulygin and Michael Zohner and Annelie Heuser and Michael Walter}, title = {Improved Algebraic Side-Channel Attack on {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {84}, year = {2012}, url = {http://eprint.iacr.org/2012/084}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MohamedBZHW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoodyPS12, author = {Dustin Moody and Souradyuti Paul and Daniel Smith{-}Tone}, title = {Improved Indifferentiability Security Bound for the {JH} Mode}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {278}, year = {2012}, url = {http://eprint.iacr.org/2012/278}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoodyPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoradiM12, author = {Amir Moradi and Oliver Mischke}, title = {On the Simplicity of Converting Leakages from Multivariate to Univariate - Case Study of a Glitch-Resistant Masking Scheme -}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {472}, year = {2012}, url = {http://eprint.iacr.org/2012/472}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoradiM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MorawieckiPS12, author = {Pawel Morawiecki and Josef Pieprzyk and Marian Srebrny}, title = {Rotational cryptanalysis of round-reduced Keccak}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {546}, year = {2012}, url = {http://eprint.iacr.org/2012/546}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MorawieckiPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoscaSU12, author = {Michele Mosca and Douglas Stebila and Berkant Ustaoglu}, title = {Quantum Key Distribution in the Classical Authenticated Key Exchange Framework}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {361}, year = {2012}, url = {http://eprint.iacr.org/2012/361}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoscaSU12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Murphy12, author = {Julian P. Murphy}, title = {Asynchronous Physical Unclonable Functions - AsyncPUF}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {662}, year = {2012}, url = {http://eprint.iacr.org/2012/662}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Murphy12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MyasnikovU12, author = {Alex D. Myasnikov and Alexander Ushakov}, title = {Quantum algorithm for the discrete logarithm problem for matrices over finite group rings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {574}, year = {2012}, url = {http://eprint.iacr.org/2012/574}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MyasnikovU12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MyasnikovU12a, author = {Alex D. Myasnikov and Alexander Ushakov}, title = {Cryptanalysis of matrix conjugation schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {694}, year = {2012}, url = {http://eprint.iacr.org/2012/694}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MyasnikovU12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NachefPV12, author = {Val{\'{e}}rie Nachef and Jacques Patarin and Emmanuel Volte}, title = {Zero-Knowledge for Multivariate Polynomials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {239}, year = {2012}, url = {http://eprint.iacr.org/2012/239}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NachefPV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NagarA12, author = {Sami A. Nagar and Saad Alshamma}, title = {Efficient Implementation of {RSA} Algorithm with {MKE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {539}, year = {2012}, url = {http://eprint.iacr.org/2012/539}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NagarA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Naito12, author = {Yusuke Naito}, title = {On the Indifferentiable Hash Functions in the Multi-Stage Security Games}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {14}, year = {2012}, url = {http://eprint.iacr.org/2012/014}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Naito12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NeupaneSC12, author = {Kashi Neupane and Rainer Steinwandt and Adriana Su{\'{a}}rez Corona}, title = {Scalable Deniable Group Key Establishment}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {504}, year = {2012}, url = {http://eprint.iacr.org/2012/504}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NeupaneSC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NevesA12, author = {Samuel Neves and Jean{-}Philippe Aumasson}, title = {Implementing {BLAKE} with AVX, AVX2, and {XOP}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {275}, year = {2012}, url = {http://eprint.iacr.org/2012/275}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NevesA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nguyen12, author = {Long Hoang Nguyen}, title = {Rational authentication protocols and their use in financial transactions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {428}, year = {2012}, url = {http://eprint.iacr.org/2012/428}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nguyen12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NguyenR12, author = {Long Hoang Nguyen and Andrew William Roscoe}, title = {Simple construction of epsilon-biased distribution}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {429}, year = {2012}, url = {http://eprint.iacr.org/2012/429}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NguyenR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NietoMPRS12, author = {Juan Manuel Gonz{\'{a}}lez Nieto and Mark Manulis and Bertram Poettering and Jothi Rangasamy and Douglas Stebila}, title = {Publicly Verifiable Ciphertexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {357}, year = {2012}, url = {http://eprint.iacr.org/2012/357}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NietoMPRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NietoMS12, author = {Juan Manuel Gonz{\'{a}}lez Nieto and Mark Manulis and Dongdong Sun}, title = {Forward-Secure Hierarchical Predicate Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {402}, year = {2012}, url = {http://eprint.iacr.org/2012/402}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NietoMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NietoMS12a, author = {Juan Manuel Gonz{\'{a}}lez Nieto and Mark Manulis and Dongdong Sun}, title = {Fully Private Revocable Predicate Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {403}, year = {2012}, url = {http://eprint.iacr.org/2012/403}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NietoMS12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nishioka12, author = {Mototsugu Nishioka}, title = {Perfect Keyword Privacy in {PEKS} Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {469}, year = {2012}, url = {http://eprint.iacr.org/2012/469}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nishioka12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nuida12, author = {Koji Nuida}, title = {On pseudorandomization of information-theoretically secure schemes without hardness assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {505}, year = {2012}, url = {http://eprint.iacr.org/2012/505}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nuida12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NuidaAKMN12, author = {Koji Nuida and Takuro Abe and Shizuo Kaji and Toshiaki Maeno and Yasuhide Numata}, title = {A mathematical problem for security analysis of hash functions and pseudorandom generators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {310}, year = {2012}, url = {http://eprint.iacr.org/2012/310}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NuidaAKMN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ObradorMG12, author = {Marc Obrador and Paz Morillo and Sandra Guasch}, title = {Applications of Polynomial Properties to Verifiable Delegation of Computation and Electronic Voting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {726}, year = {2012}, url = {http://eprint.iacr.org/2012/726}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ObradorMG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OkamotoT12, author = {Tatsuaki Okamoto and Katsuyuki Takashima}, title = {Fully Secure Unbounded Inner-Product and Attribute-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {671}, year = {2012}, url = {http://eprint.iacr.org/2012/671}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OkamotoT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Onete12, author = {Cristina Onete}, title = {Key Updates for {RFID} Distance-Bounding Protocols: Achieving Narrow-Destructive Privacy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {165}, year = {2012}, url = {http://eprint.iacr.org/2012/165}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Onete12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OrenW12, author = {Yossef Oren and Avishai Wool}, title = {Tolerant Algebraic Side-Channel Analysis of {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {92}, year = {2012}, url = {http://eprint.iacr.org/2012/092}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OrenW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OrumiehchihaPSS12, author = {Mohammad Ali Orumiehchiha and Josef Pieprzyk and Elham Shakour and Ron Steinfeld}, title = {Security Evaluation of Rakaposhi Stream Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {656}, year = {2012}, url = {http://eprint.iacr.org/2012/656}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OrumiehchihaPSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OstrovskySVW12, author = {Rafail Ostrovsky and Alessandra Scafuro and Ivan Visconti and Akshay Wadia}, title = {Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {143}, year = {2012}, url = {http://eprint.iacr.org/2012/143}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OstrovskySVW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Osvik12, author = {Dag Arne Osvik}, title = {Fast Embedded Software Hashing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {156}, year = {2012}, url = {http://eprint.iacr.org/2012/156}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Osvik12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Padro12, author = {Carles Padr{\'{o}}}, title = {Lecture Notes in Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {674}, year = {2012}, url = {http://eprint.iacr.org/2012/674}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Padro12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PadroVY12, author = {Carles Padr{\'{o}} and Leonor V{\'{a}}zquez and An Yang}, title = {Finding Lower Bounds on the Complexity of Secret Sharing Schemes by Linear Programming}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {464}, year = {2012}, url = {http://eprint.iacr.org/2012/464}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PadroVY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Pandey12, author = {Omkant Pandey}, title = {Achieving Constant Round Leakage-Resilient Zero-Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {362}, year = {2012}, url = {http://eprint.iacr.org/2012/362}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Pandey12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PapakonstantinouRV12, author = {Periklis A. Papakonstantinou and Charles Rackoff and Yevgeniy Vahlis}, title = {How powerful are the {DDH} hard groups?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {653}, year = {2012}, url = {http://eprint.iacr.org/2012/653}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PapakonstantinouRV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Parakh12, author = {Abhishek Parakh}, title = {A Probabilistic Quantum Key Transfer Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {454}, year = {2012}, url = {http://eprint.iacr.org/2012/454}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Parakh12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PasskiR12, author = {Jon Passki and Tom Ritter}, title = {An Adaptive-Ciphertext Attack against "I {\(\oplus\)} C" Block Cipher Modes With an Oracle}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {292}, year = {2012}, url = {http://eprint.iacr.org/2012/292}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PasskiR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatersonPS12, author = {Kenneth G. Paterson and Antigoni Polychroniadou and Dale L. Sibborn}, title = {A Coding-Theoretic Approach to Recovering Noisy {RSA} Keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {724}, year = {2012}, url = {http://eprint.iacr.org/2012/724}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatersonPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatersonS12, author = {Maura B. Paterson and Douglas R. Stinson}, title = {A Simplified Combinatorial Treatment of Constructions and Threshold Gaps of Ramp Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {534}, year = {2012}, url = {http://eprint.iacr.org/2012/534}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatersonS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatersonSU12, author = {Maura B. Paterson and Douglas R. Stinson and Jalaj Upadhyay}, title = {A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {611}, year = {2012}, url = {http://eprint.iacr.org/2012/611}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatersonSU12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Pattanayak12, author = {Anupam Pattanayak}, title = {Revisiting Dedicated and Block Cipher based Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {322}, year = {2012}, url = {http://eprint.iacr.org/2012/322}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Pattanayak12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PaulHG12, author = {Souradyuti Paul and Ekawat Homsirikamol and Kris Gaj}, title = {A Novel Permutation-based Hash Mode of Operation {FP} and the Hash Function {SAMOSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {597}, year = {2012}, url = {http://eprint.iacr.org/2012/597}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PaulHG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PeetersH12, author = {Roel Peeters and Jens Hermans}, title = {Wide Strong Private {RFID} Identification based on Zero-Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {389}, year = {2012}, url = {http://eprint.iacr.org/2012/389}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PeetersH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PengzZK12, author = {Changyong Peng and Chuangying Zhu and Yuefei Zhu and Fei Kang}, title = {Improved side channel attack on the block cipher {NOEKEON}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {571}, year = {2012}, url = {http://eprint.iacr.org/2012/571}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PengzZK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PengzZK12a, author = {Changyong Peng and Chuangying Zhu and Yuefei Zhu and Fei Kang}, title = {Symbolic computation in block cipher with application to {PRESENT}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {587}, year = {2012}, url = {http://eprint.iacr.org/2012/587}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PengzZK12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Persichetti12, author = {Edoardo Persichetti}, title = {On a CCA2-secure variant of McEliece in the standard model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {268}, year = {2012}, url = {http://eprint.iacr.org/2012/268}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Persichetti12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PetitQ12, author = {Christophe Petit and Jean{-}Jacques Quisquater}, title = {On Polynomial Systems Arising from a Weil Descent}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {146}, year = {2012}, url = {http://eprint.iacr.org/2012/146}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/PetitQ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PetzoldtBB12, author = {Albrecht Petzoldt and Stanislav Bulygin and Johannes Buchmann}, title = {A Multivariate based Threshold Ring Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {194}, year = {2012}, url = {http://eprint.iacr.org/2012/194}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/PetzoldtBB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PeyrinS012, author = {Thomas Peyrin and Yu Sasaki and Lei Wang}, title = {Generic Related-key Attacks for {HMAC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {684}, year = {2012}, url = {http://eprint.iacr.org/2012/684}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PeyrinS012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PhamC12, author = {Viet Pham and Carlos Cid}, title = {Are We Compromised? Modelling Security Assessment Games}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {502}, year = {2012}, url = {http://eprint.iacr.org/2012/502}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PhamC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PhanPSS12, author = {Duong Hieu Phan and David Pointcheval and Siamak Fayyaz Shahandashti and Mario Strefler}, title = {Adaptive {CCA} Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {216}, year = {2012}, url = {http://eprint.iacr.org/2012/216}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PhanPSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PhanPT12, author = {Duong Hieu Phan and David Pointcheval and Viet Cuong Trinh}, title = {Multi-Channel Broadcast Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {307}, year = {2012}, url = {http://eprint.iacr.org/2012/307}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PhanPT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PhanT12, author = {Duong Hieu Phan and Viet Cuong Trinh}, title = {Resistance to Pirates 2.0: {A} Method from Leakage Resilient Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {305}, year = {2012}, url = {http://eprint.iacr.org/2012/305}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PhanT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PiretRC12, author = {Gilles Piret and Thomas Roche and Claude Carlet}, title = {{PICARO} - {A} Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance - Extended Version -}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {358}, year = {2012}, url = {http://eprint.iacr.org/2012/358}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PiretRC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Portmann12, author = {Christopher Portmann}, title = {Key recycling in authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {58}, year = {2012}, url = {http://eprint.iacr.org/2012/058}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Portmann12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PoulakisR12, author = {Dimitrios Poulakis and Robert Rolland}, title = {A Digital Signature Scheme for Long-Term Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {134}, year = {2012}, url = {http://eprint.iacr.org/2012/134}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PoulakisR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Pousse12, author = {Benjamin Pousse}, title = {Short communication: An interpretation of the Linux entropy estimator}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {487}, year = {2012}, url = {http://eprint.iacr.org/2012/487}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Pousse12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PueyoCX12, author = {Ignacio Cascudo Pueyo and Ronald Cramer and Chaoping Xing}, title = {Bounds on the Threshold Gap in Secret Sharing over Small Fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {319}, year = {2012}, url = {http://eprint.iacr.org/2012/319}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PueyoCX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PueyoCX12a, author = {Ignacio Cascudo Pueyo and Ronald Cramer and Chaoping Xing}, title = {The Arithmetic Codex}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {388}, year = {2012}, url = {http://eprint.iacr.org/2012/388}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PueyoCX12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RachwalikSWZ12, author = {Tomasz Rachwalik and Janusz Szmidt and Robert Wicik and Janusz Zablocki}, title = {Generation of Nonlinear Feedback Shift Registers with special-purpose hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {314}, year = {2012}, url = {http://eprint.iacr.org/2012/314}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RachwalikSWZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RajendranKWPMRW12, author = {Jeyavijayan Rajendran and Ramesh Karri and James B. Wendt and Miodrag Potkonjak and Nathan R. McDonald and Garrett S. Rose and Bryant T. Wysocki}, title = {Nanoelectronic Solutions for Hardware Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {575}, year = {2012}, url = {http://eprint.iacr.org/2012/575}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/RajendranKWPMRW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RamannaCS12, author = {Somindu C. Ramanna and Sanjit Chatterjee and Palash Sarkar}, title = {Variants of Waters' Dual-System Primitives Using Asymmetric Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {24}, year = {2012}, url = {http://eprint.iacr.org/2012/024}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RamannaCS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RamannaS12, author = {Somindu C. Ramanna and Palash Sarkar}, title = {Constant-Size Ciphertext {HIBE} From Asymmetric Pairings Using the Dual-System Technique}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {57}, year = {2012}, url = {http://eprint.iacr.org/2012/057}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RamannaS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ReyhanitabarS12, author = {Reza Reyhanitabar and Willy Susilo}, title = {Mix-Compress-Mix Revisited: Dispensing with Non-invertible Random Injection Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {479}, year = {2012}, url = {http://eprint.iacr.org/2012/479}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ReyhanitabarS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RonS12, author = {Dorit Ron and Adi Shamir}, title = {Quantitative Analysis of the Full Bitcoin Transaction Graph}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {584}, year = {2012}, url = {http://eprint.iacr.org/2012/584}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RonS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Rostovtsev12, author = {Alexander Rostovtsev}, title = {Virtual isomorphisms of ciphers: is {AES} secure against differential / linear attack?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {663}, year = {2012}, url = {http://eprint.iacr.org/2012/663}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Rostovtsev12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RostovtsevM12, author = {Alexander Rostovtsev and Alexey Mizyukin}, title = {On Boolean Ideals and Varieties with Application to Algebraic Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {151}, year = {2012}, url = {http://eprint.iacr.org/2012/151}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RostovtsevM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Rosulek12, author = {Mike Rosulek}, title = {Must you know the code of f to securely compute f?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {455}, year = {2012}, url = {http://eprint.iacr.org/2012/455}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Rosulek12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Rothblum12, author = {Ron Rothblum}, title = {On the Circular Security of Bit-Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {102}, year = {2012}, url = {http://eprint.iacr.org/2012/102}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Rothblum12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RouselakisW12, author = {Yannis Rouselakis and Brent Waters}, title = {New Constructions and Proof Methods for Large Universe Attribute-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {583}, year = {2012}, url = {http://eprint.iacr.org/2012/583}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RouselakisW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Saarinen12, author = {Markku{-}Juhani O. Saarinen}, title = {The BlueJay Ultra-Lightweight Hybrid Cryptosystem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {195}, year = {2012}, url = {http://eprint.iacr.org/2012/195}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Saarinen12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SaarinenE12, author = {Markku{-}Juhani O. Saarinen and Daniel W. Engels}, title = {A Do-It-All-Cipher for {RFID:} Design Requirements (Extended Abstract)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {317}, year = {2012}, url = {http://eprint.iacr.org/2012/317}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SaarinenE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Safavi-NainiTW12, author = {Reihaneh Safavi{-}Naini and Mohammed Ashraful Tuhin and Pengwei Wang}, title = {A General Construction for 1-round {\(\delta\)}-RMT and (0, {\(\delta\)})-SMT}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {231}, year = {2012}, url = {http://eprint.iacr.org/2012/231}, timestamp = {Wed, 10 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Safavi-NainiTW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SafkhaniBN12, author = {Masoumeh Safkhani and Nasour Bagheri and Majid Naderi}, title = {How a Cryptographer Can Get Rich?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {23}, year = {2012}, url = {http://eprint.iacr.org/2012/023}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SafkhaniBN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SafkhaniBN12a, author = {Masoumeh Safkhani and Nasour Bagheri and Majid Naderi}, title = {On the Traceability of Tags in {SUAP} {RFID} Authentication Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {334}, year = {2012}, url = {http://eprint.iacr.org/2012/334}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SafkhaniBN12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SahaiSW12, author = {Amit Sahai and Hakan Seyalioglu and Brent Waters}, title = {Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {437}, year = {2012}, url = {http://eprint.iacr.org/2012/437}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SahaiSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SahaiW12, author = {Amit Sahai and Brent Waters}, title = {Attribute-Based Encryption for Circuits from Multilinear Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {592}, year = {2012}, url = {http://eprint.iacr.org/2012/592}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SahaiW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SakaiSEHO12, author = {Yusuke Sakai and Jacob C. N. Schuldt and Keita Emura and Goichiro Hanaoka and Kazuo Ohta}, title = {On the Security of Dynamic Group Signatures: Preventing Signature Hijacking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {431}, year = {2012}, url = {http://eprint.iacr.org/2012/431}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SakaiSEHO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SalamL12, author = {Md. Iftekhar Salam and Hoon{-}Jae Lee}, title = {Algebraic Countermeasure to Enhance the Improved Summation Generator with 2-Bit Memory}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {282}, year = {2012}, url = {http://eprint.iacr.org/2012/282}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SalamL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Samid12, author = {Gideon Samid}, title = {Hush Functions Extended to Any Size Input versus Any Size Output}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {457}, year = {2012}, url = {http://eprint.iacr.org/2012/457}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Samid12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SantisY12, author = {Alfredo De Santis and Moti Yung}, title = {"Metaproofs" (and their Cryptographic Applications)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {495}, year = {2012}, url = {http://eprint.iacr.org/2012/495}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SantisY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SarkarM12, author = {Santanu Sarkar and Subhamoy Maitra}, title = {More on Correcting Errors in {RSA} Private Keys: Breaking {CRT-RSA} with Low Weight Decryption Exponents}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {106}, year = {2012}, url = {http://eprint.iacr.org/2012/106}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SarkarM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Sasaki012, author = {Yu Sasaki and Lei Wang}, title = {2-Dimension Sums: Distinguishers Beyond Three Rounds of {RIPEMD-128} and {RIPEMD-160}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {49}, year = {2012}, url = {http://eprint.iacr.org/2012/049}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Sasaki012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Schnoor12, author = {Henning Schnoor}, title = {Deciding Epistemic and Strategic Properties of Cryptographic Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {340}, year = {2012}, url = {http://eprint.iacr.org/2012/340}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Schnoor12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SchnorrS12, author = {Claus{-}Peter Schnorr and Taras Shevchenko}, title = {Solving Subset Sum Problems of Densioty close to 1 by "randomized" BKZ-reduction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {620}, year = {2012}, url = {http://eprint.iacr.org/2012/620}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SchnorrS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Schulman12, author = {Leonard J. Schulman}, title = {Cryptography from tensor problems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {244}, year = {2012}, url = {http://eprint.iacr.org/2012/244}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Schulman12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Scott12, author = {Michael Scott}, title = {Client-Server Authentication Using Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {148}, year = {2012}, url = {http://eprint.iacr.org/2012/148}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Scott12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Scott12a, author = {Michael Scott}, title = {Cryptanalysis of a recent two factor authentication scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {527}, year = {2012}, url = {http://eprint.iacr.org/2012/527}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Scott12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Sekar12, author = {Gautham Sekar}, title = {The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {425}, year = {2012}, url = {http://eprint.iacr.org/2012/425}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Sekar12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviVVR12, author = {S. Sharmila Deva Selvi and S. Sree Vivek and Dhinakaran Vinayagamurthy and C. Pandu Rangan}, title = {{ID} Based Signcryption Scheme in Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {392}, year = {2012}, url = {http://eprint.iacr.org/2012/392}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviVVR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Seo12, author = {Jae Hong Seo}, title = {Short Signatures From Diffie-Hellman: Realizing Short Public Key}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {480}, year = {2012}, url = {http://eprint.iacr.org/2012/480}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Seo12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SeoC12, author = {Jae Hong Seo and Jung Hee Cheon}, title = {Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {198}, year = {2012}, url = {http://eprint.iacr.org/2012/198}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SeoC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SettyBVBPW12, author = {Srinath T. V. Setty and Benjamin Braun and Victor Vu and Andrew J. Blumberg and Bryan Parno and Michael Walfish}, title = {Resolving the conflict between generality and plausibility in verified computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {622}, year = {2012}, url = {http://eprint.iacr.org/2012/622}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SettyBVBPW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SettyVPBBW12, author = {Srinath T. V. Setty and Victor Vu and Nikhil Panpalia and Benjamin Braun and Andrew J. Blumberg and Michael Walfish}, title = {Taking proof-based verified computation a few steps closer to practicality (extended version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {598}, year = {2012}, url = {http://eprint.iacr.org/2012/598}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SettyVPBBW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Seurin12, author = {Yannick Seurin}, title = {On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {29}, year = {2012}, url = {http://eprint.iacr.org/2012/029}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Seurin12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SeurinT12, author = {Yannick Seurin and Joana Treger}, title = {A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {649}, year = {2012}, url = {http://eprint.iacr.org/2012/649}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SeurinT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShahM12, author = {Jay Shah and Ayan Mahalanobis}, title = {A New Guess-and-Determine Attack on the {A5/1}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {208}, year = {2012}, url = {http://eprint.iacr.org/2012/208}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShahM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShahandashtiSO12, author = {Siamak Fayyaz Shahandashti and Reihaneh Safavi{-}Naini and Philip Ogunbona}, title = {Private Fingerprint Matching}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {219}, year = {2012}, url = {http://eprint.iacr.org/2012/219}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShahandashtiSO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShamirZ12, author = {Adi Shamir and Eldad Zinger}, title = {A Practical Polynomial-Time Known-Plaintext Attack on a Cryptosystem Proposed by John Nash}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {339}, year = {2012}, url = {http://eprint.iacr.org/2012/339}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShamirZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Shens12, author = {Limin Shen and Yinxia Sun}, title = {On security of a Certificateless Aggregate Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {152}, year = {2012}, url = {http://eprint.iacr.org/2012/152}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Shens12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Shikata12, author = {Junji Shikata}, title = {Formalization of Information-Theoretic Security for Encryption and Key Agreement, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {383}, year = {2012}, url = {http://eprint.iacr.org/2012/383}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Shikata12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShinHK12, author = {Young{-}joo Shin and Junbeom Hur and Kwangjo Kim}, title = {Security weakness in the Proof of Storage with Deduplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {554}, year = {2012}, url = {http://eprint.iacr.org/2012/554}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShinHK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShinoharaSHT12, author = {Naoyuki Shinohara and Takeshi Shimoyama and Takuya Hayashi and Tsuyoshi Takagi}, title = {Key Length Estimation of Pairing-based Cryptosystems using {\(\eta\)}\({}_{\mbox{T}}\) Pairing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {42}, year = {2012}, url = {http://eprint.iacr.org/2012/042}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShinoharaSHT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SidorenkoBFGV12, author = {Andrey Sidorenko and Joachim van den Berg and Remko Foekema and Michiel Grashuis and Jaap de Vos}, title = {Bellcore attack in practice}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {553}, year = {2012}, url = {http://eprint.iacr.org/2012/553}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SidorenkoBFGV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SimoneS12, author = {Antonino Simone and Boris Skoric}, title = {False Positive probabilities in q-ary Tardos codes: comparison of attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {522}, year = {2012}, url = {http://eprint.iacr.org/2012/522}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SimoneS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SimoneS12a, author = {Antonino Simone and Boris Skoric}, title = {False Negative probabilities in Tardos codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {667}, year = {2012}, url = {http://eprint.iacr.org/2012/667}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SimoneS12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Sin12, author = {Chol{-}Sun Sin}, title = {Regular Ternary Algorithm for Scalar Multiplication on Elliptic Curves over Finite Fields of Characteristic Three}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {390}, year = {2012}, url = {http://eprint.iacr.org/2012/390}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Sin12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Singh12, author = {Brajesh Kumar Singh}, title = {Secondary constructions on generalized bent functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {17}, year = {2012}, url = {http://eprint.iacr.org/2012/017}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Singh12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Singh12a, author = {Brajesh Kumar Singh}, title = {Third-order nonlinearities of some biquadratic monomial Boolean functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {186}, year = {2012}, url = {http://eprint.iacr.org/2012/186}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Singh12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Singh12b, author = {Brajesh Kumar Singh}, title = {On second-order nonlinearity and maximum algebraic immunity of some bent functions in PS\({}^{\mbox{+}}\)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {396}, year = {2012}, url = {http://eprint.iacr.org/2012/396}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Singh12b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SinghB12, author = {Deep Singh and Maheshanand Bhaintwal}, title = {Additive autocorrelation of some classes of cubic semi-bent Boolean functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {127}, year = {2012}, url = {http://eprint.iacr.org/2012/127}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SinghB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SinghB12a, author = {Deep Singh and Maheshanand Bhaintwal}, title = {Some properties of q-ary functions based on spectral analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {283}, year = {2012}, url = {http://eprint.iacr.org/2012/283}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SinghB12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SinghBS12, author = {Deep Singh and Maheshanand Bhaintwal and Brajesh Kumar Singh}, title = {Recent Results on Generalized q-ary Bent Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {37}, year = {2012}, url = {http://eprint.iacr.org/2012/037}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SinghBS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SkoricO12, author = {Boris Skoric and Jan{-}Jaap Oosterwijk}, title = {Binary and q-ary Tardos codes, revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {249}, year = {2012}, url = {http://eprint.iacr.org/2012/249}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SkoricO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SkorobogatovW12, author = {Sergei Skorobogatov and Christopher Woods}, title = {In the blink of an eye: There goes your {AES} key}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {296}, year = {2012}, url = {http://eprint.iacr.org/2012/296}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SkorobogatovW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Smith-ToneT12, author = {Daniel Smith{-}Tone and Cristina Tone}, title = {A Measure of Dependence for Cryptographic Primitives Relative to Ideal Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {647}, year = {2012}, url = {http://eprint.iacr.org/2012/647}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Smith-ToneT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Smyth12, author = {Ben Smyth}, title = {Replay attacks that violate ballot secrecy in Helios}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {185}, year = {2012}, url = {http://eprint.iacr.org/2012/185}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Smyth12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SmythRC12, author = {Ben Smyth and Mark Dermot Ryan and Liqun Chen}, title = {Formal analysis of privacy in Direct Anonymous Attestation schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {650}, year = {2012}, url = {http://eprint.iacr.org/2012/650}, timestamp = {Sun, 22 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SmythRC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Soleimany12, author = {Hadi Soleimany}, title = {Zero-Correlation Linear Cryptanalysis of Reduced-Round LBlock}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {570}, year = {2012}, url = {http://eprint.iacr.org/2012/570}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Soleimany12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SongL12, author = {Yun Song and Zhihui Li}, title = {An ideal multi-secret sharing scheme based on minimal privileged coalitions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {719}, year = {2012}, url = {http://eprint.iacr.org/2012/719}, timestamp = {Thu, 15 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SongL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Stanek12, author = {Martin Stanek}, title = {Attacking Scrambled Burrows-Wheeler Transform}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {149}, year = {2012}, url = {http://eprint.iacr.org/2012/149}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Stanek12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StefanovS12, author = {Emil Stefanov and Elaine Shi}, title = {FastPRP: Fast Pseudo-Random Permutations for Small Domains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {254}, year = {2012}, url = {http://eprint.iacr.org/2012/254}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StefanovS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Steinberger12, author = {John P. Steinberger}, title = {Improved Security Bounds for Key-Alternating Ciphers via Hellinger Distance}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {481}, year = {2012}, url = {http://eprint.iacr.org/2012/481}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Steinberger12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SteinbergerSY12, author = {John P. Steinberger and Xiaoming Sun and Zhe Yang}, title = {Stam's Conjecture and Threshold Phenomena in Collision Resistance}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {451}, year = {2012}, url = {http://eprint.iacr.org/2012/451}, timestamp = {Wed, 26 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SteinbergerSY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Stevens12, author = {Marc Stevens}, title = {Single-block collision attack on {MD5}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {40}, year = {2012}, url = {http://eprint.iacr.org/2012/040}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Stevens12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Sun12, author = {Da{-}Zhi Sun}, title = {An error in "On a new formal proof model for {RFID} location privacy"}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {31}, year = {2012}, url = {http://eprint.iacr.org/2012/031}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Sun12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SwansonS12, author = {Colleen Swanson and Douglas R. Stinson}, title = {Combinatorial Solutions Providing Improved Security for the Generalized Russian Cards Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {376}, year = {2012}, url = {http://eprint.iacr.org/2012/376}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SwansonS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ta12, author = {Vinh{-}Thong Ta}, title = {Formal verification of secure ad-hoc network routing protocols using deductive model-checking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {139}, year = {2012}, url = {http://eprint.iacr.org/2012/139}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ta12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TanHW12, author = {Xiao Tan and Qiong Huang and Duncan S. Wong}, title = {Concurrent Signature without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {576}, year = {2012}, url = {http://eprint.iacr.org/2012/576}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/TanHW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Tang12, author = {ZhaoHui Tang}, title = {Homomorphic A-codes for Network Coding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {331}, year = {2012}, url = {http://eprint.iacr.org/2012/331}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Tang12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Tang12a, author = {Qiang Tang}, title = {Search in Encrypted Data: Theoretical Models and Practical Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {648}, year = {2012}, url = {http://eprint.iacr.org/2012/648}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Tang12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TangCQ12, author = {Ming Tang and Pingpan Cheng and Zhenlong Qiu}, title = {Differential Power Analysis on {ZUC} Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {299}, year = {2012}, url = {http://eprint.iacr.org/2012/299}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/TangCQ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TangL12a, author = {ZhaoHui Tang and Hoon Wei Lim}, title = {Multi-receiver Homomorphic Authentication Codes for Network Coding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {447}, year = {2012}, url = {http://eprint.iacr.org/2012/447}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TangL12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TangZ0M12, author = {Qiang Tang and Yuanjie Zhao and Xiaofeng Chen and Hua Ma}, title = {Refine the Concept of Public Key Encryption with Delegated Search}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {654}, year = {2012}, url = {http://eprint.iacr.org/2012/654}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TangZ0M12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Tews12, author = {Erik Tews}, title = {{DECT} Security Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {321}, year = {2012}, url = {http://eprint.iacr.org/2012/321}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Tews12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Thomae12, author = {Enrico Thomae}, title = {A Generalization of the Rainbow Band Separation Attack and its Applications to Multivariate Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {223}, year = {2012}, url = {http://eprint.iacr.org/2012/223}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Thomae12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Thomae12a, author = {Enrico Thomae}, title = {Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-Commutative Rings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {270}, year = {2012}, url = {http://eprint.iacr.org/2012/270}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Thomae12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TillichW12, author = {Stefan Tillich and Marcin W{\'{o}}jcik}, title = {Security Analysis of an Open Car Immobilizer Protocol Stack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {617}, year = {2012}, url = {http://eprint.iacr.org/2012/617}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TillichW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TiranM12, author = {S{\'{e}}bastien Tiran and Philippe Maurine}, title = {Magnitude Squared Coherence based {SCA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {77}, year = {2012}, url = {http://eprint.iacr.org/2012/077}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TiranM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Tsaban12, author = {Boaz Tsaban}, title = {Polynomial time cryptanalysis of noncommutative-algebraic key exchange protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {615}, year = {2012}, url = {http://eprint.iacr.org/2012/615}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Tsaban12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TsujiiTGF12, author = {Shigeo Tsujii and Kohtaro Tadaki and Masahito Gotaishi and Ryou Fujita}, title = {Construction of the Tsujii-Shamir-Kasahara {(TSK)} Type Multivariate Public Key Cryptosystem, which relies on the Difficulty of Prime Factorization}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {145}, year = {2012}, url = {http://eprint.iacr.org/2012/145}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TsujiiTGF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Tunstall12, author = {Michael Tunstall}, title = {Improved "Partial Sums"-based Square Attack on {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {280}, year = {2012}, url = {http://eprint.iacr.org/2012/280}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Tunstall12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Turan12, author = {Meltem S{\"{o}}nmez Turan}, title = {On The Nonlinearity of Maximum-length {NFSR} Feedbacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {112}, year = {2012}, url = {http://eprint.iacr.org/2012/112}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Turan12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Unruh12, author = {Dominique Unruh}, title = {Everlasting Quantum Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {177}, year = {2012}, url = {http://eprint.iacr.org/2012/177}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Unruh12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Unruh12a, author = {Dominique Unruh}, title = {Programmable encryption and key-dependent messages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {423}, year = {2012}, url = {http://eprint.iacr.org/2012/423}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Unruh12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Vajda12, author = {Istv{\'{a}}n Vajda}, title = {On instance separation in the UC-framework}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {302}, year = {2012}, url = {http://eprint.iacr.org/2012/302}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Vajda12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Veyrat-CharvillonGS12, author = {Nicolas Veyrat{-}Charvillon and Beno{\^{\i}}t G{\'{e}}rard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Security Evaluations Beyond Computing Power: How to Analyze Side-Channel Attacks you Cannot Mount?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {578}, year = {2012}, url = {http://eprint.iacr.org/2012/578}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Veyrat-CharvillonGS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/VivekSBR12, author = {S. Sree Vivek and S. Sharmila Deva Selvi and Guhan Balasubramanian and C. Pandu Rangan}, title = {Strongly Unforgeable Proxy Re-Signature Schemes in the Standard model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {80}, year = {2012}, url = {http://eprint.iacr.org/2012/080}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/VivekSBR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/VivekSR12, author = {S. Sree Vivek and S. Sharmila Deva Selvi and C. Pandu Rangan}, title = {Stronger Public Key Encryption Schemes Withstanding {RAM} Scraper Like Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {118}, year = {2012}, url = {http://eprint.iacr.org/2012/118}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/VivekSR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/VoltePN12, author = {Emmanuel Volte and Jacques Patarin and Val{\'{e}}rie Nachef}, title = {Zero Knowledge with Rubik's Cubes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {174}, year = {2012}, url = {http://eprint.iacr.org/2012/174}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/VoltePN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Wang12, author = {Yongge Wang}, title = {Password Protected Smart Card and Memory Stick Authentication Against Off-line Dictionary Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {120}, year = {2012}, url = {http://eprint.iacr.org/2012/120}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Wang12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Wang12a, author = {Bin Wang}, title = {A unidirectional conditional proxy re-encryption scheme based on non-monotonic access structure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {641}, year = {2012}, url = {http://eprint.iacr.org/2012/641}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Wang12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangAS12, author = {Yang Wang and Man Ho Au and Willy Susilo}, title = {Perfect Ambiguous Optimistic Fair Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {462}, year = {2012}, url = {http://eprint.iacr.org/2012/462}, timestamp = {Tue, 09 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangAS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangCWC12, author = {Shaohui Wang and Dan{-}wei Chen and Zhi{-}Wei Wang and Suqin Chang}, title = {Public Auditing for Ensuring Cloud Data Storage Security With Zero Knowledge Privacy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {365}, year = {2012}, url = {http://eprint.iacr.org/2012/365}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/WangCWC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangHLC12, author = {Shaohui Wang and Zhijie Han and Sujuan Liu and Dan{-}wei Chen}, title = {Security Analysis of {RAPP} An {RFID} Authentication Protocol based on Permutation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {327}, year = {2012}, url = {http://eprint.iacr.org/2012/327}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangHLC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangLC12, author = {Shaohui Wang and Sujuan Liu and Dan{-}wei Chen}, title = {Analysis and Construction of Efficient {RFID} Authentication Protocol with Backward Privacy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {391}, year = {2012}, url = {http://eprint.iacr.org/2012/391}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangLC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangM12, author = {Ding Wang and Chunguang Ma}, title = {On the Security of an Improved Password Authentication Scheme Based on {ECC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {190}, year = {2012}, url = {http://eprint.iacr.org/2012/190}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangM12a, author = {Ding Wang and Chunguang Ma}, title = {Robust Smart Card based Password Authentication Scheme against Smart Card Loss Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {439}, year = {2012}, url = {http://eprint.iacr.org/2012/439}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangM12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangM12b, author = {Ding Wang and Chunguang Ma}, title = {On the (in)security of some smart-card-based password authentication schemes for {WSN}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {581}, year = {2012}, url = {http://eprint.iacr.org/2012/581}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangM12b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangMGC12, author = {Ding Wang and Chunguang Ma and De{-}li Gu and Zhen{-}shan Cui}, title = {Cryptanalysis of Two Dynamic ID-based Remote User Authentication Schemes for Multi-Server Architecture}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {484}, year = {2012}, url = {http://eprint.iacr.org/2012/484}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangMGC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangS12, author = {Gaoli Wang and Yanzhao Shen}, title = {Preimage and Pseudo-Collision Attacks on Step-Reduced {SM3} Hash Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {640}, year = {2012}, url = {http://eprint.iacr.org/2012/640}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangWZ12, author = {Peng Wang and Wenling Wu and Liting Zhang}, title = {Cryptanalysis of the {OKH} Authenticated Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {580}, year = {2012}, url = {http://eprint.iacr.org/2012/580}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangWZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangX12, author = {Qinglong Wang and Li Xu}, title = {Cryptanalysis on a novel unconditionally secure oblivious polynomial evaluation protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {478}, year = {2012}, url = {http://eprint.iacr.org/2012/478}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangY12, author = {Xu An Wang and Xiaoyuan Yang}, title = {New Identity Based Encryption And Its Proxy Re-encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {250}, year = {2012}, url = {http://eprint.iacr.org/2012/250}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangYF12, author = {Zilong Wang and Danfeng (Daphne) Yao and Rongquan Feng}, title = {Adaptive Key Protection in Complex Cryptosystems with Attributes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {136}, year = {2012}, url = {http://eprint.iacr.org/2012/136}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangYF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangYX12, author = {Guilin Wang and Jiangshan Yu and Qi Xie}, title = {Security Analysis of {A} Single Sign-On Mechanism for Distributed Computer Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {107}, year = {2012}, url = {http://eprint.iacr.org/2012/107}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangYX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WatanabeSS12, author = {Yohei Watanabe and Takenobu Seito and Junji Shikata}, title = {Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {460}, year = {2012}, url = {http://eprint.iacr.org/2012/460}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WatanabeSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Waters12, author = {Brent Waters}, title = {Functional Encryption for Regular Languages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {384}, year = {2012}, url = {http://eprint.iacr.org/2012/384}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Waters12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Weber12, author = {Stefan G. Weber}, title = {On Transaction Pseudonyms with Implicit Attributes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {568}, year = {2012}, url = {http://eprint.iacr.org/2012/568}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Weber12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WeiPSLPW12, author = {Lei Wei and Thomas Peyrin and Przemyslaw Sokolowski and San Ling and Josef Pieprzyk and Huaxiong Wang}, title = {On the (In)Security of {IDEA} in Various Hashing Modes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {264}, year = {2012}, url = {http://eprint.iacr.org/2012/264}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WeiPSLPW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WeiTW12, author = {Wei Wei and Chengliang Tian and Xiaoyun Wang}, title = {New Transference Theorems on Lattices Possessing n\({}^{\mbox{{\(\epsilon\)}}}\)-unique Shortest Vectors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {293}, year = {2012}, url = {http://eprint.iacr.org/2012/293}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WeiTW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WhitnallOS12, author = {Carolyn Whitnall and Elisabeth Oswald and Fran{\c{c}}ois{-}Xavier Standaert}, title = {The myth of generic DPA...and the magic of learning}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {256}, year = {2012}, url = {http://eprint.iacr.org/2012/256}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WhitnallOS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Wichs12, author = {Daniel Wichs}, title = {Barriers in Cryptography with Weak, Correlated and Leaky Sources}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {459}, year = {2012}, url = {http://eprint.iacr.org/2012/459}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Wichs12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Wiemers12, author = {Andreas Wiemers}, title = {A note on invariant linear transformations in multivariate public key cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {602}, year = {2012}, url = {http://eprint.iacr.org/2012/602}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Wiemers12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Wilcox-OHearnW12, author = {Zooko Wilcox{-}O'Hearn and Brian Warner}, title = {Tahoe - The Least-Authority Filesystem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {524}, year = {2012}, url = {http://eprint.iacr.org/2012/524}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Wilcox-OHearnW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WuFWGDZ12, author = {Shuang Wu and Dengguo Feng and Wenling Wu and Jian Guo and Le Dong and Jian Zou}, title = {(Pseudo) Preimage Attack on Round-Reduced Gr{\o}stl Hash Function and Others (Extended Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {206}, year = {2012}, url = {http://eprint.iacr.org/2012/206}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/WuFWGDZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WuG12, author = {Teng Wu and Guang Gong}, title = {The Weakness of Integrity Protection for {LTE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {690}, year = {2012}, url = {http://eprint.iacr.org/2012/690}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WuG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WuW12, author = {Shengbao Wu and Mingsheng Wang}, title = {Automatic Search of Truncated Impossible Differentials and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {214}, year = {2012}, url = {http://eprint.iacr.org/2012/214}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WuW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XiaoBY12, author = {Liangliang Xiao and Osbert Bastani and I{-}Ling Yen}, title = {An Efficient Homomorphic Encryption Protocol for Multi-User Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {193}, year = {2012}, url = {http://eprint.iacr.org/2012/193}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XiaoBY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XiaoY12, author = {Liangliang Xiao and I{-}Ling Yen}, title = {Security Analysis and Enhancement for Prefix-Preserving Encryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {191}, year = {2012}, url = {http://eprint.iacr.org/2012/191}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XiaoY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XiaoY12a, author = {Liangliang Xiao and I{-}Ling Yen}, title = {A Note for the Ideal Order-Preserving Encryption Object and Generalized Order-Preserving Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {350}, year = {2012}, url = {http://eprint.iacr.org/2012/350}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XiaoY12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XiaoYH12, author = {Liangliang Xiao and I{-}Ling Yen and Dung T. Huynh}, title = {Extending Order Preserving Encryption for Multi-User Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {192}, year = {2012}, url = {http://eprint.iacr.org/2012/192}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XiaoYH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XieX012, author = {Xiang Xie and Rui Xue and Rui Zhang}, title = {Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {463}, year = {2012}, url = {http://eprint.iacr.org/2012/463}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XieX012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XiongF12, author = {Xi Xiong and Haining Fan}, title = {Bit-Parallel GF(2\({}^{\mbox{n}}\)) Squarer Using Shifted Polynomial Basis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {626}, year = {2012}, url = {http://eprint.iacr.org/2012/626}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XiongF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XiongLDF12, author = {Hai Xiong and Chao Li and Qingping Dai and Shaojing Fu}, title = {New Constructions of Low Correlation Sequences with High Linear Complexity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {161}, year = {2012}, url = {http://eprint.iacr.org/2012/161}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XiongLDF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XuX12, author = {ZiJie Xu and Ke Xu}, title = {A Way Reduce Signed Bitwise Differences that Transformed Into Same Modular Differences}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {330}, year = {2012}, url = {http://eprint.iacr.org/2012/330}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XuX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Yagisawa12, author = {Masahiro Yagisawa}, title = {Key distribution system and attribute-based encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {241}, year = {2012}, url = {http://eprint.iacr.org/2012/241}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Yagisawa12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YanL12, author = {Xiangtao Yan and Yifa Li}, title = {A new remote data integrity checking scheme for cloud storage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {25}, year = {2012}, url = {http://eprint.iacr.org/2012/025}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YanL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangMWZ12, author = {Min Yang and Qingshu Meng and Zhang{-}yi Wang and Huanguo Zhang}, title = {Some observations to speed the polynomial selection in the number field sieve}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {599}, year = {2012}, url = {http://eprint.iacr.org/2012/599}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangMWZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YaoZ12, author = {Andrew C. Yao and Yunlei Zhao}, title = {Digital Signatures from Challenge-Divided Sigma-Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1}, year = {2012}, url = {http://eprint.iacr.org/2012/001}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YaoZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YaoZ12a, author = {Andrew C. Yao and Yunlei Zhao}, title = {Computationally-Fair Group and Identity-Based Key-Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {287}, year = {2012}, url = {http://eprint.iacr.org/2012/287}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YaoZ12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YiT12, author = {Haibo Yi and Shaohua Tang}, title = {A Versatile Multi-Input Multiplier over Finite Fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {545}, year = {2012}, url = {http://eprint.iacr.org/2012/545}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YiT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YonemuraIMH12, author = {Tomoko Yonemura and Taichi Isogai and Hirofumi Muratani and Yoshikazu Hanatani}, title = {Factor-4 and 6 (De)compression for Values of Pairings using Trace Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {593}, year = {2012}, url = {http://eprint.iacr.org/2012/593}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YonemuraIMH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YuCW12, author = {Hongbo Yu and Jiazhe Chen and Xiaoyun Wang}, title = {The Boomerang Attacks on the Round-Reduced Skein-512}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {238}, year = {2012}, url = {http://eprint.iacr.org/2012/238}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YuCW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YuanY12, author = {Jiawei Yuan and Shucheng Yu}, title = {Proofs of Retrievability with Public Verifiability and Constant Communication Cost in Cloud}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {682}, year = {2012}, url = {http://eprint.iacr.org/2012/682}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YuanY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Zaverucha12, author = {Gregory M. Zaverucha}, title = {Hybrid Encryption in the Multi-User Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {159}, year = {2012}, url = {http://eprint.iacr.org/2012/159}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Zaverucha12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Zhandry12, author = {Mark Zhandry}, title = {Identity-based Encryption is Secure in the Quantum Random Oracle Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {76}, year = {2012}, url = {http://eprint.iacr.org/2012/076}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Zhandry12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Zhandry12a, author = {Mark Zhandry}, title = {How to Construct Quantum Random Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {182}, year = {2012}, url = {http://eprint.iacr.org/2012/182}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Zhandry12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangB12, author = {Yihua Zhang and Marina Blanton}, title = {Efficient Dynamic Provable Possession of Remote Data via Update Trees}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {291}, year = {2012}, url = {http://eprint.iacr.org/2012/291}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangC12, author = {J. H. Zhang and Y. B. Cui}, title = {Comment an Anonymous Multi-receiver Identity-based Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {201}, year = {2012}, url = {http://eprint.iacr.org/2012/201}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangLL12, author = {Yin Zhang and Meicheng Liu and Dongdai Lin}, title = {On the Immunity of Rotation Symmetric Boolean Functions Against Fast Algebraic Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {111}, year = {2012}, url = {http://eprint.iacr.org/2012/111}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangWL12, author = {Xusheng Zhang and Kunpeng Wang and Dongdai Lin}, title = {On Efficient Pairings on Elliptic Curves over Extension Fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {247}, year = {2012}, url = {http://eprint.iacr.org/2012/247}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangWL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangZ12, author = {Bo Zhang and Fangguo Zhang}, title = {Secure Similarity Coefficients Computation with Malicious Adversaries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {202}, year = {2012}, url = {http://eprint.iacr.org/2012/202}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ZhangZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangZC12, author = {Jiang Zhang and Zhenfeng Zhang and Yu Chen}, title = {{PRE} - Stronger Security Notion and Efficient Construction with New Property}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {664}, year = {2012}, url = {http://eprint.iacr.org/2012/664}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangZC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoGZWSJ12, author = {Xin{-}jie Zhao and Shize Guo and Fan Zhang and Tao Wang and Zhijie Shi and Keke Ji}, title = {Algebraic Differential Fault Attacks on {LED} using a Single Fault Injection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {347}, year = {2012}, url = {http://eprint.iacr.org/2012/347}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoGZWSJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoWCZ12, author = {Jingyuan Zhao and Meiqin Wang and Jiazhe Chen and Yuliang Zheng}, title = {New Impossible Differential Attack on SAFER\({}_{\mbox{+}}\) and SAFER\({}_{\mbox{++}}\)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {715}, year = {2012}, url = {http://eprint.iacr.org/2012/715}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoWCZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhengQ12, author = {Qun{-}Xiong Zheng and Wen{-}Feng Qi}, title = {Further results on the distinctness of binary sequences derived from primitive sequences modulo square-free odd integers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {709}, year = {2012}, url = {http://eprint.iacr.org/2012/709}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ZhengQ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhengQT12, author = {Qun{-}Xiong Zheng and Wen{-}Feng Qi and Tian Tian}, title = {On the distinctness of binary sequences derived from primitive sequences modulo square-free odd integers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {3}, year = {2012}, url = {http://eprint.iacr.org/2012/003}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ZhengQT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhengXA12, author = {Qingji Zheng and Shouhuai Xu and Giuseppe Ateniese}, title = {Efficient Query Integrity for Outsourced Dynamic Databases}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {493}, year = {2012}, url = {http://eprint.iacr.org/2012/493}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhengXA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhongW12, author = {Xiao Zhong and Mingsheng Wang}, title = {Algebraic Attack on LFSR-Based Multi-Output Stream Ciphers and Research on Algebraic Immunity for Multi-Output Boolean Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {338}, year = {2012}, url = {http://eprint.iacr.org/2012/338}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhongW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Zhou12, author = {Cai{-}xue Zhou}, title = {Cryptanalysis and Improvement of a Multi-Receiver Generalized Signcryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {638}, year = {2012}, url = {http://eprint.iacr.org/2012/638}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Zhou12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhouC12, author = {Jun Zhou and Zhenfu Cao}, title = {{PSCPA:} Patient Self-controllable Privacy-preserving Cooperative Authentication in Distributed m-Healthcare Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {44}, year = {2012}, url = {http://eprint.iacr.org/2012/044}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhouC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Zhu12, author = {Zhian Zhu}, title = {Cryptanalysis of pairing-free certificateless authenticated key agreement protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {253}, year = {2012}, url = {http://eprint.iacr.org/2012/253}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Zhu12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZouWWD12, author = {Jian Zou and Wenling Wu and Shuang Wu and Le Dong}, title = {Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Gr{\o}stl}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {686}, year = {2012}, url = {http://eprint.iacr.org/2012/686}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ZouWWD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Aimani12, title = {The Joint Signature and Encryption Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {154}, year = {2012}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2012/154}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Aimani12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlaouiDVGC12, title = {Extended Security Arguments for (Ring) Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {68}, year = {2012}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2012/068}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlaouiDVGC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AvoineBC12, title = {Discarding the Endpoints makes the Cryptanalytic Time-Memory Trade-Offs even Faster}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {683}, year = {2012}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2012/683}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AvoineBC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CuiM12, title = {Chosen-Ciphertext Secure Efficiently Searchable Encryption in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {109}, year = {2012}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2012/109}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CuiM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DemirelVJ12, title = {Efficient Mix-Net Veri cation by Proofs of Random Blocks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {16}, year = {2012}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2012/016}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DemirelVJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EM12, title = {Design of Secure Image Transmission in {MANET} using Number Theory Based Image Compression and Quasigroup Encryption {(NTICQE)} Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {660}, year = {2012}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2012/660}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GeCMZ12, title = {Short and Efficient Expressive Attribute-Based Signature in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {125}, year = {2012}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2012/125}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GeCMZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HongKK12, title = {New Preimage Attacks on Hash Modes of {AES-256}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {372}, year = {2012}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2012/372}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HongKK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JamilMZUZ12, title = {{STITCH-256:} {A} New Dedicated Cryptographic Hash Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {41}, year = {2012}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2012/041}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JamilMZUZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LangloisS12a, title = {Hardness of decision {(R)LWE} for any modulus}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {91}, year = {2012}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2012/091}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LangloisS12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Li12, title = {Remarks on- an ideal multi-secret sharing scheme based on {MSP}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {86}, year = {2012}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2012/086}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Li12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiL0JW12, title = {Secure Outsourced Attribute-based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {635}, year = {2012}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2012/635}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiL0JW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lin12, title = {The Transformation from the Galois {NLFSR} to the Fibonacci Configuration}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {257}, year = {2012}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2012/257}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lin12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LingS12, title = {A Lattice-Based Traitor Tracing Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {88}, year = {2012}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2012/088}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LingS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MackvandiSN12, title = {Breaking the provably secure {SAKE-C} authenticated key exchange protocol with Extended Key Compromise Impersonation {(E-KCI)} Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {27}, year = {2012}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2012/027}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MackvandiSN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MorchonTGG12, title = {Towards fully collusion-resistant ID-based establishment of pairwise keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {618}, year = {2012}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2012/618}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MorchonTGG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OuZ12, title = {Unbalanced Elementary Symmetric Boolean Functions with the Degree "d" and "wt(d){\(\geq\)} 3"}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {101}, year = {2012}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2012/101}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OuZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Schmidt12, title = {2048XKS - {A} Software Oriented High Security Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {541}, year = {2012}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2012/541}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Schmidt12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelviVR12, title = {On the Security of Attribute Based Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {62}, year = {2012}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2012/062}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelviVR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TangL12, title = {Cryptanalysis of Mun et al.'s anonymous authentication scheme for roaming service in global mobility networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {55}, year = {2012}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2012/055}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TangL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TolueeAS12, title = {An anonymous proxy signature scheme without random oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {313}, year = {2012}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2012/313}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TolueeAS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Toorani12, title = {Security Analysis of {J-PAKE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {21}, year = {2012}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2012/021}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Toorani12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/VigilCWB12, title = {Authenticity, Integrity and Proof-of-Existence for Long-Term Archiving: a Survey}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {499}, year = {2012}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2012/499}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/VigilCWB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangJ12, title = {Higher Order Algebraic Attacks on Stream Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {13}, year = {2012}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2012/013}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangMW12, title = {Secure password-based remote user authentication scheme with non-tamper resistant smart cards}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {227}, year = {2012}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2012/227}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangMW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangSC12, title = {Homomorphic Signature for Identity Authentication in Cloud Computing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {271}, year = {2012}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2012/271}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangSC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XiongQL12, title = {New Construction of Perfect Sequence Set and Low Correlation Zone Sequence Set}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {160}, year = {2012}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2012/160}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XiongQL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangJR12, title = {{DAC-MACS:} Effective Data Access Control for Multi-Authority Cloud Storage Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {419}, year = {2012}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2012/419}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangJR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangLCJWR12, title = {{TAAC:} Temporal Attribute-based Access Control for Multi-Authority Cloud Storage Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {651}, year = {2012}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2012/651}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangLCJWR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangS12, title = {Strongly Authenticated Key Exchange Protocol from Bilinear Groups without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {381}, year = {2012}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2012/381}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangDG12, title = {Cryptanalysis of Hummingbird-2}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {207}, year = {2012}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2012/207}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangDG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.