Search dblp for Publications

export results for "toc:db/journals/iacr/iacr2012.bht:"

 download as .bib file

@article{DBLP:journals/iacr/0001PPR12,
  author       = {Jian Guo and
                  Thomas Peyrin and
                  Axel Poschmann and
                  Matthew J. B. Robshaw},
  title        = {The {LED} Block Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {600},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/600},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001PPR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0002KPT12,
  author       = {Abhishek Jain and
                  Stephan Krenn and
                  Krzysztof Pietrzak and
                  Aris Tentes},
  title        = {Commitments and Efficient Zero-Knowledge Proofs from Hard Learning
                  Problems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {513},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/513},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0002KPT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AaronsonC12,
  author       = {Scott Aaronson and
                  Paul F. Christiano},
  title        = {Quantum Money from Hidden Subspaces},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {171},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/171},
  timestamp    = {Thu, 01 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AaronsonC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaFL12,
  author       = {Michel Abdalla and
                  Dario Fiore and
                  Vadim Lyubashevsky},
  title        = {From Selective to Full Security: Semi-Generic Transformations in the
                  Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {341},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/341},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaFL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdelraheemABL12,
  author       = {Mohamed Ahmed Abdelraheem and
                  Martin {\AA}gren and
                  Peter Beelen and
                  Gregor Leander},
  title        = {On The Distribution of Linear Biases: Three Instructive Examples},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {303},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/303},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdelraheemABL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Abdul-LatipRSS12,
  author       = {Shekh Faisal Abdul{-}Latip and
                  Reza Reyhanitabar and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Fault Analysis of the {KATAN} Family of Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {30},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/030},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Abdul-LatipRSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbeCDKNO12,
  author       = {Masayuki Abe and
                  Melissa Chase and
                  Bernardo David and
                  Markulf Kohlweiss and
                  Ryo Nishimaki and
                  Miyako Ohkubo},
  title        = {Constant-Size Structure-Preserving Signatures: Generic Constructions
                  and Simple Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {285},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/285},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbeCDKNO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbedFLLW12,
  author       = {Farzaneh Abed and
                  Christian Forler and
                  Eik List and
                  Stefan Lucks and
                  Jakob Wenzel},
  title        = {Biclique Cryptanalysis of the {PRESENT} and {LED} Lightweight Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {591},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/591},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbedFLLW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbedLL12,
  author       = {Farzaneh Abed and
                  Eik List and
                  Stefan Lucks},
  title        = {On the Security of the Core of {PRINCE} Against Biclique and Differential
                  Cryptanalysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {712},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/712},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbedLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AdjR12,
  author       = {Gora Adj and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {Square root computation over even extension fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {685},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/685},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AdjR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalDVW12,
  author       = {Shweta Agrawal and
                  Yevgeniy Dodis and
                  Vinod Vaikuntanathan and
                  Daniel Wichs},
  title        = {On Continual Leakage of Discrete Log Representations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {367},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/367},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalDVW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalG0PS12,
  author       = {Shweta Agrawal and
                  Vipul Goyal and
                  Abhishek Jain and
                  Manoj Prabhakaran and
                  Amit Sahai},
  title        = {New Impossibility Results for Concurrent Composition and a Non-Interactive
                  Completeness Theorem for Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {555},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/555},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalG0PS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalGHS12,
  author       = {Shweta Agrawal and
                  Craig Gentry and
                  Shai Halevi and
                  Amit Sahai},
  title        = {Sampling Discrete Gaussians Efficiently and Obliviously},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {714},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/714},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalGHS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalGVW12,
  author       = {Shweta Agrawal and
                  Sergey Gorbunov and
                  Vinod Vaikuntanathan and
                  Hoeteck Wee},
  title        = {Functional Encryption: New Perspectives and Lower Bounds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {468},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/468},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalGVW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AhmadianSA12,
  author       = {Zahra Ahmadian and
                  Mahmoud Salmasizadeh and
                  Mohammad Reza Aref},
  title        = {Recursive Linear and Differential Cryptanalysis of Ultralightweight
                  Authentication Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {489},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/489},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AhmadianSA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AhmadianSA12a,
  author       = {Zahra Ahmadian and
                  Mahmoud Salmasizadeh and
                  Mohammad Reza Aref},
  title        = {Desynchronization Attack on {RAPP} Ultralightweight Authentication
                  Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {490},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/490},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AhmadianSA12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AimaniJ12,
  author       = {Laila El Aimani and
                  Marc Joye},
  title        = {Toward Practical Group Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {155},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/155},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AimaniJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AimaniS12,
  author       = {Laila El Aimani and
                  Olivier Sanders},
  title        = {Efficient Group Signatures in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {627},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/627},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AimaniS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AkKPS12,
  author       = {Murat Ak and
                  Aggelos Kiayias and
                  Serdar Pehlivanoglu and
                  Ali Aydin Sel{\c{c}}uk},
  title        = {Generic Construction of Trace and Revoke Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {531},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/531},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AkKPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Al-Kuwari12,
  author       = {Saif Al{-}Kuwari},
  title        = {On the Indifferentiability of the Integrated-Key Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {9},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/009},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Al-Kuwari12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtCFFP12,
  author       = {Martin R. Albrecht and
                  Carlos Cid and
                  Jean{-}Charles Faug{\`{e}}re and
                  Robert Fitzpatrick and
                  Ludovic Perret},
  title        = {On the Complexity of the {BKW} Algorithm on {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {636},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/636},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbrechtCFFP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtL12,
  author       = {Martin R. Albrecht and
                  Gregor Leander},
  title        = {An All-In-One Approach to Differential Cryptanalysis for Small Block
                  Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {401},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/401},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbrechtL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AliM12,
  author       = {Subidh Ali and
                  Debdeep Mukhopadhyay},
  title        = {Protecting Last Four Rounds of {CLEFIA} is Not Enough Against Differential
                  Fault Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {286},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/286},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AliM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AliMT12,
  author       = {Subidh Ali and
                  Debdeep Mukhopadhyay and
                  Michael Tunstall},
  title        = {Differential Fault Analysis of {AES:} Towards Reaching its Limits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {446},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/446},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AliMT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AliasgariBZS12,
  author       = {Mehrdad Aliasgari and
                  Marina Blanton and
                  Yihua Zhang and
                  Aaron Steele},
  title        = {Secure Computation on Floating Point Numbers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {405},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/405},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AliasgariBZS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlmeidaBBBKB12,
  author       = {Jos{\'{e}} Bacelar Almeida and
                  Manuel Barbosa and
                  Endre Bangerter and
                  Gilles Barthe and
                  Stephan Krenn and
                  Santiago Zanella B{\'{e}}guelin},
  title        = {Full Proof Cryptography: Verifiable Compilation of Efficient Zero-Knowledge
                  Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {258},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/258},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlmeidaBBBKB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnanthB12,
  author       = {Prabhanjan Ananth and
                  Raghav Bhaskar},
  title        = {Non Observability in the Random Oracle Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {710},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/710},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnanthB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnanthBGR12,
  author       = {Prabhanjan Ananth and
                  Raghav Bhaskar and
                  Vipul Goyal and
                  Vanishree Rao},
  title        = {On the (In)security of Fischlin's Paradigm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {721},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/721},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnanthBGR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndreevaBMPR12,
  author       = {Elena Andreeva and
                  Andrey Bogdanov and
                  Bart Mennink and
                  Bart Preneel and
                  Christian Rechberger},
  title        = {On Security Arguments of the Second Round {SHA-3} Candidates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {147},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/147},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AndreevaBMPR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndroulakiKRSC12,
  author       = {Elli Androulaki and
                  Ghassan Karame and
                  Marc Roeschlin and
                  Tobias Scherer and
                  Srdjan Capkun},
  title        = {Evaluating User Privacy in Bitcoin},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {596},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/596},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AndroulakiKRSC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Aono12,
  author       = {Yoshinori Aono},
  title        = {Minkowski sum based lattice construction for solving simultaneous
                  modular equations and applications to {RSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {675},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/675},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Aono12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AonoASW12,
  author       = {Yoshinori Aono and
                  Manindra Agrawal and
                  Takakazu Satoh and
                  Osamu Watanabe},
  title        = {On the Optimality of Lattices for the Coppersmith Technique},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {108},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/108},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AonoASW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AouinatouB12,
  author       = {Rkia Aouinatou and
                  Mostafa Belkasmi},
  title        = {In the point of view security, An efficient scheme in {IBE} with random
                  oracle},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {237},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/237},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AouinatouB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AouinatouB12a,
  author       = {Rkia Aouinatou and
                  Mostafa Belkasmi},
  title        = {Cyptanalysis {CDHP} , {BDHP} and Tate pairing under certain conditions
                  The Tate pairing is less secure than Weil},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {277},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/277},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AouinatouB12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Applebaum12,
  author       = {Benny Applebaum},
  title        = {Garbling {XOR} Gates "For Free" in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {516},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/516},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Applebaum12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ApplebaumIK12,
  author       = {Benny Applebaum and
                  Yuval Ishai and
                  Eyal Kushilevitz},
  title        = {How to Garble Arithmetic Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {255},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/255},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ApplebaumIK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ApplebaumIKW12,
  author       = {Benny Applebaum and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Brent Waters},
  title        = {Encoding Functions with Constant Online Rate or How to Compress Keys
                  in Garbled Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {693},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/693},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ApplebaumIKW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AranhaFKMR12,
  author       = {Diego F. Aranha and
                  Laura Fuentes{-}Casta{\~{n}}eda and
                  Edward Knapp and
                  Alfred Menezes and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {Implementing Pairings at the 192-bit Security Level},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {232},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/232},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AranhaFKMR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AranhaFLR12,
  author       = {Diego F. Aranha and
                  Armando Faz{-}Hern{\'{a}}ndez and
                  Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {Faster implementation of scalar multiplication on Koblitz curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {519},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/519},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AranhaFLR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArifiGF12,
  author       = {Morteza Arifi and
                  Mahmoud Gardeshi and
                  Mohammad Sabzinejad Farash},
  title        = {A New Efficient Authenticated ID-Based Group Key Agreement Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {395},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/395},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArifiGF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArriagaBF12,
  author       = {Afonso Arriaga and
                  Manuel Barbosa and
                  Pooya Farshim},
  title        = {On the Joint Security of Signature and Encryption Schemes under Randomness
                  Reuse: Efficiency and Security Amplification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {382},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/382},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArriagaBF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AsaarS12,
  author       = {Maryam Rajabzadeh Asaar and
                  Mahmoud Salmasizadeh},
  title        = {A Pairing Based Strong Designated Verifier Signature Scheme without
                  Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {61},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/061},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AsaarS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AsaarS12a,
  author       = {Maryam Rajabzadeh Asaar and
                  Mahmoud Salmasizadeh},
  title        = {A Novel Strong Designated Verifier Signature Scheme without Random
                  Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {259},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/259},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AsaarS12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AsaarS12b,
  author       = {Maryam Rajabzadeh Asaar and
                  Mahmoud Salmasizadeh},
  title        = {A Non-delegatable Identity-based Designated Verifier Signature Scheme
                  without Bilinear Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {332},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/332},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AsaarS12b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AsgharLSP12,
  author       = {Hassan Jameel Asghar and
                  Shujun Li and
                  Ron Steinfeld and
                  Josef Pieprzyk},
  title        = {Does Counting Still Count? Revisiting the Security of Counting based
                  User Authentication Protocols against Statistical Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {659},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/659},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AsgharLSP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AsharovO12,
  author       = {Gilad Asharov and
                  Claudio Orlandi},
  title        = {Calling out Cheaters: Covert Security With Public Verifiability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {708},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/708},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AsharovO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtBOSY12,
  author       = {Nuray At and
                  Jean{-}Luc Beuchat and
                  Eiji Okamoto and
                  Ismail San and
                  Teppei Yamazaki},
  title        = {A Low-Area Unified Hardware Architecture for the {AES} and the Cryptographic
                  Hash Function Gr{\o}stl},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {535},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/535},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtBOSY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtBS12,
  author       = {Nuray At and
                  Jean{-}Luc Beuchat and
                  Ismail San},
  title        = {Compact Implementation of Threefish and Skein on {FPGA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {126},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/126},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtBS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseDDV12,
  author       = {Giuseppe Ateniese and
                  {\"{O}}zg{\"{u}}r Dagdelen and
                  Ivan Damg{\aa}rd and
                  Daniele Venturi},
  title        = {Entangled Cloud Storage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {511},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/511},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseDDV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AumassonB12,
  author       = {Jean{-}Philippe Aumasson and
                  Daniel J. Bernstein},
  title        = {SipHash: a fast short-input {PRF}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {351},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/351},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AumassonB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesBU12,
  author       = {Michael Backes and
                  Fabian Bendun and
                  Dominique Unruh},
  title        = {Computational Soundness of Symbolic Zero-knowledge Proofs: Weaker
                  Assumptions and Mechanized Verification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {81},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/081},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesBU12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesDK12,
  author       = {Michael Backes and
                  Amit Datta and
                  Aniket Kate},
  title        = {Asynchronous Computational {VSS} with Reduced Communication Complexity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {619},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/619},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesDK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesM12,
  author       = {Michael Backes and
                  Sebastian Meiser},
  title        = {Differentially Private Smart Metering with Battery Recharging},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {183},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/183},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesMU12,
  author       = {Michael Backes and
                  Ankit Malik and
                  Dominique Unruh},
  title        = {Computational Soundness without Protocol Restrictions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {486},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/486},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesMU12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BagheriSPT12,
  author       = {Nasour Bagheri and
                  Masoumeh Safkhani and
                  Pedro Peris{-}Lopez and
                  Juan E. Tapiador},
  title        = {Cryptanalysis of RAPP, an {RFID} Authentication Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {702},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/702},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BagheriSPT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaiBT12,
  author       = {Shi Bai and
                  Richard P. Brent and
                  Emmanuel Thom{\'{e}}},
  title        = {Root Optimization of Polynomials in the Number Field Sieve},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {691},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/691},
  timestamp    = {Tue, 30 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaiBT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaiTZ12,
  author       = {Shi Bai and
                  Emmanuel Thom{\'{e}} and
                  Paul Zimmermann},
  title        = {Factorisation of {RSA-704} with {CADO-NFS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {369},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/369},
  timestamp    = {Tue, 30 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaiTZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaktirS12,
  author       = {Sel{\c{c}}uk Baktir and
                  Erkay Savas},
  title        = {Highly-Parallel Montgomery Multiplication for Multi-core General-Purpose
                  Microprocessors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {140},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/140},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaktirS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BalaschEEGGGHKKPPRSAKOM12,
  author       = {Josep Balasch and
                  Baris Ege and
                  Thomas Eisenbarth and
                  Beno{\^{\i}}t G{\'{e}}rard and
                  Zheng Gong and
                  Tim G{\"{u}}neysu and
                  Stefan Heyse and
                  St{\'{e}}phanie Kerckhof and
                  Fran{\c{c}}ois Koeune and
                  Thomas Plos and
                  Thomas P{\"{o}}ppelmann and
                  Francesco Regazzoni and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Gilles Van Assche and
                  Ronny Van Keer and
                  Lo{\"{\i}}c van Oldeneel tot Oldenzeel and
                  Ingo von Maurich},
  title        = {Compact Implementation and Performance Evaluation of Hash Functions
                  in ATtiny Devices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {507},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/507},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BalaschEEGGGHKKPPRSAKOM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaldimtsiL12,
  author       = {Foteini Baldimtsi and
                  Anna Lysyanskaya},
  title        = {On The Security of One-Witness Blind Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {197},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/197},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaldimtsiL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaldimtsiL12a,
  author       = {Foteini Baldimtsi and
                  Anna Lysyanskaya},
  title        = {Anonymous Credentials Light},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {298},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/298},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaldimtsiL12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaldwinM12,
  author       = {Brian Baldwin and
                  William P. Marnane},
  title        = {Yet Another {SHA-3} Round 3 {FPGA} Results Paper},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {180},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/180},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaldwinM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BanaAS12,
  author       = {Gergei Bana and
                  Pedro Ad{\~{a}}o and
                  Hideki Sakurada},
  title        = {Computationally Sound Verification of the {NSL} Protocol via Computationally
                  Complete Symbolic Attacker},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {316},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/316},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BanaAS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BanaC12,
  author       = {Gergei Bana and
                  Hubert Comon{-}Lundh},
  title        = {Towards Unconditional Soundness: Computationally Complete Symbolic
                  Attacker},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {19},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/019},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BanaC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BanikMS12,
  author       = {Subhadeep Banik and
                  Subhamoy Maitra and
                  Santanu Sarkar},
  title        = {A Differential Fault Attack on Grain-128a using MACs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {349},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/349},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BanikMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaninT12,
  author       = {Matan Banin and
                  Boaz Tsaban},
  title        = {The Discrete Logarithm Problem in non-representable rings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {320},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/320},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaninT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarbosaF12,
  author       = {Manuel Barbosa and
                  Pooya Farshim},
  title        = {Semantically Secure Functional Encryption, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {474},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/474},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarbosaF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarbulescuBBKM12,
  author       = {Razvan Barbulescu and
                  Joppe W. Bos and
                  Cyril Bouvier and
                  Thorsten Kleinjung and
                  Peter L. Montgomery},
  title        = {Finding ECM-Friendly Curves through a Study of Galois Properties},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {70},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/070},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarbulescuBBKM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarbulescuDEZ12,
  author       = {Razvan Barbulescu and
                  J{\'{e}}r{\'{e}}mie Detrey and
                  Nicolas Estibals and
                  Paul Zimmermann},
  title        = {Finding Optimal Formulae for Bilinear Maps},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {110},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/110},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarbulescuDEZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BardouFKSST12,
  author       = {Romain Bardou and
                  Riccardo Focardi and
                  Yusuke Kawamoto and
                  Lorenzo Simionato and
                  Graham Steel and
                  Joe{-}Kai Tsay},
  title        = {Efficient Padding Oracle Attacks on Cryptographic Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {417},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/417},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BardouFKSST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaronDMOT12,
  author       = {Joshua Baron and
                  Karim El Defrawy and
                  Kirill Minkovich and
                  Rafail Ostrovsky and
                  Eric Tressler},
  title        = {5PM: Secure Pattern Matching},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {698},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/698},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaronDMOT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BartheCGKLB12,
  author       = {Gilles Barthe and
                  Juan Manuel Crespo and
                  Benjamin Gr{\'{e}}goire and
                  C{\'{e}}sar Kunz and
                  Yassine Lakhnech and
                  Santiago Zanella B{\'{e}}guelin},
  title        = {Automated Analysis and Synthesis of Padding-Based Encryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {695},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/695},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BartheCGKLB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarthePB12,
  author       = {Gilles Barthe and
                  David Pointcheval and
                  Santiago Zanella B{\'{e}}guelin},
  title        = {Verified Security of Redundancy-Free Encryption from Rabin and {RSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {308},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/308},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarthePB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BatteyP12,
  author       = {Matthew Battey and
                  Abhishek Parakh},
  title        = {A Quasigroup Based Random Number Generator for Resource Constrained
                  Environments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {471},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/471},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BatteyP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeatGPTW12,
  author       = {Robert Beat and
                  Philipp Grabher and
                  Dan Page and
                  Stefan Tillich and
                  Marcin W{\'{o}}jcik},
  title        = {On Reconfigurable Fabrics and Generic Side-Channel Countermeasures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {353},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/353},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeatGPTW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeckerJMM12,
  author       = {Anja Becker and
                  Antoine Joux and
                  Alexander May and
                  Alexander Meurer},
  title        = {Decoding Random Binary Linear Codes in 2\({}^{\mbox{n/20}}\): How
                  1+1=0 Improves Information Set Decoding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {26},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/026},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeckerJMM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Beheshti-AtashgahBGA12,
  author       = {Mohammad Beheshti{-}Atashgah and
                  Majid Bayat and
                  Mahmoud Gardeshi and
                  Mohammad Reza Aref},
  title        = {Designated Verifier Threshold Proxy Signature Scheme without Random
                  Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {488},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/488},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Beheshti-AtashgahBGA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeimelFM12,
  author       = {Amos Beimel and
                  Oriol Farr{\`{a}}s and
                  Yuval Mintz},
  title        = {Secret Sharing Schemes for Very Dense Graphs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {404},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/404},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeimelFM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeimelOO12,
  author       = {Amos Beimel and
                  Eran Omri and
                  Ilan Orlov},
  title        = {Protocols for Multiparty Coin Toss With Dishonest Majority},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {643},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/643},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeimelOO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BelenkyGKE12,
  author       = {Yaacov Belenky and
                  Zeev Geyzel and
                  Michael Kara{-}Ivanov and
                  Avraham Entelis},
  title        = {Two Exponentiation Algorithms Resistant to Cross-correlation Power
                  Analysis and to Other Known Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {723},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/723},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BelenkyGKE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareBNRSSY12,
  author       = {Mihir Bellare and
                  Zvika Brakerski and
                  Moni Naor and
                  Thomas Ristenpart and
                  Gil Segev and
                  Hovav Shacham and
                  Scott Yilek},
  title        = {Hedged Public-key Encryption: How to Protect against Bad Randomness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {220},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/220},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareBNRSSY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareHR12,
  author       = {Mihir Bellare and
                  Viet Tung Hoang and
                  Phillip Rogaway},
  title        = {Garbling Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {265},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/265},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareHR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareHR12a,
  author       = {Mihir Bellare and
                  Viet Tung Hoang and
                  Phillip Rogaway},
  title        = {Adaptively Secure Garbling with Applications to One-Time Programs
                  and Secure Outsourcing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {564},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/564},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareHR12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareKR12,
  author       = {Mihir Bellare and
                  Sriram Keelveedhi and
                  Thomas Ristenpart},
  title        = {Message-Locked Encryption and Secure Deduplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {631},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/631},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareKR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareO12,
  author       = {Mihir Bellare and
                  Adam O'Neill},
  title        = {Semantically-Secure Functional Encryption: Possibility Results, Impossibility
                  Results and the Quest for a General Definition},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {515},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/515},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellarePT12,
  author       = {Mihir Bellare and
                  Kenneth G. Paterson and
                  Susan Thomson},
  title        = {{RKA} Security beyond the Linear Barrier: IBE, Encryption and Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {514},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/514},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellarePT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareT12,
  author       = {Mihir Bellare and
                  Stefano Tessaro},
  title        = {Polynomial-Time, Semantically-Secure Encryption Achieving the Secrecy
                  Capacity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {22},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/022},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareTR12,
  author       = {Mihir Bellare and
                  Stefano Tessaro and
                  Thomas Ristenpart},
  title        = {Multi-Instance Security and its Application to Password-Based Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {196},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/196},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareTR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareTV12,
  author       = {Mihir Bellare and
                  Stefano Tessaro and
                  Alexander Vardy},
  title        = {A Cryptographic Treatment of the Wiretap Channel},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {15},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/015},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareTV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ben-SassonCGT12,
  author       = {Eli Ben{-}Sasson and
                  Alessandro Chiesa and
                  Daniel Genkin and
                  Eran Tromer},
  title        = {Fast Reductions from RAMs to Delegatable Succinct Constraint Satisfaction
                  Problems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {71},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/071},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ben-SassonCGT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenderDFK12,
  author       = {Jens Bender and
                  {\"{O}}zg{\"{u}}r Dagdelen and
                  Marc Fischlin and
                  Dennis K{\"{u}}gler},
  title        = {Domain-Specifi c Pseudonymous Signatures for the German Identity Card},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {558},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/558},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenderDFK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BensonSW12,
  author       = {Karyn Benson and
                  Hovav Shacham and
                  Brent Waters},
  title        = {The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively
                  Weaker Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {687},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/687},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BensonSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BermanHKN12,
  author       = {Itay Berman and
                  Iftach Haitner and
                  Ilan Komargodski and
                  Moni Naor},
  title        = {Hardness Preserving Reductions via Cuckoo Hashing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {722},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/722},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BermanHKN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernhardFG12,
  author       = {David Bernhard and
                  Georg Fuchsbauer and
                  Essam Ghadafi},
  title        = {Efficient Signatures of Knowledge and {DAA} in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {475},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/475},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernhardFG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernhardPW12,
  author       = {David Bernhard and
                  Olivier Pereira and
                  Bogdan Warinschi},
  title        = {On Necessary and Sufficient Conditions for Private Ballot Submission},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {236},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/236},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernhardPW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinCCLNSY12,
  author       = {Daniel J. Bernstein and
                  Hsieh{-}Chung Chen and
                  Chen{-}Mou Cheng and
                  Tanja Lange and
                  Ruben Niederhagen and
                  Peter Schwabe and
                  Bo{-}Yin Yang},
  title        = {{ECC2K-130} on {NVIDIA} GPUs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {2},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/002},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinCCLNSY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinCCLNSY12a,
  author       = {Daniel J. Bernstein and
                  Hsieh{-}Chung Chen and
                  Chen{-}Mou Cheng and
                  Tanja Lange and
                  Ruben Niederhagen and
                  Peter Schwabe and
                  Bo{-}Yin Yang},
  title        = {Usable assembly language for GPUs: a success story},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {137},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/137},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinCCLNSY12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinDLO12,
  author       = {Daniel J. Bernstein and
                  Jeroen Doumen and
                  Tanja Lange and
                  Jan{-}Jaap Oosterwijk},
  title        = {Faster batch forgery identification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {549},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/549},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinDLO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinL12,
  author       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {The new {SHA-3} software shootout},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {4},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/004},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinL12a,
  author       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Two grumpy giants and a baby},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {294},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/294},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinL12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinL12b,
  author       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Non-uniform cracks in the concrete: the power of free precomputation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {318},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/318},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinL12b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinL12c,
  author       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Never trust a bunny},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {355},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/355},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinL12c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinL12d,
  author       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Computing small discrete logarithms faster},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {458},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/458},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinL12d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhattacherjeeS12,
  author       = {Sanjay Bhattacherjee and
                  Palash Sarkar},
  title        = {Analysis and Trade-Offs for the (Complete Tree) Layered Subset Difference
                  Broadcast Encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {337},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/337},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BhattacherjeeS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BilginNNRS12,
  author       = {Beg{\"{u}}l Bilgin and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen and
                  Georg St{\"{u}}tz},
  title        = {Threshold Implementations of all 3x3 and 4x4 S-boxes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {300},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/300},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BilginNNRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BiryukovPW12,
  author       = {Alex Biryukov and
                  Ivan Pustogarov and
                  Ralf{-}Philipp Weinmann},
  title        = {TorScan: Tracing Long-lived Connections and Differential Scanning
                  Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {432},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/432},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BiryukovPW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bisson12,
  author       = {Gaetan Bisson},
  title        = {Computing endomorphism rings of abelian varieties of dimension two},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {525},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/525},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bisson12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyC12,
  author       = {Nir Bitansky and
                  Alessandro Chiesa},
  title        = {Succinct Arguments from Multi-Prover Interactive Proofs and their
                  Efficiency Benefits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {461},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/461},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BitanskyC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyCCT12,
  author       = {Nir Bitansky and
                  Ran Canetti and
                  Alessandro Chiesa and
                  Eran Tromer},
  title        = {Recursive Composition and Bootstrapping for SNARKs and Proof-Carrying
                  Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {95},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/095},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BitanskyCCT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyCIOP12,
  author       = {Nir Bitansky and
                  Alessandro Chiesa and
                  Yuval Ishai and
                  Rafail Ostrovsky and
                  Omer Paneth},
  title        = {Succinct Non-Interactive Arguments via Linear Interactive Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {718},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/718},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BitanskyCIOP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyGW12,
  author       = {Nir Bitansky and
                  Sanjam Garg and
                  Daniel Wichs},
  title        = {Why "Fiat-Shamir for Proofs" Lacks a Proof},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {705},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/705},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BitanskyGW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyP12,
  author       = {Nir Bitansky and
                  Omer Paneth},
  title        = {On the Impossibility of Approximate Obfuscation and Applications to
                  Resettable Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {729},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/729},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BitanskyP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Blanchet12,
  author       = {Bruno Blanchet},
  title        = {Automatically Verified Mechanized Proof of One-Encryption Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {173},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/173},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Blanchet12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlantonA12,
  author       = {Marina Blanton and
                  Mehrdad Aliasgari},
  title        = {On the (Non-)Reusability of Fuzzy Sketches and Extractors and Security
                  Improvements in the Computational Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {608},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/608},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlantonA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlassNH12,
  author       = {Erik{-}Oliver Blass and
                  Guevara Noubir and
                  Triet Vo Huu},
  title        = {EPiC: Efficient Privacy-Preserving Counting for MapReduce},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {452},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/452},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlassNH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlazyCPV12,
  author       = {Olivier Blazy and
                  C{\'{e}}line Chevalier and
                  David Pointcheval and
                  Damien Vergnaud},
  title        = {Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {284},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/284},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlazyCPV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlondeauGN12,
  author       = {C{\'{e}}line Blondeau and
                  Beno{\^{\i}}t G{\'{e}}rard and
                  Kaisa Nyberg},
  title        = {Multiple Differential Cryptanalysis using {\textbackslash}LLR and
                  {\(\chi\)}\({}^{\mbox{2}}\) Statistics},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {360},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/360},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlondeauGN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoestenS12,
  author       = {Dion Boesten and
                  Boris Skoric},
  title        = {Asymptotic fingerprinting capacity in the Combined Digit Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {184},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/184},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoestenS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogdanovKLSST12,
  author       = {Andrey Bogdanov and
                  Lars R. Knudsen and
                  Gregor Leander and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  John P. Steinberger and
                  Elmar Tischhauser},
  title        = {Key-Alternating Ciphers in a Provable Setting: Encryption Using a
                  Small Number of Public Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {35},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/035},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BogdanovKLSST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoldyrevaCLO12,
  author       = {Alexandra Boldyreva and
                  Nathan Chenette and
                  Younho Lee and
                  Adam O'Neill},
  title        = {Order-Preserving Symmetric Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {624},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/624},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoldyrevaCLO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoldyrevaCO12,
  author       = {Alexandra Boldyreva and
                  Nathan Chenette and
                  Adam O'Neill},
  title        = {Order-Preserving Encryption Revisited: Improved Security Analysis
                  and Alternative Solutions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {625},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/625},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoldyrevaCO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoldyrevaGK12,
  author       = {Alexandra Boldyreva and
                  Vipul Goyal and
                  Virendra Kumar},
  title        = {Identity-based Encryption with Efficient Revocation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {52},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/052},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoldyrevaGK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoldyrevaK12,
  author       = {Alexandra Boldyreva and
                  Virendra Kumar},
  title        = {A New Pseudorandom Generator from Collision-Resistant Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {56},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/056},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoldyrevaK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BondFSW12,
  author       = {Mike Bond and
                  George French and
                  Nigel P. Smart and
                  Gaven J. Watson},
  title        = {The low-call diet: Authenticated Encryption for call counting {HSM}
                  users},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {497},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/497},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BondFSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehZ12,
  author       = {Dan Boneh and
                  Mark Zhandry},
  title        = {Quantum-Secure Message Authentication Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {606},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/606},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonnecazeR12,
  author       = {Alexis Bonnecaze and
                  Robert Rolland},
  title        = {Collecting Data while Preserving Individuals' Privacy: {A} Case Study},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {603},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/603},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonnecazeR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Borghoff12,
  author       = {Julia Borghoff},
  title        = {Mixed-integer Linear Programming in the Analysis of Trivium and Ktantan},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {676},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/676},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Borghoff12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BorghoffCGKKKLNPRRTY12,
  author       = {Julia Borghoff and
                  Anne Canteaut and
                  Tim G{\"{u}}neysu and
                  Elif Bilge Kavun and
                  Miroslav Knezevic and
                  Lars R. Knudsen and
                  Gregor Leander and
                  Ventzislav Nikov and
                  Christof Paar and
                  Christian Rechberger and
                  Peter Rombouts and
                  S{\o}ren S. Thomsen and
                  Tolga Yal{\c{c}}in},
  title        = {{PRINCE} - {A} Low-latency Block Cipher for Pervasive Computing Applications
                  (Full version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {529},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/529},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BorghoffCGKKKLNPRRTY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosCHL12,
  author       = {Joppe W. Bos and
                  Craig Costello and
                  H{\"{u}}seyin Hisil and
                  Kristin E. Lauter},
  title        = {Two is Greater than One},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {670},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/670},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosCHL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosDJ12,
  author       = {Joppe W. Bos and
                  Alina Dudeanu and
                  Dimitar Jetchev},
  title        = {Collision Bounds for the Additive Pollard Rho Algorithm for Solving
                  Discrete Logarithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {87},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/087},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosDJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosK12,
  author       = {Joppe W. Bos and
                  Thorsten Kleinjung},
  title        = {{ECM} at Work},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {89},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/089},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouillaguetDF12,
  author       = {Charles Bouillaguet and
                  Patrick Derbez and
                  Pierre{-}Alain Fouque},
  title        = {Automatic Search of Attacks on round-reduced {AES} and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {69},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/069},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouillaguetDF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouillaguetFV12,
  author       = {Charles Bouillaguet and
                  Pierre{-}Alain Fouque and
                  Amandine V{\'{e}}ber},
  title        = {Graph-Theoretic Algorithms for the "Isomorphism of Polynomials" Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {607},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/607},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouillaguetFV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoureanuV12,
  author       = {Ioana Boureanu and
                  Serge Vaudenay},
  title        = {Several Weak Bit-Commitments Using Seal-Once Tamper-Evident Devices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {380},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/380},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoureanuV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BowersDGJORT12,
  author       = {Kevin D. Bowers and
                  Marten van Dijk and
                  Robert Griffin and
                  Ari Juels and
                  Alina Oprea and
                  Ronald L. Rivest and
                  Nikos Triandopoulos},
  title        = {Defending Against the Unknown Enemy: Applying FlipIt to System Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {579},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/579},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BowersDGJORT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Boyen12,
  author       = {Xavier Boyen},
  title        = {Attribute-Based Functional Encryption on Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {716},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/716},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Boyen12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Brakerski12,
  author       = {Zvika Brakerski},
  title        = {Fully Homomorphic Encryption without Modulus Switching from Classical
                  GapSVP},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {78},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/078},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Brakerski12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Brakerski12a,
  author       = {Zvika Brakerski},
  title        = {When Homomorphism Becomes a Liability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {225},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/225},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Brakerski12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiGH12,
  author       = {Zvika Brakerski and
                  Craig Gentry and
                  Shai Halevi},
  title        = {Packed Ciphertexts in LWE-based Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {565},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/565},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiGH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BraunBMW12,
  author       = {Johannes Braun and
                  Johannes Buchmann and
                  Ciaran Mullan and
                  Alexander Wiesmaier},
  title        = {Long Term Confidentiality: a Survey},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {449},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/449},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BraunBMW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BriaisCCDGJMNP12,
  author       = {S{\'{e}}bastien Briais and
                  St{\'{e}}phane Caron and
                  Jean{-}Michel Cioranesco and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Jacques{-}Henri Jourdan and
                  Arthur Milchior and
                  David Naccache and
                  Thibault Porteboeuf},
  title        = {3D Hardware Canaries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {324},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/324},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BriaisCCDGJMNP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BriaisGD12,
  author       = {S{\'{e}}bastien Briais and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {A formal study of two physical countermeasures against side channel
                  attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {430},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/430},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BriaisGD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrierFKMNAPRV12,
  author       = {Eric Brier and
                  Quentin Fortier and
                  Roman Korkikian and
                  Khalid W. Magld and
                  David Naccache and
                  Guilherme Ozari de Almeida and
                  Adrien Pommellet and
                  A. H. Ragab and
                  Jean Vuillemin},
  title        = {Defensive Leakage Camouflage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {728},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/728},
  timestamp    = {Wed, 19 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BrierFKMNAPRV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BringerCP12,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Alain Patey},
  title        = {Cross-Unlinkable Hierarchical Group Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {407},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/407},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BringerCP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BringerCP12a,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Alain Patey},
  title        = {{SHADE:} Secure HAmming DistancE computation from oblivious transfer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {586},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/586},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BringerCP12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Brown12,
  author       = {Daniel R. L. Brown},
  title        = {Uniform Compression Functions Can Fail to Preserve "Full" Entropy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {665},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/665},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Brown12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrzuskaFSWW12,
  author       = {Christina Brzuska and
                  Marc Fischlin and
                  Nigel P. Smart and
                  Bogdan Warinschi and
                  Stephen C. Williams},
  title        = {Less is More: Relaxed yet Composable Security Notions for Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {242},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/242},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrzuskaFSWW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BulyginW12,
  author       = {Stanislav Bulygin and
                  Michael Walter},
  title        = {Study of the invariant coset attack on PRINTcipher: more weak keys
                  with practical key recovery},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {85},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/085},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BulyginW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Camacho12,
  author       = {Philippe Camacho},
  title        = {Fair Exchange of Short Signatures without Trusted Third Party},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {288},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/288},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Camacho12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischDEN12,
  author       = {Jan Camenisch and
                  Maria Dubovitskaya and
                  Robert R. Enderlein and
                  Gregory Neven},
  title        = {Oblivious Transfer with Hidden Access Control from Attribute-Based
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {348},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/348},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischDEN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischLN12,
  author       = {Jan Camenisch and
                  Anna Lysyanskaya and
                  Gregory Neven},
  title        = {Practical Yet Universally Composable Two-Server Password-Authenticated
                  Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {717},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/717},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischLN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischNR12,
  author       = {Jan Camenisch and
                  Gregory Neven and
                  Markus R{\"{u}}ckert},
  title        = {Fully Anonymous Attribute Tokens from Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {356},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/356},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischNR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiV12,
  author       = {Ran Canetti and
                  Margarita Vald},
  title        = {Universally Composable Security With Local Adversaries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {117},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/117},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanteautFNPRV12,
  author       = {Anne Canteaut and
                  Thomas Fuhr and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Pascal Paillier and
                  Jean{-}Ren{\'{e}} Reinhard and
                  Marion Videau},
  title        = {A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based
                  Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {363},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/363},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanteautFNPRV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletDGM12,
  author       = {Claude Carlet and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Houssem Maghrebi},
  title        = {Leakage Squeezing of Order Two},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {567},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/567},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletDGM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CashKW12,
  author       = {David Cash and
                  Alptekin K{\"{u}}p{\c{c}}{\"{u}} and
                  Daniel Wichs},
  title        = {Dynamic Proofs of Retrievability via Oblivious {RAM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {550},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/550},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CashKW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaiG12,
  author       = {Qi Chai and
                  Guang Gong},
  title        = {A Cryptanalysis of HummingBird-2: The Differential Sequence Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {233},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/233},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaiG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChanLSX12,
  author       = {T.{-}H. Hubert Chan and
                  Mingfei Li and
                  Elaine Shi and
                  Wenchang Xu},
  title        = {Differentially Private Continual Monitoring of Heavy Hitters from
                  Distributed Streams},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {218},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/218},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChanLSX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChanSS12,
  author       = {T.{-}H. Hubert Chan and
                  Elaine Shi and
                  Dawn Song},
  title        = {Optimal Lower Bound for Differentially Private Multi-Party Aggregation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {373},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/373},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChanSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChandranG12,
  author       = {Nishanth Chandran and
                  Sanjam Garg},
  title        = {Hardness Preserving Constructions of Pseudorandom Functions, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {616},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/616},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChandranG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChandranGO12,
  author       = {Nishanth Chandran and
                  Juan A. Garay and
                  Rafail Ostrovsky},
  title        = {Almost-Everywhere Secure Computation with Edge Corruptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {221},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/221},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChandranGO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChandranKOR12,
  author       = {Nishanth Chandran and
                  Bhavana Kanukurthi and
                  Rafail Ostrovsky and
                  Leonid Reyzin},
  title        = {Privacy Amplification with Asymptotically Optimal Entropy Loss},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {501},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/501},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChandranKOR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangY12,
  author       = {Donghoon Chang and
                  Moti Yung},
  title        = {Adaptive Preimage Resistance Analysis Revisited: {\textbackslash}{\textbackslash}
                  Requirements, Subtleties and Implications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {209},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/209},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaseKLM12,
  author       = {Melissa Chase and
                  Markulf Kohlweiss and
                  Anna Lysyanskaya and
                  Sarah Meiklejohn},
  title        = {Malleable Proof Systems and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {12},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/012},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaseKLM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaseKLM12a,
  author       = {Melissa Chase and
                  Markulf Kohlweiss and
                  Anna Lysyanskaya and
                  Sarah Meiklejohn},
  title        = {Succinct Malleable NIZKs and an Application to Compact Shuffles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {506},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/506},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaseKLM12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaseKLM12b,
  author       = {Melissa Chase and
                  Markulf Kohlweiss and
                  Anna Lysyanskaya and
                  Sarah Meiklejohn},
  title        = {Verifiable Elections That Scale for Free},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {697},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/697},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaseKLM12b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaseV12,
  author       = {Melissa Chase and
                  Ivan Visconti},
  title        = {Secure Database Commitments and Universal Arguments of Quasi Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {436},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/436},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaseV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChatterjeeKK12,
  author       = {Sanjit Chatterjee and
                  Chethan Kamath and
                  Vikas Kumar},
  title        = {Galindo-Garcia Identity-Based Signature Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {646},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/646},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChatterjeeKK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chen12,
  author       = {Liqun Chen},
  title        = {Ring Group Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {289},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/289},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Chen12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenLLWW12,
  author       = {Jie Chen and
                  Hoon Wei Lim and
                  San Ling and
                  Huaxiong Wang and
                  Hoeteck Wee},
  title        = {Shorter {IBE} and Signatures via Asymmetric Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {224},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/224},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenLLWW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenLY12,
  author       = {Liqun Chen and
                  Hoon Wei Lim and
                  Guomin Yang},
  title        = {Cross-Domain Password-Based Authenticated Key Exchange Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {397},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/397},
  timestamp    = {Mon, 29 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenLY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenX12,
  author       = {Shao{-}zhen Chen and
                  Tian{-}min Xu},
  title        = {Biclique Attack of the Full {ARIA-256}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {11},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/011},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenZHXH12,
  author       = {Danyang Chen and
                  Yongbin Zhou and
                  Yang Han and
                  Rui Xue and
                  Qing He},
  title        = {On Hardening Leakage Resilience of Random Extractors for Instantiations
                  of Leakage Resilient Cryptographic Primitives},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {114},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/114},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenZHXH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenZZL12,
  author       = {Yu Chen and
                  Jiang Zhang and
                  Zhenfeng Zhang and
                  Dongdai Lin},
  title        = {Integrated {PKE} and {PEKS} - Stronger Security Notions and New Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {692},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/692},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenZZL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Cheng12,
  author       = {Qingfeng Cheng},
  title        = {Cryptanalysis of an Identity-Based Multiple Key Agreement Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {410},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/410},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Cheng12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Cheng12a,
  author       = {Qingfeng Cheng},
  title        = {Cryptanalysis of an efficient certificateless two-party authenticated
                  key agreement protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {725},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/725},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Cheng12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Cheong12,
  author       = {Kai{-}Yuen Cheong},
  title        = {A secret sharing scheme of prime numbers based on hardness of factorization},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {222},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/222},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Cheong12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Cheong12a,
  author       = {Kai{-}Yuen Cheong},
  title        = {One-way Functions from Chebyshev Polynomials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {263},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/263},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Cheong12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Childers12,
  author       = {Greg Childers},
  title        = {Factorization of a 1061-bit number by the Special Number Field Sieve},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {444},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/444},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Childers12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoiKWZ12,
  author       = {Seung Geol Choi and
                  Jonathan Katz and
                  Hoeteck Wee and
                  Hong{-}Sheng Zhou},
  title        = {Efficient, Adaptively Secure, and Composable Oblivious Transfer with
                  a Single, Global {CRS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {700},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/700},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoiKWZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChouCHH12,
  author       = {Jue{-}Sam Chou and
                  Yalin Chen and
                  Chun{-}Hui Huang and
                  Yu{-}Siang Huang},
  title        = {Comments on four multi-server authentication protocols using smart
                  card},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {406},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/406},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChouCHH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoudaryGM12,
  author       = {Omar Choudary and
                  Felix Gr{\"{o}}bert and
                  Joachim Metz},
  title        = {Infiltrate the Vault: Security Analysis and Decryption of Lion Full
                  Disk Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {374},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/374},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoudaryGM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoudhuryHP12,
  author       = {Ashish Choudhury and
                  Martin Hirt and
                  Arpita Patra},
  title        = {Unconditionally Secure Asynchronous Multiparty Computation with Linear
                  Communication Complexity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {517},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/517},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoudhuryHP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoyYKGPPT12,
  author       = {Jiali Choy and
                  Huihui Yap and
                  Khoongming Khoo and
                  Jian Guo and
                  Thomas Peyrin and
                  Axel Poschmann and
                  Chik How Tan},
  title        = {SPN-Hash: Improving the Provable Resistance Against Differential Collision
                  Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {234},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/234},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoyYKGPPT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChuGL12,
  author       = {Dalin Chu and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Zhe Liu},
  title        = {Twisted Edwards-Form Elliptic Curve Cryptography for 8-bit AVR-based
                  Sensor Nodes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {730},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/730},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChuGL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chun-xiangXA12,
  author       = {X. U. Chun{-}xiang and
                  H. E. Xiao{-}hu and
                  Daniel Abraha},
  title        = {Cryptanalysis of auditing protocol proposed by Wang et al. for data
                  storage security in Cloud Computing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {115},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/115},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chun-xiangXA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChungLMP12,
  author       = {Kai{-}Min Chung and
                  Edward Lui and
                  Mohammad Mahmoody and
                  Rafael Pass},
  title        = {Unprovable Security of Two-Message Zero Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {711},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/711},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChungLMP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChungLP12,
  author       = {Kai{-}Min Chung and
                  Huijia Lin and
                  Rafael Pass},
  title        = {Constant-Round Concurrent Zero Knowledge From Falsifiable Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {563},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/563},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChungLP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CissS12,
  author       = {Abdoul Aziz Ciss and
                  Djiby Sow},
  title        = {Pairings on Generalized Huff Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {632},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/632},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CissS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CobanKB12,
  author       = {Mustafa {\c{C}}oban and
                  Ferhat Karako{\c{c}} and
                  {\"{O}}zkan Boztas},
  title        = {Biclique Cryptanalysis of {TWINE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {422},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/422},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CobanKB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Comon-LundhCS12,
  author       = {Hubert Comon{-}Lundh and
                  V{\'{e}}ronique Cortier and
                  Guillaume Scerri},
  title        = {Security proof with dishonest keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {8},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/008},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Comon-LundhCS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ConstantinBG12,
  author       = {Jeremy Constantin and
                  Andreas Burg and
                  Frank K. G{\"{u}}rkaynak},
  title        = {Investigating the Potential of Custom Instruction Set Extensions for
                  {SHA-3} Candidates on a 16-bit Microcontroller Architecture},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {50},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/050},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ConstantinBG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Costello12,
  author       = {Craig Costello},
  title        = {Particularly Friendly Members of Family Trees},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {72},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/072},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Costello12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Courtois12,
  author       = {Nicolas T. Courtois},
  title        = {An Improved Differential Attack on Full {GOST}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {138},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/138},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Courtois12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CremersF12,
  author       = {Cas Cremers and
                  Mich{\`{e}}le Feltz},
  title        = {Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key
                  Reveal},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {416},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/416},
  timestamp    = {Mon, 23 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CremersF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CrepeauK12,
  author       = {Claude Cr{\'{e}}peau and
                  Raza Ali Kazmi},
  title        = {An Analysis of ZVP-Attack on {ECC} Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {329},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/329},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CrepeauK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CristofaroT12,
  author       = {Emiliano De Cristofaro and
                  Gene Tsudik},
  title        = {On the performance of certain Private Set Intersection protocols.
                  (And some remarks on the recent paper by Huang et al. in NDSS'12)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {54},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/054},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CristofaroT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Csirmaz12,
  author       = {L{\'{a}}szl{\'{o}} Csirmaz},
  title        = {Probabilistic Infinite Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {412},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/412},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Csirmaz12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-Soled0KL12,
  author       = {Dana Dachman{-}Soled and
                  Abhishek Jain and
                  Yael Tauman Kalai and
                  Adriana L{\'{o}}pez{-}Alt},
  title        = {On the (In)security of the Fiat-Shamir Paradigm, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {706},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/706},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-Soled0KL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-Soled12,
  author       = {Dana Dachman{-}Soled},
  title        = {On the Impossibility of Sender-Deniable Public Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {727},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/727},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-Soled12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledFMO12,
  author       = {Dana Dachman{-}Soled and
                  Georg Fuchsbauer and
                  Payman Mohassel and
                  Adam O'Neill},
  title        = {Enhanced Chosen-Ciphertext Security and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {543},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/543},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-SoledFMO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledK12,
  author       = {Dana Dachman{-}Soled and
                  Yael Tauman Kalai},
  title        = {Securing Circuits Against Constant-Rate Tampering},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {366},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/366},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-SoledK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaemenA12,
  author       = {Joan Daemen and
                  Gilles Van Assche},
  title        = {Differential propagation analysis of Keccak},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {163},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/163},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DaemenA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DagdelenF12,
  author       = {{\"{O}}zg{\"{u}}r Dagdelen and
                  Marc Fischlin},
  title        = {Unconditionally-Secure Universally Composable Password-Based Key-Exchange
                  based on One-Time Memory Tokens},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {537},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/537},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DagdelenF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DahlNT12,
  author       = {Morten Dahl and
                  Chao Ning and
                  Tomas Toft},
  title        = {On Secure Two-party Integer Division},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {164},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/164},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DahlNT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardKLMS12,
  author       = {Ivan Damg{\aa}rd and
                  Marcel Keller and
                  Enrique Larraia and
                  Christian Miles and
                  Nigel P. Smart},
  title        = {Implementing {AES} via an Actively/Covertly Secure Dishonest-Majority
                  {MPC} Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {262},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/262},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardKLMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardKLPSS12,
  author       = {Ivan Damg{\aa}rd and
                  Marcel Keller and
                  Enrique Larraia and
                  Valerio Pastro and
                  Peter Scholl and
                  Nigel P. Smart},
  title        = {Practical Covertly Secure {MPC} for Dishonest Majority - or: Breaking
                  the {SPDZ} Limits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {642},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/642},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardKLPSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardKM12,
  author       = {Ivan Bjerre Damg{\aa}rd and
                  Jonas K{\"{o}}lker and
                  Peter Bro Miltersen},
  title        = {Secret Sharing and Secure Computing from Monotone Formulae},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {536},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/536},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardKM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardL12,
  author       = {Ivan Damg{\aa}rd and
                  Adriana L{\'{o}}pez{-}Alt},
  title        = {Zero-Knowledge Proofs with Low Amortized Communication from Lattice
                  Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {364},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/364},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardP12,
  author       = {Ivan Damg{\aa}rd and
                  Sunoo Park},
  title        = {Is Public-Key Encryption Based on {LPN} Practical?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {699},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/699},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardZ12,
  author       = {Ivan Damg{\aa}rd and
                  Sarah Zakarias},
  title        = {Constant-Overhead Secure Computation for Boolean Circuits in the Preprocessing
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {512},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/512},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DassanceV12,
  author       = {Fran{\c{c}}ois Dassance and
                  Alexandre Venelli},
  title        = {Combined Attacks on the {AES} Key Schedule},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {98},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/098},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DassanceV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DebandeBBL12,
  author       = {Nicolas Debande and
                  Ma{\"{e}}l Berthier and
                  Yves Bocktaels and
                  Thanh{-}Ha Le},
  title        = {Profiled Model Based Power Simulator for Side Channel Evaluation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {703},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/703},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DebandeBBL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DehbaouiDROMT12,
  author       = {Amine Dehbaoui and
                  Jean{-}Max Dutertre and
                  Bruno Robisson and
                  P. Orsatelli and
                  Philippe Maurine and
                  Assia Tria},
  title        = {Injection of transient faults using electromagnetic pulses -Practical
                  results on a cryptographic system-},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {123},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/123},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DehbaouiDROMT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DemayGHM12,
  author       = {Gr{\'{e}}gory Demay and
                  Peter Gazi and
                  Martin Hirt and
                  Ueli Maurer},
  title        = {Resource-Restricted Indifferentiability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {613},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/613},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DemayGHM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DemirelG12,
  author       = {Denise Demirel and
                  Jeroen van de Graaf},
  title        = {A Publicly-Veri able Mix-net with Everlasting Privacy Towards Observers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {420},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/420},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DemirelG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DengGLWY12,
  author       = {Yi Deng and
                  Juan A. Garay and
                  San Ling and
                  Huaxiong Wang and
                  Moti Yung},
  title        = {On the (Im)Plausibility of Constant-Round Public-Coin Straight-Line-Simulatable
                  Zero-Knowledge Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {508},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/508},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DengGLWY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DengP12,
  author       = {Yingpu Deng and
                  Yanbin Pan},
  title        = {An algorithm for factoring integers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {97},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/097},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DengP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dent12,
  author       = {Alexander W. Dent},
  title        = {Aggregate Signcryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {200},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/200},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dent12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DerbezFJ12,
  author       = {Patrick Derbez and
                  Pierre{-}Alain Fouque and
                  J{\'{e}}r{\'{e}}my Jean},
  title        = {Improved Key Recovery Attacks on Reduced-Round {AES} in the Single-Key
                  Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {477},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/477},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DerbezFJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DevetGH12,
  author       = {Casey Devet and
                  Ian Goldberg and
                  Nadia Heninger},
  title        = {Optimally Robust Private Information Retrieval},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {83},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/083},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DevetGH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DiaoF12,
  author       = {Oumar Diao and
                  Emmanuel Fouotsa},
  title        = {Edwards model of elliptic curves defined over any fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {346},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/346},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DiaoF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Diaz-SantiagoC12,
  author       = {Sandra Diaz{-}Santiago and
                  Debrup Chakraborty},
  title        = {On Securing Communication From Profilers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {124},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/124},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Diaz-SantiagoC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DibertC12,
  author       = {Alexander Dibert and
                  L{\'{a}}szl{\'{o}} Csirmaz},
  title        = {Infinite Secret Sharing - Examples},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {411},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/411},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DibertC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DichtlB12,
  author       = {Markus Dichtl and
                  Pascale B{\"{o}}ffgen},
  title        = {Breaking Another Quasigroup-Based Cryptographic Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {661},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/661},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DichtlB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DijkJOR12,
  author       = {Marten van Dijk and
                  Ari Juels and
                  Alina Oprea and
                  Ronald L. Rivest},
  title        = {FlipIt: The Game of "Stealthy Takeover"},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {103},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/103},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DijkJOR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DijkR12,
  author       = {Marten van Dijk and
                  Ulrich R{\"{u}}hrmair},
  title        = {Physical Unclonable Functions in Cryptographic Protocols: Security
                  Proofs and Impossibility Results},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {228},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/228},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DijkR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ding12,
  author       = {Jintai Ding},
  title        = {New cryptographic constructions using generalized learning with errors
                  problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {387},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/387},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ding12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ding12a,
  author       = {Jintai Ding},
  title        = {A Simple Provably Secure Key Exchange Scheme Based on the Learning
                  with Errors Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {688},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/688},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ding12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DingG12,
  author       = {Lin Ding and
                  Jie Guan},
  title        = {Cryptanalysis of {RAKAPOSHI} Stream Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {696},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/696},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DingG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DingS12,
  author       = {Jintai Ding and
                  Dieter Schmidt},
  title        = {Algebraic attack on lattice based cryptosystems via solving equations
                  over real numbers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {94},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/094},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DingS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DinurDKS12,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  title        = {Efficient Dissection of Composite Problems, with Applications to Cryptanalysis,
                  Knapsacks, and Combinatorial Search Problems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {217},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/217},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DinurDKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DinurDS12,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Adi Shamir},
  title        = {Self-Differential Cryptanalysis of Up to 5 Rounds of {SHA-3}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {672},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/672},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DinurDS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DmitrienkoSTW12,
  author       = {Alexandra Dmitrienko and
                  Ahmad{-}Reza Sadeghi and
                  Sandeep Tamrakar and
                  Christian Wachsmann},
  title        = {SmartTokens: Delegable Access Control with NFC-enabled Smartphones
                  (Full Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {187},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/187},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DmitrienkoSTW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dodis12,
  author       = {Yevgeniy Dodis},
  title        = {Beating Shannon requires {BOTH} efficient adversaries {AND} non-zero
                  advantage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {53},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/053},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dodis12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisJMW12,
  author       = {Yevgeniy Dodis and
                  Abhishek Jain and
                  Tal Moran and
                  Daniel Wichs},
  title        = {Counterexamples to Hardness Amplification Beyond Negligible},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {32},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/032},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisJMW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisKPW12,
  author       = {Yevgeniy Dodis and
                  Eike Kiltz and
                  Krzysztof Pietrzak and
                  Daniel Wichs},
  title        = {Message Authentication, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {59},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/059},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisKPW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisLMV12,
  author       = {Yevgeniy Dodis and
                  Adriana L{\'{o}}pez{-}Alt and
                  Ilya Mironov and
                  Salil P. Vadhan},
  title        = {Differential Privacy with Imperfect Randomness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {435},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/435},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisLMV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DongCCR12,
  author       = {Changyu Dong and
                  Liqun Chen and
                  Jan Camenisch and
                  Giovanni Russello},
  title        = {Fair Private Set Intersection with a Semi-trusted Arbiter},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {252},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/252},
  timestamp    = {Sat, 28 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DongCCR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DoshiJ12,
  author       = {Nishant Doshi and
                  Devesh Jinwala},
  title        = {Updating attribute in {CP-ABE:} {A} New Approach},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {496},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/496},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DoshiJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DoshiJ12a,
  author       = {Nishant Doshi and
                  Devesh Jinwala},
  title        = {Constant Ciphertext Length in {CP-ABE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {500},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/500},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DoshiJ12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingKM12,
  author       = {Nico D{\"{o}}ttling and
                  Daniel Kraschewski and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade},
  title        = {David {\&} Goliath Oblivious Affine Function Evaluation - Asymptotically
                  Optimal Building Blocks for Universally Composable Two-Party Computation
                  from a Single Untrusted Stateful Tamper-Proof Hardware Token},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {135},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/135},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingKM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Driessen12,
  author       = {Benedikt Driessen},
  title        = {Eavesdropping on Satellite Telecommunication Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {51},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/051},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Driessen12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Drylo12,
  author       = {Robert Drylo},
  title        = {Constructing Pairing-Friendly Genus 2 Curves with Split Jacobian},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {427},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/427},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Drylo12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuZ12,
  author       = {Yusong Du and
                  Fangguo Zhang},
  title        = {On the Existence of Boolean Functions with Optimal Resistance against
                  Fast Algebraic Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {210},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/210},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuboisGB12,
  author       = {Renaud Dubois and
                  Aurore Guillevic and
                  Marine Sengelin Le Breton},
  title        = {Improved Broadcast Encryption Scheme with Constant-Size Ciphertext},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {370},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/370},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuboisGB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dubrova12,
  author       = {Elena Dubrova},
  title        = {A List of Maximum Period NLFSRs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {166},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/166},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dubrova12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dubrova12a,
  author       = {Elena Dubrova},
  title        = {A Method for Generating Full Cycles by a Composition of NLFSRs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {492},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/492},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dubrova12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DucasD12,
  author       = {L{\'{e}}o Ducas and
                  Alain Durmus},
  title        = {Ring-LWE in Polynomial Rings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {235},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/235},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DucasD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DupuisNS12,
  author       = {Fr{\'{e}}d{\'{e}}ric Dupuis and
                  Jesper Buus Nielsen and
                  Louis Salvail},
  title        = {Actively Secure Two-Party Evaluation of any Quantum Operation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {304},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/304},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DupuisNS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DurvauxRSOV12,
  author       = {Fran{\c{c}}ois Durvaux and
                  Mathieu Renauld and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Lo{\"{\i}}c van Oldeneel tot Oldenzeel and
                  Nicolas Veyrat{-}Charvillon},
  title        = {Cryptanalysis of the {CHES} 2009/2010 Random Delay Countermeasure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {38},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/038},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DurvauxRSOV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DyerCRS12,
  author       = {Kevin P. Dyer and
                  Scott E. Coull and
                  Thomas Ristenpart and
                  Thomas Shrimpton},
  title        = {Format-Transforming Encryption: More than Meets the {DPI}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {494},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/494},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DyerCRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EjgenbergFLL12,
  author       = {Yael Ejgenberg and
                  Moriya Farbstein and
                  Meital Levy and
                  Yehuda Lindell},
  title        = {{SCAPI:} The Secure Computation Application Programming Interface},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {629},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/629},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EjgenbergFLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ElkhiyaouiBM12,
  author       = {Kaoutar Elkhiyaoui and
                  Erik{-}Oliver Blass and
                  Refik Molva},
  title        = {{T-MATCH:} Privacy-Preserving Item Matching for Storage-Only {RFID}
                  Tags},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {465},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/465},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ElkhiyaouiBM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EnosZ12,
  author       = {Graham Enos and
                  Yuliang Zheng},
  title        = {An ID-Based Signcryption Scheme with Compartmented Secret Sharing
                  for Unsigncryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {528},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/528},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/EnosZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EscalaHLR12,
  author       = {Alex Escala and
                  Javier Herranz and
                  Beno{\^{\i}}t Libert and
                  Carla R{\`{a}}fols},
  title        = {Hierarchical Identity-Based (Lossy) Trapdoor Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {503},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/503},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EscalaHLR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EssexCHA12,
  author       = {Aleksander Essex and
                  Jeremy Clark and
                  Urs Hengartner and
                  Carlisle Adams},
  title        = {Eperio: Mitigating Technical Complexity in Cryptographic Election
                  Verification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {178},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/178},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EssexCHA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FanV12,
  author       = {Junfeng Fan and
                  Frederik Vercauteren},
  title        = {Somewhat Practical Fully Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {144},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/144},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FanV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FarashA12,
  author       = {Mohammad Sabzinejad Farash and
                  Mahmoud Ahmadian{-}Attari},
  title        = {An ID-Based Key Agreement Protocol Based on {ECC} Among Users of Separate
                  Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {394},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/394},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FarashA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FarashAB12,
  author       = {Mohammad Sabzinejad Farash and
                  Mahmoud Ahmadian{-}Attari and
                  Majid Bayat},
  title        = {A Certificateless Multiple-key Agreement Protocol Based on Bilinear
                  Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {393},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/393},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FarashAB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FarashahiWZ12,
  author       = {Reza Rezaeian Farashahi and
                  Hongfeng Wu and
                  Changan Zhao},
  title        = {Efficient Arithmetic on Hessian Curves over Fields of Characteristic
                  Three},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {122},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/122},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FarashahiWZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FarrasP12,
  author       = {Oriol Farr{\`{a}}s and
                  Carles Padr{\'{o}}},
  title        = {Extending Brickell-Davenport Theorem to Non-Perfect Secret Sharing
                  Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {595},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/595},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FarrasP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FarrasPXY12,
  author       = {Oriol Farr{\`{a}}s and
                  Carles Padr{\'{o}} and
                  Chaoping Xing and
                  An Yang},
  title        = {Natural Generalizations of Threshold Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {680},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/680},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FarrasPXY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FarshimLPQ12,
  author       = {Pooya Farshim and
                  Beno{\^{\i}}t Libert and
                  Kenneth G. Paterson and
                  Elizabeth A. Quaglia},
  title        = {Robust Encryption, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {673},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/673},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FarshimLPQ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FatemiEA12,
  author       = {Mitra Fatemi and
                  Taraneh Eghlidos and
                  Mohammad Reza Aref},
  title        = {An Efficient Multistage Secret Sharing Scheme Using Linear One-way
                  Functions and Bilinear Maps},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {121},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/121},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FatemiEA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaugereGHR12,
  author       = {Jean{-}Charles Faug{\`{e}}re and
                  Pierrick Gaudry and
                  Louise Huot and
                  Gu{\'{e}}na{\"{e}}l Renault},
  title        = {Using Symmetries in the Index Calculus for Elliptic Curves Discrete
                  Logarithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {199},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/199},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FaugereGHR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustHNNZ12,
  author       = {Sebastian Faust and
                  Carmit Hazay and
                  Jesper Buus Nielsen and
                  Peter Sebastian Nordholt and
                  Angela Zottarel},
  title        = {Signature Schemes Secure against Hard-to-Invert Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {45},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/045},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FaustHNNZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustKMV12,
  author       = {Sebastian Faust and
                  Markulf Kohlweiss and
                  Giorgia Azzurra Marson and
                  Daniele Venturi},
  title        = {On the Non-malleability of the Fiat-Shamir Transform},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {704},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/704},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FaustKMV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FazioP12,
  author       = {Nelly Fazio and
                  Irippuge Milinda Perera},
  title        = {Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {129},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/129},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FazioP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FioreG12,
  author       = {Dario Fiore and
                  Rosario Gennaro},
  title        = {Publicly Verifiable Delegation of Large Polynomials and Matrix Computations,
                  with Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {281},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/281},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FioreG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FioreG12a,
  author       = {Dario Fiore and
                  Rosario Gennaro},
  title        = {Improved Publicly Verifiable Delegation of Large Polynomials and Matrix
                  Computations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {434},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/434},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FioreG12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FischlinO12,
  author       = {Marc Fischlin and
                  Cristina Onete},
  title        = {Provably Secure Distance-Bounding: an Analysis of Prominent Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {128},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/128},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FischlinO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FleischhackerMS12,
  author       = {Nils Fleischhacker and
                  Mark Manulis and
                  Amir Azodi},
  title        = {Modular Design and Analysis Framework for Multi-Factor Authentication
                  and Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {181},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/181},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FleischhackerMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FleischmannFLW12,
  author       = {Ewan Fleischmann and
                  Christian Forler and
                  Stefan Lucks and
                  Jakob Wenzel},
  title        = {The Collision Security of {MDC-4} The Collision Security of {MDC-4}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {96},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/096},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FleischmannFLW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FletcherDD12,
  author       = {Christopher W. Fletcher and
                  Marten van Dijk and
                  Srinivas Devadas},
  title        = {Compilation Techniques for Efficient Encrypted Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {266},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/266},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FletcherDD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FloriM12,
  author       = {Jean{-}Pierre Flori and
                  Sihem Mesnager},
  title        = {Dickson polynomials, hyperelliptic curves and hyper-bent functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {20},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/020},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FloriM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FouqueGLTZ12,
  author       = {Pierre{-}Alain Fouque and
                  Nicolas Guillermin and
                  Delphine Leresteux and
                  Mehdi Tibouchi and
                  Jean{-}Christophe Zapalowicz},
  title        = {Attacking {RSA-CRT} Signatures with Faults on Montgomery Multiplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {172},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/172},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FouqueGLTZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FrancillonNRT12,
  author       = {Aur{\'{e}}lien Francillon and
                  Quan Nguyen and
                  Kasper Bonne Rasmussen and
                  Gene Tsudik},
  title        = {Systematic Treatment of Remote Attestation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {713},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/713},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FrancillonNRT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FranklinZ12,
  author       = {Matthew K. Franklin and
                  Haibin Zhang},
  title        = {Unique Group Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {204},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/204},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FranklinZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FranklinZ12a,
  author       = {Matthew K. Franklin and
                  Haibin Zhang},
  title        = {A Framework for Unique Ring Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {577},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/577},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FranklinZ12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Freeman12,
  author       = {David Mandell Freeman},
  title        = {Improved Security for Linearly Homomorphic Signatures: {A} Generic
                  Framework},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {60},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/060},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Freeman12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FreireHKP12,
  author       = {Eduarda S. V. Freire and
                  Dennis Hofheinz and
                  Eike Kiltz and
                  Kenneth G. Paterson},
  title        = {Non-Interactive Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {732},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/732},
  timestamp    = {Wed, 22 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FreireHKP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FreirePP12,
  author       = {Eduarda S. V. Freire and
                  Kenneth G. Paterson and
                  Bertram Poettering},
  title        = {Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment
                  Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {645},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/645},
  timestamp    = {Wed, 22 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FreirePP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FujiokaSXY12,
  author       = {Atsushi Fujioka and
                  Koutarou Suzuki and
                  Keita Xagawa and
                  Kazuki Yoneyama},
  title        = {Strongly Secure Authenticated Key Exchange from Factoring, Codes,
                  and Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {211},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/211},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FujiokaSXY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Fujisaki12,
  author       = {Eiichiro Fujisaki},
  title        = {A Framework for Efficient Fully-Equipped {UC} Commitments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {379},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/379},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Fujisaki12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FullerOR12,
  author       = {Benjamin Fuller and
                  Adam O'Neill and
                  Leonid Reyzin},
  title        = {A Unified Approach to Deterministic Encryption: New Constructions
                  and a Connection to Computational Entropy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {5},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/005},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FullerOR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FullerR12,
  author       = {Benjamin Fuller and
                  Leonid Reyzin},
  title        = {Computational Entropy and Information Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {466},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/466},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FullerR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GajHRSS12,
  author       = {Kris Gaj and
                  Ekawat Homsirikamol and
                  Marcin Rogawski and
                  Rabia Shahid and
                  Malik Umar Sharif},
  title        = {Comprehensive Evaluation of High-Speed and Medium-Speed Implementations
                  of Five {SHA-3} Finalists Using Xilinx and Altera FPGAs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {368},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/368},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GajHRSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithZ12,
  author       = {Steven D. Galbraith and
                  Chang{-}An Zhao},
  title        = {Self-pairings on Hyperelliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {267},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/267},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalindoHV12,
  author       = {David Galindo and
                  Javier Herranz and
                  Jorge Luis Villar},
  title        = {Identity-Based Encryption with Master Key-Dependent Message Security
                  and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {142},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/142},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalindoHV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GangopadhyayPS12,
  author       = {Sugata Gangopadhyay and
                  Enes Pasalic and
                  Pantelimon Stanica},
  title        = {A note on generalized bent criteria for Boolean functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {325},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/325},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GangopadhyayPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaoWCW12,
  author       = {Wei Gao and
                  Guilin Wang and
                  Kefei Chen and
                  Xueli Wang},
  title        = {Provably Secure Generic Construction of Certificate Based Signature
                  from Certificateless Signature in Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {104},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/104},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaoWCW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaoWCW12a,
  author       = {Wei Gao and
                  Guilin Wang and
                  Kefei Chen and
                  Xueli Wang},
  title        = {Generic Construction of Certificate Based Encryption from Certificateless
                  Encryption Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {105},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/105},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaoWCW12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaoWCWZ12,
  author       = {Wei Gao and
                  Guilin Wang and
                  Kefei Chen and
                  Xueli Wang and
                  Guoyan Zhang},
  title        = {Efficient identity-based threshold decryption scheme from bilinear
                  pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {75},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/075},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaoWCWZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaoWWC12,
  author       = {Wei Gao and
                  Guilin Wang and
                  Xueli Wang and
                  Kefei Chen},
  title        = {Efficient identity-based threshold signature scheme from bilinear
                  pairings in the standard model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {73},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/073},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaoWWC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarayGO12,
  author       = {Juan A. Garay and
                  Clint Givens and
                  Rafail Ostrovsky},
  title        = {Broadcast-Efficient Secure Multiparty Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {130},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/130},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarayGO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarayJKY12,
  author       = {Juan A. Garay and
                  David S. Johnson and
                  Aggelos Kiayias and
                  Moti Yung},
  title        = {Resource-based Corruptions and the Combinatorics of Hidden Diversity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {556},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/556},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarayJKY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargGH12,
  author       = {Sanjam Garg and
                  Craig Gentry and
                  Shai Halevi},
  title        = {Candidate Multilinear Maps from Ideal Lattices and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {610},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/610},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargGH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargKOV12,
  author       = {Sanjam Garg and
                  Abishek Kumarasubramanian and
                  Rafail Ostrovsky and
                  Ivan Visconti},
  title        = {Impossibility Results for Static Input Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {433},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/433},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargKOV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargS12,
  author       = {Sanjam Garg and
                  Amit Sahai},
  title        = {Adaptively Secure Multi-Party Computation with Dishonest Majority},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {441},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/441},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GauthierOT12,
  author       = {Val{\'{e}}rie Gauthier and
                  Ayoub Otmani and
                  Jean{-}Pierre Tillich},
  title        = {A Distinguisher-Based Attack of a Homomorphic Encryption Scheme Relying
                  on Reed-Solomon Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {168},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/168},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GauthierOT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gavin12,
  author       = {G{\'{e}}rald Gavin},
  title        = {{RSA} modulus generation in the two-party case},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {336},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/336},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gavin12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaziT12,
  author       = {Peter Gazi and
                  Stefano Tessaro},
  title        = {Efficient and Optimally Secure Key-Length Extension for Block Ciphers
                  via Randomized Cascading},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {158},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/158},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaziT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GehrkeHLP12,
  author       = {Johannes Gehrke and
                  Michael Hay and
                  Edward Lui and
                  Rafael Pass},
  title        = {Crowd-Blending Privacy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {456},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/456},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GehrkeHLP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GellesOW12,
  author       = {Ran Gelles and
                  Rafail Ostrovsky and
                  Kina Winoto},
  title        = {Multiparty Proximity Testing with Dishonest Majority from Equality
                  Testing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {378},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/378},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GellesOW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GennaroGPR12,
  author       = {Rosario Gennaro and
                  Craig Gentry and
                  Bryan Parno and
                  Mariana Raykova},
  title        = {Quadratic Span Programs and Succinct NIZKs without PCPs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {215},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/215},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GennaroGPR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GennaroW12,
  author       = {Rosario Gennaro and
                  Daniel Wichs},
  title        = {Fully Homomorphic Message Authenticators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {290},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/290},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GennaroW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryHS12,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Nigel P. Smart},
  title        = {Homomorphic Evaluation of the {AES} Circuit},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {99},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/099},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryHS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryHS12a,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Nigel P. Smart},
  title        = {Ring Switching in BGV-Style Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {240},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/240},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryHS12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GerbushLOW12,
  author       = {Michael Gerbush and
                  Allison B. Lewko and
                  Adam O'Neill and
                  Brent Waters},
  title        = {Dual Form Signatures: An Approach for Proving Security from Static
                  Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {261},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/261},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GerbushLOW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GhoshD12,
  author       = {Satrajit Ghosh and
                  Abhijit Das},
  title        = {Improvements of Algebraic Attacks Based on Structured Gaussian Elimination},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {176},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/176},
  timestamp    = {Sat, 26 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GhoshD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GierlichsST12,
  author       = {Benedikt Gierlichs and
                  J{\"{o}}rn{-}Marc Schmidt and
                  Michael Tunstall},
  title        = {Infective Computation and Dummy Rounds: Fault Protection for Block
                  Ciphers without Check-before-Output},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {678},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/678},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GierlichsST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GiesenKS12,
  author       = {Florian Giesen and
                  Florian Kohlar and
                  Douglas Stebila},
  title        = {On the Security of {TLS} Renegotiation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {630},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/630},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GiesenKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GligoroskiS12,
  author       = {Danilo Gligoroski and
                  Simona Samardjiska},
  title        = {The Multivariate Probabilistic Encryption Scheme {MQQ-ENC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {328},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/328},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GligoroskiS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldwasserKPVZ12,
  author       = {Shafi Goldwasser and
                  Yael Tauman Kalai and
                  Raluca A. Popa and
                  Vinod Vaikuntanathan and
                  Nickolai Zeldovich},
  title        = {Succinct Functional Encryption and Applications: Reusable Garbled
                  Circuits and Beyond},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {733},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/733},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldwasserKPVZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GongAF12,
  author       = {Guang Gong and
                  Mark D. Aagaard and
                  Xinxin Fan},
  title        = {Resilience to Distinguishing Attacks on {WG-7} Cipher and Their Generalizations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {681},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/681},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GongAF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GorbunovVW12,
  author       = {Sergey Gorbunov and
                  Vinod Vaikuntanathan and
                  Hoeteck Wee},
  title        = {Functional Encryption with Bounded Collusions via Multi-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {521},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/521},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GorbunovVW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalPS12,
  author       = {Vipul Goyal and
                  Omkant Pandey and
                  Amit Sahai},
  title        = {Round-Efficient Concurrently Composable Secure Computation via a Robust
                  Extraction Lemma},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {652},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/652},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GraepelLN12,
  author       = {Thore Graepel and
                  Kristin E. Lauter and
                  Michael Naehrig},
  title        = {{ML} Confidential: Machine Learning on Encrypted Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {323},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/323},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GraepelLN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrewalALHJ12,
  author       = {Gurleen Grewal and
                  Reza Azarderakhsh and
                  Patrick Longa and
                  Shi Hu and
                  David Jao},
  title        = {Efficient Implementation of Bilinear Pairings on {ARM} Processors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {408},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/408},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrewalALHJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrootSVL12,
  author       = {Joep A. de Groot and
                  Boris Skoric and
                  Niels de Vreede and
                  Jean{-}Paul M. G. Linnartz},
  title        = {Information Leakage of Continuous-Source Zero Secrecy Leakage Helper
                  Data Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {566},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/566},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrootSVL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gu12,
  author       = {Chunsheng Gu},
  title        = {Attack on Fully Homomorphic Encryption over the Integers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {157},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/157},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gu12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gueron12,
  author       = {Shay Gueron},
  title        = {A j-lanes tree hashing mode and j-lanes {SHA-256}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {476},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/476},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gueron12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GueronK12,
  author       = {Shay Gueron and
                  Vlad Krasnov},
  title        = {Parallelizing message schedules to accelerate the computations of
                  hash functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {67},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/067},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GueronK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GueronK12a,
  author       = {Shay Gueron and
                  Vlad Krasnov},
  title        = {Simultaneous hashing of multiple messages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {371},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/371},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GueronK12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoGZ12,
  author       = {Ying{-}ming Guo and
                  Guang{-}pu Gao and
                  Ya{-}qun Zhao},
  title        = {Recent Results on Balanced Symmetric Boolean Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {93},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/093},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoGZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoLWH12,
  author       = {Teng Guo and
                  Feng Liu and
                  Chuan Kun Wu and
                  YoungChang Hou},
  title        = {Using Variance to Analyze Visual Cryptography Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {315},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/315},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoLWH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoMK12,
  author       = {Xiaofei Guo and
                  Debdeep Mukhopadhyay and
                  Ramesh Karri},
  title        = {Provably Secure Concurrent Error Detection Against Differential Fault
                  Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {552},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/552},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoMK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoXSF12,
  author       = {Xiaopei Guo and
                  Kejian Xu and
                  Tongsen Sun and
                  Xiubin Fan},
  title        = {Analysis of Minimum Numbers of Linearly Active S-Boxes of a Class
                  of Generalized Feistel Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {169},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/169},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoXSF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuptaCK12,
  author       = {Sourav Sen Gupta and
                  Anupam Chattopadhyay and
                  Ayesha Khalid},
  title        = {Designing Integrated Accelerator for Stream Ciphers with Structural
                  Similarities},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {48},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/048},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GuptaCK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuptaS12,
  author       = {Divya Gupta and
                  Amit Sahai},
  title        = {On Constant-Round Concurrent Zero-Knowledge from a Knowledge Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {572},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/572},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuptaS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GyorfiCHB12,
  author       = {Tamas Gy{\"{o}}rfi and
                  Octavian Cret and
                  Guillaume Hanrot and
                  Nicolas Brisebarre},
  title        = {High-Throughput Hardware Architecture for the {SWIFFT} / {SWIFFTX}
                  Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {343},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/343},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GyorfiCHB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HabeebKS12,
  author       = {Maggie E. Habeeb and
                  Delaram Kahrobaei and
                  Vladimir Shpilrain},
  title        = {A Secret Sharing Scheme Based on Group Presentations and the Word
                  Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {246},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/246},
  timestamp    = {Tue, 03 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HabeebKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaitnerOZ12,
  author       = {Iftach Haitner and
                  Eran Omri and
                  Hila Zarosim},
  title        = {On the Power of Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {573},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/573},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaitnerOZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HajiabadiK12,
  author       = {Mohammad Hajiabadi and
                  Bruce M. Kapron},
  title        = {Computational Soundness of Coinductive Symbolic Security under Active
                  Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {560},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/560},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HajiabadiK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hamburg12,
  author       = {Mike Hamburg},
  title        = {Fast and compact elliptic-curve cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {309},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/309},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hamburg12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HanWL12,
  author       = {Lidong Han and
                  Wei Wei and
                  Mingjie Liu},
  title        = {On the Multiple Fault Attack on {RSA} Signatures with LSBs of Messages
                  Unknown},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {491},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/491},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HanWL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HanaokaMS12,
  author       = {Goichiro Hanaoka and
                  Takahiro Matsuda and
                  Jacob C. N. Schuldt},
  title        = {On the Impossibility of Constructing Efficient Key Encapsulation and
                  Programmable Hash Functions in Prime Order Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {448},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/448},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HanaokaMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HanleyKT12,
  author       = {Neil Hanley and
                  HeeSeok Kim and
                  Michael Tunstall},
  title        = {Exploiting Collisions in Addition Chain-based Exponentiation Algorithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {485},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/485},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HanleyKT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaoC12,
  author       = {Feng Hao and
                  Dylan Clarke},
  title        = {Security Analysis of a Multi-Factor Authenticated Key Exchange Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {39},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/039},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaoC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HayashiSST12,
  author       = {Takuya Hayashi and
                  Takeshi Shimoyama and
                  Naoyuki Shinohara and
                  Tsuyoshi Takagi},
  title        = {Breaking pairing-based cryptosystems using {\(\eta\)}\({}_{\mbox{T}}\)
                  pairing over GF(3\({}^{\mbox{97}}\))},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {345},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/345},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HayashiSST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HazayLWW12,
  author       = {Carmit Hazay and
                  Adriana L{\'{o}}pez{-}Alt and
                  Hoeteck Wee and
                  Daniel Wichs},
  title        = {Leakage-Resilient Cryptography from Minimal Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {604},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/604},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HazayLWW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/He12,
  author       = {Debiao He},
  title        = {Robust biometric-based user authentication scheme for wireless sensor
                  networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {203},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/203},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/He12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/He12a,
  author       = {Debiao He},
  title        = {Cryptanalysis of a Provably Secure Gateway-Oriented Password-Based
                  Authenticated Key Exchange Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {312},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/312},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/He12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeT12,
  author       = {Debiao He and
                  Miaomiao Tian},
  title        = {A note on 'An efficient certificateless aggregate signature with constant
                  pairing computations'},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {445},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/445},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HirtLMR12,
  author       = {Martin Hirt and
                  Christoph Lucas and
                  Ueli Maurer and
                  Dominik Raub},
  title        = {Passive Corruption in Statistical Multi-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {272},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/272},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HirtLMR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hofheinz12,
  author       = {Dennis Hofheinz},
  title        = {Circular chosen-ciphertext security with compact ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {150},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/150},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hofheinz12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HofheinzJ12,
  author       = {Dennis Hofheinz and
                  Tibor Jager},
  title        = {Tightly Secure Signatures and Public-Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {311},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/311},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HofheinzJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HohenbergerLW12,
  author       = {Susan Hohenberger and
                  Allison B. Lewko and
                  Brent Waters},
  title        = {Detecting Dangerous Queries: {A} New Approach for Chosen Ciphertext
                  Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {6},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/006},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HohenbergerLW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HomsirikamolMRS12,
  author       = {Ekawat Homsirikamol and
                  Pawel Morawiecki and
                  Marcin Rogawski and
                  Marian Srebrny},
  title        = {Security margin evaluation of {SHA-3} contest finalists through SAT-based
                  attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {421},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/421},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HomsirikamolMRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HongK12,
  author       = {Deukjo Hong and
                  Daesung Kwon},
  title        = {New Preimage Attack on {MDC-4}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {633},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/633},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HongK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HongK12a,
  author       = {Deukjo Hong and
                  Daesung Kwon},
  title        = {Cryptanalysis of Double-Block-Length Hash Mode {MJH}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {634},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/634},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HongK12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HsuZCC12,
  author       = {Ching{-}Fang Hsu and
                  Bing Zeng and
                  Qi Cheng and
                  Guohua Cui},
  title        = {A novel Group Key Transfer Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {43},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/043},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HsuZCC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuW12,
  author       = {Yupu Hu and
                  Fenghe Wang},
  title        = {An Attack on a Fully Homomorphic Encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {561},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/561},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangL12,
  author       = {Jialin Huang and
                  Xuejia Lai},
  title        = {Transposition of {AES} Key Schedule},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {260},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/260},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangL12a,
  author       = {Jialin Huang and
                  Xuejia Lai},
  title        = {Revisiting Key Schedule's Diffusion In Relation With Round Function's
                  Diffusion},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {415},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/415},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangL12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangL12b,
  author       = {Jialin Huang and
                  Xuejia Lai},
  title        = {What is the Effective Key Length for a Block Cipher: an Attack on
                  Every Block Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {677},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/677},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangL12b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangLQ12,
  author       = {Zhengan Huang and
                  Shengli Liu and
                  Baodong Qin},
  title        = {Sender Equivocable Encryption Schemes Secure against Chosen-Ciphertext
                  Attacks Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {473},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/473},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangLQ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangLY12,
  author       = {Yun{-}Ju Huang and
                  Feng{-}Hao Liu and
                  Bo{-}Yin Yang},
  title        = {Public-Key Cryptography from New Multivariate Quadratic Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {273},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/273},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangLY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Iftene12,
  author       = {Sorin Iftene},
  title        = {Some Connections Between Primitive Roots and Quadratic Non-Residues
                  Modulo a Prime},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {470},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/470},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Iftene12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ionica12,
  author       = {Sorina Ionica},
  title        = {Pairing-based algorithms for jacobians of genus 2 curves with maximal
                  endomorphism ring},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {167},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/167},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ionica12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ishiguro12,
  author       = {Tsukasa Ishiguro},
  title        = {Modified version of "Latin Dances Revisited: New Analytic Results
                  of Salsa20 and ChaCha"},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {65},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/065},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ishiguro12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IwataOM12,
  author       = {Tetsu Iwata and
                  Keisuke Ohashi and
                  Kazuhiko Minematsu},
  title        = {Breaking and Repairing {GCM} Security Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {438},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/438},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IwataOM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JainORV12,
  author       = {Abhishek Jain and
                  Rafail Ostrovsky and
                  Silas Richelson and
                  Ivan Visconti},
  title        = {Concurrent Zero Knowledge in the Bounded Player Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {279},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/279},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JainORV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Jeong12,
  author       = {Kitae Jeong},
  title        = {Differential Fault Analysis on Block Cipher Piccolo},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {399},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/399},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Jeong12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JeongKLSH12,
  author       = {Kitae Jeong and
                  HyungChul Kang and
                  Changhoon Lee and
                  Jaechul Sung and
                  Seokhie Hong},
  title        = {Biclique Cryptanalysis of Lightweight Block Ciphers PRESENT, Piccolo
                  and {LED}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {621},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/621},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JeongKLSH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JiangD12,
  author       = {Yupeng Jiang and
                  Yingpu Deng},
  title        = {New results on nonexistence of generalized bent functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {467},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/467},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JiangD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Joux12,
  author       = {Antoine Joux},
  title        = {Faster index calculus for the medium prime case. Application to 1175-bit
                  and 1425-bit finite fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {720},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/720},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Joux12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JovanovicKP12,
  author       = {Philipp Jovanovic and
                  Martin Kreuzer and
                  Ilia Polian},
  title        = {An Algebraic Fault Attack on the {LED} Block Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {400},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/400},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JovanovicKP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JutlaY12,
  author       = {Charanjit S. Jutla and
                  Moti Yung},
  title        = {PayTree: "Amortized Signature" for Flexible Micro-Payments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {10},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/010},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JutlaY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KVR12,
  author       = {K. Preetha Mathew and
                  Sachin Vasant and
                  C. Pandu Rangan},
  title        = {On Provably Secure Code-Based Signature and Signcryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {585},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/585},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KVR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KalyanaramanO12,
  author       = {Mukund Kalyanaraman and
                  Michael Orshansky},
  title        = {Highly Secure Strong {PUF} based on Nonlinearity of {MOSFET} Subthreshold
                  Operation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {413},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/413},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KalyanaramanO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KamaraMR12,
  author       = {Seny Kamara and
                  Payman Mohassel and
                  Ben Riva},
  title        = {Salus: {A} System for Server-Aided Secure Function Evaluation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {542},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/542},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KamaraMR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KamaraPR12,
  author       = {Seny Kamara and
                  Charalampos Papamanthou and
                  Tom Roeder},
  title        = {Dynamic Searchable Symmetric Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {530},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/530},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KamaraPR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kar12,
  author       = {Jayaprakash Kar},
  title        = {Provably Secure Online/Off-line Identity-Based Signature Scheme for
                  Wireless Sensor Network},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {162},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/162},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kar12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kar12a,
  author       = {Jayaprakash Kar},
  title        = {An Efficient Signcryption Scheme from q-Diffie-Hellman Problems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {483},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/483},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kar12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KarameAC12,
  author       = {Ghassan Karame and
                  Elli Androulaki and
                  Srdjan Capkun},
  title        = {Two Bitcoins at the Price of One? Double-Spending Attacks on Fast
                  Payments in Bitcoin},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {248},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/248},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KarameAC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KaratiDC12,
  author       = {Sabyasachi Karati and
                  Abhijit Das and
                  Dipanwita Roy Chowdhury},
  title        = {Using Randomizers for Batch Verification of {ECDSA} Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {582},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/582},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KaratiDC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kasahara12,
  author       = {Masao Kasahara},
  title        = {Public Key Cryptosystems Constructed Based on Reed-Solomon Codes,
                  K(XV)SE(2)PKC, Realizing Coding Rate of Exactly 1.0},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {79},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/079},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kasahara12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kasahara12a,
  author       = {Masao Kasahara},
  title        = {Construction of New Classes of Knapsack Type Public Key Cryptosystem
                  Using Uniform Secret Sequence, K(II){\(\Sigma\)}{\(\Pi\)}PKC, Constructed
                  Based on Maximum Length Code},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {344},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/344},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kasahara12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KateHG12,
  author       = {Aniket Kate and
                  Yizhou Huang and
                  Ian Goldberg},
  title        = {Distributed Key Generation in the Wild},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {377},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/377},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KateHG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KatzenbeisserKRSVW12,
  author       = {Stefan Katzenbeisser and
                  {\"{U}}nal Ko{\c{c}}abas and
                  Vladimir Rozic and
                  Ahmad{-}Reza Sadeghi and
                  Ingrid Verbauwhede and
                  Christian Wachsmann},
  title        = {PUFs: Myth, Fact or Busted? {A} Security Evaluation of Physically
                  Unclonable Functions (PUFs) Cast in Silicon (Extended Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {557},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/557},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KatzenbeisserKRSVW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KellerMR12,
  author       = {Marcel Keller and
                  Gert L{\ae}ss{\o}e Mikkelsen and
                  Andy Rupp},
  title        = {Efficient Threshold Zero-Knowledge with Applications to User-Centric
                  Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {306},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/306},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KellerMR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KendallKK12,
  author       = {Ed Kendall and
                  Michelle Kendall and
                  Wilfrid S. Kendall},
  title        = {A Generalised Formula for Calculating the Resilience of Random Key
                  Predistribution Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {426},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/426},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KendallKK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KendallMNPS12,
  author       = {Michelle Kendall and
                  Keith M. Martin and
                  Siaw{-}Lynn Ng and
                  Maura B. Paterson and
                  Douglas R. Stinson},
  title        = {Broadcast-enhanced Key Predistribution Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {295},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/295},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KendallMNPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhazaeiTW12,
  author       = {Shahram Khazaei and
                  Bj{\"{o}}rn Terelius and
                  Douglas Wikstr{\"{o}}m},
  title        = {Cryptanalysis of a Universally Verifiable Efficient Re-encryption
                  Mixnet},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {100},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/100},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KhazaeiTW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhazaeiW12,
  author       = {Shahram Khazaei and
                  Douglas Wikstr{\"{o}}m},
  title        = {Randomized Partial Checking Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {63},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/063},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KhazaeiW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Khovratovich12,
  author       = {Dmitry Khovratovich},
  title        = {Bicliques for permutations: collision and preimage attacks in stronger
                  settings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {141},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/141},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Khovratovich12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiltzPS12,
  author       = {Eike Kiltz and
                  Krzysztof Pietrzak and
                  Mario Szegedy},
  title        = {Digital Signatures with Minimal Overhead},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {658},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/658},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiltzPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimC12,
  author       = {Taechan Kim and
                  Jung Hee Cheon},
  title        = {A New Approach to Discrete Logarithm Problem with Auxiliary Inputs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {609},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/609},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimC12a,
  author       = {Sungwook Kim and
                  Jung Hee Cheon},
  title        = {Fixed Argument Pairing Inversion on Elliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {657},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/657},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimC12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimH12,
  author       = {Byoung{-}Il Kim and
                  Jin Hong},
  title        = {Analysis of the Non-Perfect Table Fuzzy Rainbow Tradeoff},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {612},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/612},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimKC12,
  author       = {Taechan Kim and
                  Sungwook Kim and
                  Jung Hee Cheon},
  title        = {Accelerating the Final Exponentiation in the Computation of the Tate
                  Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {119},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/119},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimKC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimKC12a,
  author       = {Myungsun Kim and
                  Jihye Kim and
                  Jung Hee Cheon},
  title        = {Compress Multiple Ciphertexts Using ElGamal Encryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {243},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/243},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimKC12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimKC12b,
  author       = {Myungsun Kim and
                  Jinsu Kim and
                  Jung Hee Cheon},
  title        = {A Public Shuffle without Private Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {301},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/301},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimKC12b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimMCK12,
  author       = {Myungsun Kim and
                  Abedelaziz Mohaisen and
                  Jung Hee Cheon and
                  Yongdae Kim},
  title        = {Private Top-k Aggregation Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {538},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/538},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimMCK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KipnisH12,
  author       = {Aviad Kipnis and
                  Eliphaz Hibshoosh},
  title        = {Efficient Methods for Practical Fully Homomorphic Symmetric-key Encrypton,
                  Randomization and Verification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {637},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/637},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KipnisH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KircanskiY12,
  author       = {Aleksandar Kircanski and
                  Amr M. Youssef},
  title        = {Boomerang and Slide-Rotational Analysis of the {SM3} Hash Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {274},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/274},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KircanskiY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KnellwolfK12,
  author       = {Simon Knellwolf and
                  Dmitry Khovratovich},
  title        = {New Preimage Attacks Against Reduced {SHA-1}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {440},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/440},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KnellwolfK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Knobloch12,
  author       = {Hans{-}Joachim Knobloch},
  title        = {Breaking Public Keys - How to Determine an Unknown {RSA} Public Modulus},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {588},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/588},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Knobloch12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoblitzM12,
  author       = {Neal Koblitz and
                  Alfred Menezes},
  title        = {Another look at {HMAC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {74},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/074},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoblitzM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoblitzM12a,
  author       = {Neal Koblitz and
                  Alfred Menezes},
  title        = {Another look at non-uniformity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {359},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/359},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoblitzM12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoenigH12,
  author       = {Reto E. Koenig and
                  Rolf Haenni},
  title        = {How to Store some Secrets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {375},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/375},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoenigH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KopfMO12,
  author       = {Boris K{\"{o}}pf and
                  Laurent Mauborgne and
                  Mart{\'{\i}}n Ochoa},
  title        = {Automatic Quantification of Cache Side-Channels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {34},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/034},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KopfMO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KovtunO12,
  author       = {Vladyslav Kovtun and
                  Andrew Okhrimenko},
  title        = {Approaches for the performance increasing of software implementation
                  of integer multiplication in prime fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {170},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/170},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KovtunO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KovtunO12a,
  author       = {Vladyslav Kovtun and
                  Andrew Okhrimenko},
  title        = {Approaches for the Parallelization of Software Implementation of Integer
                  Multiplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {482},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/482},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KovtunO12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KremerKS12,
  author       = {Steve Kremer and
                  Robert K{\"{u}}nnemann and
                  Graham Steel},
  title        = {Universally Composable Key-Management},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {189},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/189},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KremerKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KreuterSS12,
  author       = {Benjamin Kreuter and
                  Abhi Shelat and
                  Chih{-}Hao Shen},
  title        = {Towards Billion-Gate Secure Computation with Malicious Adversaries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {179},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/179},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KreuterSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KumarasubramanianOPW12,
  author       = {Abishek Kumarasubramanian and
                  Rafail Ostrovsky and
                  Omkant Pandey and
                  Akshay Wadia},
  title        = {Cryptography Using {CAPTCHA} Puzzles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {689},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/689},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KumarasubramanianOPW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KunduAB12,
  author       = {Ashish Kundu and
                  Mikhail J. Atallah and
                  Elisa Bertino},
  title        = {Efficient Leakage-free Authentication of Trees, Graphs and Forests},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {36},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/036},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KunduAB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KunduB12,
  author       = {Ashish Kundu and
                  Elisa Bertino},
  title        = {On Hashing Graphs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {352},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/352},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KunduB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KunihiroSI12,
  author       = {Noboru Kunihiro and
                  Naoyuki Shinohara and
                  Tetsuya Izu},
  title        = {Recovering {RSA} Secret Keys from Noisy Key Bits with Erasures and
                  Errors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {701},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/701},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KunihiroSI12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kupu12,
  author       = {Alptekin K{\"{u}}p{\c{c}}{\"{u}}},
  title        = {Official Arbitration and its Application to Secure Cloud Storage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {276},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/276},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kupu12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KurosawaNP12,
  author       = {Kaoru Kurosawa and
                  Ryo Nojima and
                  Le Trieu Phong},
  title        = {Relation between Verifiable Random Functions and Convertible Undeniable
                  Signatures, and New Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {213},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/213},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KurosawaNP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KurosawaNP12a,
  author       = {Kaoru Kurosawa and
                  Ryo Nojima and
                  Le Trieu Phong},
  title        = {New Leakage Resilient CCA-Secure Public Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {453},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/453},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KurosawaNP12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KustersTG12,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Juergen Graf},
  title        = {A Framework for the Cryptographic Verification of Java-like Programs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {153},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/153},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KustersTG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KustersTV12,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Andreas Vogt},
  title        = {Clash Attacks on the Verifiability of E-Voting Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {116},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/116},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KustersTV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KutylowskiG12,
  author       = {Miroslaw Kutylowski and
                  Maciej Gebala},
  title        = {Optimizing Segment Based Document Protection (Corrected Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {520},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/520},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KutylowskiG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KutznerNP12,
  author       = {Sebastian Kutzner and
                  Phuong Ha Nguyen and
                  Axel Poschmann},
  title        = {Enabling 3-share Threshold Implementations for any 4-bit S-box},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {510},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/510},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KutznerNP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KutznerNPW12,
  author       = {Sebastian Kutzner and
                  Phuong Ha Nguyen and
                  Axel Poschmann and
                  Huaxiong Wang},
  title        = {On 3-share Threshold Implementations for 4-bit S-boxes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {509},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/509},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KutznerNPW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaarhovenPW12,
  author       = {Thijs Laarhoven and
                  Joop van de Pol and
                  Benne de Weger},
  title        = {Solving Hard Lattice Problems and the Security of Lattice-Based Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {533},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/533},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LaarhovenPW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LacharmeRSV12,
  author       = {Patrick Lacharme and
                  Andrea R{\"{o}}ck and
                  Vincent Strubel and
                  Marion Videau},
  title        = {The Linux Pseudorandom Number Generator Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {251},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/251},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LacharmeRSV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LampeP12,
  author       = {Rodolphe Lampe and
                  Jacques Patarin},
  title        = {Security of Feistel Schemes with New and Various Tools},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {131},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/131},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LampeP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LandaisS12,
  author       = {Gr{\'{e}}gory Landais and
                  Nicolas Sendrier},
  title        = {{CFS} Software Implementation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {132},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/132},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LandaisS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LandeckerST12,
  author       = {Will Landecker and
                  Thomas Shrimpton and
                  R. Seth Terashima},
  title        = {Tweakable Blockciphers with Beyond Birthday-Bound Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {450},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/450},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LandeckerST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LangloisS12,
  author       = {Adeline Langlois and
                  Damien Stehl{\'{e}}},
  title        = {Worst-Case to Average-Case Reductions for Module Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {90},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/090},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LangloisS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LauterR12,
  author       = {Kristin E. Lauter and
                  Damien Robert},
  title        = {Improved {CRT} Algorithm for Class Polynomials in Genus 2},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {443},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/443},
  timestamp    = {Wed, 16 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LauterR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LauterV12,
  author       = {Kristin E. Lauter and
                  Bianca Viray},
  title        = {An arithmetic intersection formula for denominators of Igusa class
                  polynomials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {614},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/614},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LauterV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeH12,
  author       = {Ga Won Lee and
                  Jin Hong},
  title        = {A Comparison of Perfect Table Cryptanalytic Tradeoff Algorithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {540},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/540},
  timestamp    = {Wed, 18 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeHC12,
  author       = {Hyung Tae Lee and
                  Hyunsook Hong and
                  Jung Hee Cheon},
  title        = {Invertible Polynomial Representation for Private Set Operations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {526},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/526},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeHC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeKH12,
  author       = {Kwangsu Lee and
                  Intae Kim and
                  Seong Oun Hwang},
  title        = {Privacy Preserving Revocable Predicate Encryption Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {655},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/655},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeKH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeLY12,
  author       = {Kwangsu Lee and
                  Dong Hoon Lee and
                  Moti Yung},
  title        = {Sequential Aggregate Signatures with Short Public Keys: Design, Analysis
                  and Implementation Studies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {518},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/518},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeLY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeLY12a,
  author       = {Kwangsu Lee and
                  Dong Hoon Lee and
                  Moti Yung},
  title        = {Aggregating CL-Signatures Revisited: Extended Functionality and Better
                  Efficiency},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {562},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/562},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeLY12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LenstraHABKW12,
  author       = {Arjen K. Lenstra and
                  James P. Hughes and
                  Maxime Augier and
                  Joppe W. Bos and
                  Thorsten Kleinjung and
                  Christophe Wachter},
  title        = {Ron was wrong, Whit is right},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {64},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/064},
  timestamp    = {Mon, 29 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LenstraHABKW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LermanMVMBM12,
  author       = {Liran Lerman and
                  Stephane Fernandes Medeiros and
                  Nikita Veshchikov and
                  C{\'{e}}dric Meuter and
                  Gianluca Bontempi and
                  Olivier Markowitch},
  title        = {Semi-Supervised Template Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {82},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/082},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LermanMVMBM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Leurent12,
  author       = {Ga{\"{e}}tan Leurent},
  title        = {Construction of Differential Characteristics in {ARX} Designs - Application
                  to Skein},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {668},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/668},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Leurent12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Leurent12a,
  author       = {Ga{\"{e}}tan Leurent},
  title        = {Cryptanalysis of {WIDEA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {707},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/707},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Leurent12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Leurent12b,
  author       = {Ga{\"{e}}tan Leurent},
  title        = {Time-memory Trade-offs for Near-collisions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {731},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/731},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Leurent12b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LewkoW12,
  author       = {Allison B. Lewko and
                  Brent Waters},
  title        = {New Proof Methods for Attribute-Based Encryption: Achieving Full Security
                  through Selective Techniques},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {326},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/326},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LewkoW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Li0LJWS12,
  author       = {Jin Li and
                  Xiaofeng Chen and
                  Jingwei Li and
                  Chunfu Jia and
                  Duncan S. Wong and
                  Willy Susilo},
  title        = {Secure Outsourced Attribute-Based Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {605},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/605},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Li0LJWS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Li12a,
  author       = {Xin Li},
  title        = {Non-Malleable Extractors, Two-Source Extractors and Privacy Amplification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {188},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/188},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Li12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiCX12,
  author       = {Yin Li and
                  Gongliang Chen and
                  Xiao{-}ning Xie},
  title        = {Low complexity bit-parallel GF(2\({}^{\mbox{m}}\)) multiplier for
                  all-one polynomials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {414},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/414},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiCX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiLZC12,
  author       = {Qiang Li and
                  Xiangxue Li and
                  Dong Zheng and
                  Kefei Chen},
  title        = {Optimal Multiple Assignments with (m, m)-Scheme for General Access
                  Structures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {7},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/007},
  timestamp    = {Thu, 16 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiLZC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiLZHC12,
  author       = {Qiang Li and
                  Xiangxue Li and
                  Dong Zheng and
                  Zheng Huang and
                  Kefei Chen},
  title        = {On the Equivalence between the Set Covering Problem and the Problem
                  of Finding Optimal Cumulative Assignment Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {245},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/245},
  timestamp    = {Thu, 16 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiLZHC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiWZ12,
  author       = {Liangze Li and
                  Hongfeng Wu and
                  Fan Zhang},
  title        = {Pairing computation on Edwards curves with high-degree twists},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {532},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/532},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiWZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiWZ12a,
  author       = {Liangze Li and
                  Hongfeng Wu and
                  Fan Zhang},
  title        = {Faster Pairing Computation on Jacobi quartic Curves with High-Degree
                  Twists},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {551},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/551},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiWZ12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertPY12,
  author       = {Beno{\^{\i}}t Libert and
                  Thomas Peters and
                  Moti Yung},
  title        = {Scalable Group Signatures with Revocation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {424},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/424},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertPY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertPY12a,
  author       = {Beno{\^{\i}}t Libert and
                  Thomas Peters and
                  Moti Yung},
  title        = {Group Signatures with Almost-for-free Revocation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {442},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/442},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertPY12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LimniotisKK12,
  author       = {Konstantinos Limniotis and
                  Nicholas Kolokotronis and
                  Nicholas Kalouptsidis},
  title        = {Modifying Boolean Functions to Ensure Maximum Algebraic Immunity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {46},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/046},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LimniotisKK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LindellNO12,
  author       = {Yehuda Lindell and
                  Kobbi Nissim and
                  Claudio Orlandi},
  title        = {Hiding the Input-Size in Secure Two-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {679},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/679},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LindellNO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LindellZ12,
  author       = {Yehuda Lindell and
                  Hila Zarosim},
  title        = {On the Feasibility of Extending Oblivious Transfer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {333},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/333},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LindellZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LingNSW12,
  author       = {San Ling and
                  Khoa Nguyen and
                  Damien Stehl{\'{e}} and
                  Huaxiong Wang},
  title        = {Improved Zero-knowledge Proofs of Knowledge for the {ISIS} Problem,
                  and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {569},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/569},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LingNSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LipmaaZ12,
  author       = {Helger Lipmaa and
                  Bingsheng Zhang},
  title        = {New Non-Interactive Zero-Knowledge Subset Sum, Decision Knapsack And
                  Range Arguments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {548},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/548},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LipmaaZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuASZ12,
  author       = {Joseph K. Liu and
                  Man Ho Au and
                  Willy Susilo and
                  Jianying Zhou},
  title        = {Enhancing Location Privacy for Electric Vehicles (at the right time)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {342},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/342},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuASZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuCW12,
  author       = {Zhen Liu and
                  Zhenfu Cao and
                  Duncan S. Wong},
  title        = {Expressive Black-box Traceable Ciphertext-Policy Attribute-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {669},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/669},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuCW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuGLL12,
  author       = {Ya Liu and
                  Dawu Gu and
                  Zhiqiang Liu and
                  Wei Li},
  title        = {Improved Impossible Differential Attack on Reduced Version of Camellia-192/256},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {594},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/594},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuGLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuL12,
  author       = {Feng{-}Hao Liu and
                  Anna Lysyanskaya},
  title        = {Tamper and Leakage Resilience in the Split-State Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {297},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/297},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuY12,
  author       = {Rock C. Liu and
                  Zhiwi Yeh},
  title        = {Estimating the {\(\varphi\)}(n) of Upper/Lower Bound in its {RSA}
                  Cryptosystem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {666},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/666},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuZL12,
  author       = {Meicheng Liu and
                  Yin Zhang and
                  Dongdai Lin},
  title        = {Perfect Algebraic Immune Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {212},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/212},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuZL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuZL12a,
  author       = {Meicheng Liu and
                  Yin Zhang and
                  Dongdai Lin},
  title        = {On the immunity of Boolean functions against fast algebraic attacks
                  using bivariate polynomial representation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {498},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/498},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuZL12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuZYC12,
  author       = {Chang Liu and
                  Xuyun Zhang and
                  Chi Yang and
                  Jinjun Chen},
  title        = {{CCBKE} - Session Key Negotiation for Fast and Secure Scheduling of
                  Scientific Applications in Cloud Computing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {385},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/385},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuZYC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LoebenbergerN12,
  author       = {Daniel Loebenberger and
                  Michael N{\"{u}}sken},
  title        = {Coarse-grained integer - Smooth? Rough? Both!},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {639},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/639},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LoebenbergerN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LorchMPRS12,
  author       = {Jacob R. Lorch and
                  James W. Mickens and
                  Bryan Parno and
                  Mariana Raykova and
                  Joshua Schiffman},
  title        = {Toward Practical Private Access to Data Centers via Parallel {ORAM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {133},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/133},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LorchMPRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LouHTX12,
  author       = {Yu Lou and
                  Huiting Han and
                  Chunming Tang and
                  Maozhi Xu},
  title        = {Constructing Vectorial Boolean Functions with High Algebraic Immunity
                  Based on Group Decomposition},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {335},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/335},
  timestamp    = {Mon, 25 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LouHTX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuO12,
  author       = {Steve Lu and
                  Rafail Ostrovsky},
  title        = {How to Garble {RAM} Programs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {601},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/601},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LuO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuYW12,
  author       = {Jiqiang Lu and
                  Wun{-}She Yap and
                  Yongzhuang Wei},
  title        = {Weak Keys of the Full {MISTY1} Block Cipher for Related-Key Cryptanalysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {66},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/066},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuYW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuykxAMP12,
  author       = {Atul Luykx and
                  Elena Andreeva and
                  Bart Mennink and
                  Bart Preneel},
  title        = {Impossibility Results for Indifferentiability with Resets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {644},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/644},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuykxAMP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LyubashevskyPR12,
  author       = {Vadim Lyubashevsky and
                  Chris Peikert and
                  Oded Regev},
  title        = {On Ideal Lattices and Learning with Errors Over Rings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {230},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/230},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LyubashevskyPR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaghrebiCGD12,
  author       = {Houssem Maghrebi and
                  Claude Carlet and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {Optimal First-Order Masking with Linear and Non-Linear Bijections},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {175},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/175},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaghrebiCGD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaghrebiPGD12,
  author       = {Houssem Maghrebi and
                  Emmanuel Prouff and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {A First-Order Leak-Free Masking Countermeasure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {28},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/028},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaghrebiPGD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MahmoodyP12,
  author       = {Mohammad Mahmoody and
                  Rafael Pass},
  title        = {The Curious Case of Non-Interactive Commitments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {523},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/523},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MahmoodyP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MahmoodyX12,
  author       = {Mohammad Mahmoody and
                  David Xiao},
  title        = {Languages with Efficient Zero-Knowledge PCP's are in {SZK}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {229},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/229},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MahmoodyX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Malik12,
  author       = {Muhammad Yasir Malik},
  title        = {Efficient Group Key Management Schemes for Multicast Dynamic Communication
                  Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {628},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/628},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Malik12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ManulisPS12,
  author       = {Mark Manulis and
                  Bertram Poettering and
                  Douglas Stebila},
  title        = {Plaintext Awareness in Identity-Based Key Encapsulation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {559},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/559},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ManulisPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Martinez-PelaezR12,
  author       = {Rafael Mart{\'{\i}}nez{-}Pel{\'{a}}ez and
                  Francisco Rico{-}Novella},
  title        = {Cryptanalysis of Sood et al.'s Authentication Scheme using Smart Cards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {386},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/386},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Martinez-PelaezR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Martinez-PelaezR12a,
  author       = {Rafael Mart{\'{\i}}nez{-}Pel{\'{a}}ez and
                  Francisco Rico{-}Novella},
  title        = {Weaknesses of an Improvement Authentication Scheme using},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {418},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/418},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Martinez-PelaezR12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MatherO12,
  author       = {Luke Mather and
                  Elisabeth Oswald},
  title        = {Quantifying Side-Channel Information Leakage from Web Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {269},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/269},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MatherO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MayberryBC12,
  author       = {Travis Mayberry and
                  Erik{-}Oliver Blass and
                  Agnes Hui Chan},
  title        = {{PIRMAP:} Efficient Private Information Retrieval for MapReduce},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {398},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/398},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MayberryBC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MazumdarMS12,
  author       = {Bodhisatwa Mazumdar and
                  Debdeep Mukhopadhyay and
                  Indranil Sengupta},
  title        = {Constrained Search for a Class of Good S-Boxes with Improved {DPA}
                  Resistivity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {547},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/547},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MazumdarMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/McGrew12,
  author       = {David A. McGrew},
  title        = {Impossible plaintext cryptanalysis and probable-plaintext collision
                  attacks of 64-bit block cipher modes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {623},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/623},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/McGrew12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MeiklejohnEKHL12,
  author       = {Sarah Meiklejohn and
                  C. Christopher Erway and
                  Alptekin K{\"{u}}p{\c{c}}{\"{u}} and
                  Theodora Hinkle and
                  Anna Lysyanskaya},
  title        = {{ZKPDL:} {A} Language-Based System for Efficient Zero-Knowledge Proofs
                  and Electronic Cash},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {226},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/226},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MeiklejohnEKHL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MendelRTV12,
  author       = {Florian Mendel and
                  Vincent Rijmen and
                  Deniz Toz and
                  Kerem Varici},
  title        = {Differential Analysis of the {LED} Block Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {544},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/544},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MendelRTV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Mennink12,
  author       = {Bart Mennink},
  title        = {On the Collision and Preimage Security of {MDC-4} in the Ideal Cipher
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {113},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/113},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Mennink12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MesnagerF12,
  author       = {Sihem Mesnager and
                  Jean{-}Pierre Flori},
  title        = {A note on hyper-bent functions via Dillon-like exponents},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {33},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/033},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MesnagerF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MinematsuMI12,
  author       = {Kazuhiko Minematsu and
                  Hiraku Morita and
                  Tetsu Iwata},
  title        = {Cryptanalysis of EAXprime},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {18},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/018},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MinematsuMI12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MironovPRS12,
  author       = {Ilya Mironov and
                  Omkant Pandey and
                  Omer Reingold and
                  Gil Segev},
  title        = {Incremental Deterministic Public-Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {47},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/047},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MironovPRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MisoczkiTSB12,
  author       = {Rafael Misoczki and
                  Jean{-}Pierre Tillich and
                  Nicolas Sendrier and
                  Paulo S. L. M. Barreto},
  title        = {MDPC-McEliece: New McEliece Variants from Moderate Density Parity-Check
                  Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {409},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/409},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MisoczkiTSB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MitchellSSZ12,
  author       = {John C. Mitchell and
                  Rahul Sharma and
                  Deian Stefan and
                  Joe Zimmerman},
  title        = {Information-flow control for programming on encrypted data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {205},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/205},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MitchellSSZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Mittelbach12,
  author       = {Arno Mittelbach},
  title        = {Hash Combiners for Second Pre-Image Resistance, Target Collision Resistance
                  and Pre-Image Resistance have Long Output},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {354},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/354},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Mittelbach12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MohamedBZHW12,
  author       = {Mohamed Saied Emam Mohamed and
                  Stanislav Bulygin and
                  Michael Zohner and
                  Annelie Heuser and
                  Michael Walter},
  title        = {Improved Algebraic Side-Channel Attack on {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {84},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/084},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MohamedBZHW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoodyPS12,
  author       = {Dustin Moody and
                  Souradyuti Paul and
                  Daniel Smith{-}Tone},
  title        = {Improved Indifferentiability Security Bound for the {JH} Mode},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {278},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/278},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoodyPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoradiM12,
  author       = {Amir Moradi and
                  Oliver Mischke},
  title        = {On the Simplicity of Converting Leakages from Multivariate to Univariate
                  - Case Study of a Glitch-Resistant Masking Scheme -},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {472},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/472},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoradiM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MorawieckiPS12,
  author       = {Pawel Morawiecki and
                  Josef Pieprzyk and
                  Marian Srebrny},
  title        = {Rotational cryptanalysis of round-reduced Keccak},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {546},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/546},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MorawieckiPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoscaSU12,
  author       = {Michele Mosca and
                  Douglas Stebila and
                  Berkant Ustaoglu},
  title        = {Quantum Key Distribution in the Classical Authenticated Key Exchange
                  Framework},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {361},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/361},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoscaSU12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Murphy12,
  author       = {Julian P. Murphy},
  title        = {Asynchronous Physical Unclonable Functions - AsyncPUF},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {662},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/662},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Murphy12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MyasnikovU12,
  author       = {Alex D. Myasnikov and
                  Alexander Ushakov},
  title        = {Quantum algorithm for the discrete logarithm problem for matrices
                  over finite group rings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {574},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/574},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MyasnikovU12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MyasnikovU12a,
  author       = {Alex D. Myasnikov and
                  Alexander Ushakov},
  title        = {Cryptanalysis of matrix conjugation schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {694},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/694},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MyasnikovU12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NachefPV12,
  author       = {Val{\'{e}}rie Nachef and
                  Jacques Patarin and
                  Emmanuel Volte},
  title        = {Zero-Knowledge for Multivariate Polynomials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {239},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/239},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NachefPV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NagarA12,
  author       = {Sami A. Nagar and
                  Saad Alshamma},
  title        = {Efficient Implementation of {RSA} Algorithm with {MKE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {539},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/539},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NagarA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Naito12,
  author       = {Yusuke Naito},
  title        = {On the Indifferentiable Hash Functions in the Multi-Stage Security
                  Games},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {14},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/014},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Naito12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NeupaneSC12,
  author       = {Kashi Neupane and
                  Rainer Steinwandt and
                  Adriana Su{\'{a}}rez Corona},
  title        = {Scalable Deniable Group Key Establishment},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {504},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/504},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NeupaneSC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NevesA12,
  author       = {Samuel Neves and
                  Jean{-}Philippe Aumasson},
  title        = {Implementing {BLAKE} with AVX, AVX2, and {XOP}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {275},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/275},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NevesA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nguyen12,
  author       = {Long Hoang Nguyen},
  title        = {Rational authentication protocols and their use in financial transactions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {428},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/428},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nguyen12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NguyenR12,
  author       = {Long Hoang Nguyen and
                  Andrew William Roscoe},
  title        = {Simple construction of epsilon-biased distribution},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {429},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/429},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NguyenR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NietoMPRS12,
  author       = {Juan Manuel Gonz{\'{a}}lez Nieto and
                  Mark Manulis and
                  Bertram Poettering and
                  Jothi Rangasamy and
                  Douglas Stebila},
  title        = {Publicly Verifiable Ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {357},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/357},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NietoMPRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NietoMS12,
  author       = {Juan Manuel Gonz{\'{a}}lez Nieto and
                  Mark Manulis and
                  Dongdong Sun},
  title        = {Forward-Secure Hierarchical Predicate Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {402},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/402},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NietoMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NietoMS12a,
  author       = {Juan Manuel Gonz{\'{a}}lez Nieto and
                  Mark Manulis and
                  Dongdong Sun},
  title        = {Fully Private Revocable Predicate Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {403},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/403},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NietoMS12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nishioka12,
  author       = {Mototsugu Nishioka},
  title        = {Perfect Keyword Privacy in {PEKS} Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {469},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/469},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nishioka12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nuida12,
  author       = {Koji Nuida},
  title        = {On pseudorandomization of information-theoretically secure schemes
                  without hardness assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {505},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/505},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nuida12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NuidaAKMN12,
  author       = {Koji Nuida and
                  Takuro Abe and
                  Shizuo Kaji and
                  Toshiaki Maeno and
                  Yasuhide Numata},
  title        = {A mathematical problem for security analysis of hash functions and
                  pseudorandom generators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {310},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/310},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NuidaAKMN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ObradorMG12,
  author       = {Marc Obrador and
                  Paz Morillo and
                  Sandra Guasch},
  title        = {Applications of Polynomial Properties to Verifiable Delegation of
                  Computation and Electronic Voting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {726},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/726},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ObradorMG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OkamotoT12,
  author       = {Tatsuaki Okamoto and
                  Katsuyuki Takashima},
  title        = {Fully Secure Unbounded Inner-Product and Attribute-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {671},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/671},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OkamotoT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Onete12,
  author       = {Cristina Onete},
  title        = {Key Updates for {RFID} Distance-Bounding Protocols: Achieving Narrow-Destructive
                  Privacy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {165},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/165},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Onete12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OrenW12,
  author       = {Yossef Oren and
                  Avishai Wool},
  title        = {Tolerant Algebraic Side-Channel Analysis of {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {92},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/092},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OrenW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OrumiehchihaPSS12,
  author       = {Mohammad Ali Orumiehchiha and
                  Josef Pieprzyk and
                  Elham Shakour and
                  Ron Steinfeld},
  title        = {Security Evaluation of Rakaposhi Stream Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {656},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/656},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OrumiehchihaPSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OstrovskySVW12,
  author       = {Rafail Ostrovsky and
                  Alessandra Scafuro and
                  Ivan Visconti and
                  Akshay Wadia},
  title        = {Universally Composable Secure Computation with (Malicious) Physically
                  Uncloneable Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {143},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/143},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OstrovskySVW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Osvik12,
  author       = {Dag Arne Osvik},
  title        = {Fast Embedded Software Hashing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {156},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/156},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Osvik12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Padro12,
  author       = {Carles Padr{\'{o}}},
  title        = {Lecture Notes in Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {674},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/674},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Padro12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PadroVY12,
  author       = {Carles Padr{\'{o}} and
                  Leonor V{\'{a}}zquez and
                  An Yang},
  title        = {Finding Lower Bounds on the Complexity of Secret Sharing Schemes by
                  Linear Programming},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {464},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/464},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PadroVY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Pandey12,
  author       = {Omkant Pandey},
  title        = {Achieving Constant Round Leakage-Resilient Zero-Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {362},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/362},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Pandey12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PapakonstantinouRV12,
  author       = {Periklis A. Papakonstantinou and
                  Charles Rackoff and
                  Yevgeniy Vahlis},
  title        = {How powerful are the {DDH} hard groups?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {653},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/653},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PapakonstantinouRV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Parakh12,
  author       = {Abhishek Parakh},
  title        = {A Probabilistic Quantum Key Transfer Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {454},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/454},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Parakh12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PasskiR12,
  author       = {Jon Passki and
                  Tom Ritter},
  title        = {An Adaptive-Ciphertext Attack against "I {\(\oplus\)} C" Block Cipher
                  Modes With an Oracle},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {292},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/292},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PasskiR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatersonPS12,
  author       = {Kenneth G. Paterson and
                  Antigoni Polychroniadou and
                  Dale L. Sibborn},
  title        = {A Coding-Theoretic Approach to Recovering Noisy {RSA} Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {724},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/724},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatersonPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatersonS12,
  author       = {Maura B. Paterson and
                  Douglas R. Stinson},
  title        = {A Simplified Combinatorial Treatment of Constructions and Threshold
                  Gaps of Ramp Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {534},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/534},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatersonS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatersonSU12,
  author       = {Maura B. Paterson and
                  Douglas R. Stinson and
                  Jalaj Upadhyay},
  title        = {A coding theory foundation for the analysis of general unconditionally
                  secure proof-of-retrievability schemes for cloud storage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {611},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/611},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatersonSU12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Pattanayak12,
  author       = {Anupam Pattanayak},
  title        = {Revisiting Dedicated and Block Cipher based Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {322},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/322},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Pattanayak12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PaulHG12,
  author       = {Souradyuti Paul and
                  Ekawat Homsirikamol and
                  Kris Gaj},
  title        = {A Novel Permutation-based Hash Mode of Operation {FP} and the Hash
                  Function {SAMOSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {597},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/597},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PaulHG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PeetersH12,
  author       = {Roel Peeters and
                  Jens Hermans},
  title        = {Wide Strong Private {RFID} Identification based on Zero-Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {389},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/389},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PeetersH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PengzZK12,
  author       = {Changyong Peng and
                  Chuangying Zhu and
                  Yuefei Zhu and
                  Fei Kang},
  title        = {Improved side channel attack on the block cipher {NOEKEON}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {571},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/571},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PengzZK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PengzZK12a,
  author       = {Changyong Peng and
                  Chuangying Zhu and
                  Yuefei Zhu and
                  Fei Kang},
  title        = {Symbolic computation in block cipher with application to {PRESENT}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {587},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/587},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PengzZK12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Persichetti12,
  author       = {Edoardo Persichetti},
  title        = {On a CCA2-secure variant of McEliece in the standard model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {268},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/268},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Persichetti12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PetitQ12,
  author       = {Christophe Petit and
                  Jean{-}Jacques Quisquater},
  title        = {On Polynomial Systems Arising from a Weil Descent},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {146},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/146},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/PetitQ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PetzoldtBB12,
  author       = {Albrecht Petzoldt and
                  Stanislav Bulygin and
                  Johannes Buchmann},
  title        = {A Multivariate based Threshold Ring Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {194},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/194},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/PetzoldtBB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PeyrinS012,
  author       = {Thomas Peyrin and
                  Yu Sasaki and
                  Lei Wang},
  title        = {Generic Related-key Attacks for {HMAC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {684},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/684},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PeyrinS012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PhamC12,
  author       = {Viet Pham and
                  Carlos Cid},
  title        = {Are We Compromised? Modelling Security Assessment Games},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {502},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/502},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PhamC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PhanPSS12,
  author       = {Duong Hieu Phan and
                  David Pointcheval and
                  Siamak Fayyaz Shahandashti and
                  Mario Strefler},
  title        = {Adaptive {CCA} Broadcast Encryption with Constant-Size Secret Keys
                  and Ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {216},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/216},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PhanPSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PhanPT12,
  author       = {Duong Hieu Phan and
                  David Pointcheval and
                  Viet Cuong Trinh},
  title        = {Multi-Channel Broadcast Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {307},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/307},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PhanPT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PhanT12,
  author       = {Duong Hieu Phan and
                  Viet Cuong Trinh},
  title        = {Resistance to Pirates 2.0: {A} Method from Leakage Resilient Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {305},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/305},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PhanT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PiretRC12,
  author       = {Gilles Piret and
                  Thomas Roche and
                  Claude Carlet},
  title        = {{PICARO} - {A} Block Cipher Allowing Efficient Higher-Order Side-Channel
                  Resistance - Extended Version -},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {358},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/358},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PiretRC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Portmann12,
  author       = {Christopher Portmann},
  title        = {Key recycling in authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {58},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/058},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Portmann12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PoulakisR12,
  author       = {Dimitrios Poulakis and
                  Robert Rolland},
  title        = {A Digital Signature Scheme for Long-Term Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {134},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/134},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PoulakisR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Pousse12,
  author       = {Benjamin Pousse},
  title        = {Short communication: An interpretation of the Linux entropy estimator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {487},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/487},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Pousse12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PueyoCX12,
  author       = {Ignacio Cascudo Pueyo and
                  Ronald Cramer and
                  Chaoping Xing},
  title        = {Bounds on the Threshold Gap in Secret Sharing over Small Fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {319},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/319},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PueyoCX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PueyoCX12a,
  author       = {Ignacio Cascudo Pueyo and
                  Ronald Cramer and
                  Chaoping Xing},
  title        = {The Arithmetic Codex},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {388},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/388},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PueyoCX12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RachwalikSWZ12,
  author       = {Tomasz Rachwalik and
                  Janusz Szmidt and
                  Robert Wicik and
                  Janusz Zablocki},
  title        = {Generation of Nonlinear Feedback Shift Registers with special-purpose
                  hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {314},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/314},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RachwalikSWZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RajendranKWPMRW12,
  author       = {Jeyavijayan Rajendran and
                  Ramesh Karri and
                  James B. Wendt and
                  Miodrag Potkonjak and
                  Nathan R. McDonald and
                  Garrett S. Rose and
                  Bryant T. Wysocki},
  title        = {Nanoelectronic Solutions for Hardware Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {575},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/575},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/RajendranKWPMRW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RamannaCS12,
  author       = {Somindu C. Ramanna and
                  Sanjit Chatterjee and
                  Palash Sarkar},
  title        = {Variants of Waters' Dual-System Primitives Using Asymmetric Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {24},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/024},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RamannaCS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RamannaS12,
  author       = {Somindu C. Ramanna and
                  Palash Sarkar},
  title        = {Constant-Size Ciphertext {HIBE} From Asymmetric Pairings Using the
                  Dual-System Technique},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {57},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/057},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RamannaS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ReyhanitabarS12,
  author       = {Reza Reyhanitabar and
                  Willy Susilo},
  title        = {Mix-Compress-Mix Revisited: Dispensing with Non-invertible Random
                  Injection Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {479},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/479},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ReyhanitabarS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RonS12,
  author       = {Dorit Ron and
                  Adi Shamir},
  title        = {Quantitative Analysis of the Full Bitcoin Transaction Graph},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {584},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/584},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RonS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Rostovtsev12,
  author       = {Alexander Rostovtsev},
  title        = {Virtual isomorphisms of ciphers: is {AES} secure against differential
                  / linear attack?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {663},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/663},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Rostovtsev12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RostovtsevM12,
  author       = {Alexander Rostovtsev and
                  Alexey Mizyukin},
  title        = {On Boolean Ideals and Varieties with Application to Algebraic Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {151},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/151},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RostovtsevM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Rosulek12,
  author       = {Mike Rosulek},
  title        = {Must you know the code of f to securely compute f?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {455},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/455},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Rosulek12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Rothblum12,
  author       = {Ron Rothblum},
  title        = {On the Circular Security of Bit-Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {102},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/102},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Rothblum12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RouselakisW12,
  author       = {Yannis Rouselakis and
                  Brent Waters},
  title        = {New Constructions and Proof Methods for Large Universe Attribute-Based
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {583},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/583},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RouselakisW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Saarinen12,
  author       = {Markku{-}Juhani O. Saarinen},
  title        = {The BlueJay Ultra-Lightweight Hybrid Cryptosystem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {195},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/195},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Saarinen12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SaarinenE12,
  author       = {Markku{-}Juhani O. Saarinen and
                  Daniel W. Engels},
  title        = {A Do-It-All-Cipher for {RFID:} Design Requirements (Extended Abstract)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {317},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/317},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SaarinenE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Safavi-NainiTW12,
  author       = {Reihaneh Safavi{-}Naini and
                  Mohammed Ashraful Tuhin and
                  Pengwei Wang},
  title        = {A General Construction for 1-round {\(\delta\)}-RMT and (0, {\(\delta\)})-SMT},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {231},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/231},
  timestamp    = {Wed, 10 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Safavi-NainiTW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SafkhaniBN12,
  author       = {Masoumeh Safkhani and
                  Nasour Bagheri and
                  Majid Naderi},
  title        = {How a Cryptographer Can Get Rich?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {23},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/023},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SafkhaniBN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SafkhaniBN12a,
  author       = {Masoumeh Safkhani and
                  Nasour Bagheri and
                  Majid Naderi},
  title        = {On the Traceability of Tags in {SUAP} {RFID} Authentication Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {334},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/334},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SafkhaniBN12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SahaiSW12,
  author       = {Amit Sahai and
                  Hakan Seyalioglu and
                  Brent Waters},
  title        = {Dynamic Credentials and Ciphertext Delegation for Attribute-Based
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {437},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/437},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SahaiSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SahaiW12,
  author       = {Amit Sahai and
                  Brent Waters},
  title        = {Attribute-Based Encryption for Circuits from Multilinear Maps},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {592},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/592},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SahaiW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SakaiSEHO12,
  author       = {Yusuke Sakai and
                  Jacob C. N. Schuldt and
                  Keita Emura and
                  Goichiro Hanaoka and
                  Kazuo Ohta},
  title        = {On the Security of Dynamic Group Signatures: Preventing Signature
                  Hijacking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {431},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/431},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SakaiSEHO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SalamL12,
  author       = {Md. Iftekhar Salam and
                  Hoon{-}Jae Lee},
  title        = {Algebraic Countermeasure to Enhance the Improved Summation Generator
                  with 2-Bit Memory},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {282},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/282},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SalamL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Samid12,
  author       = {Gideon Samid},
  title        = {Hush Functions Extended to Any Size Input versus Any Size Output},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {457},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/457},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Samid12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SantisY12,
  author       = {Alfredo De Santis and
                  Moti Yung},
  title        = {"Metaproofs" (and their Cryptographic Applications)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {495},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/495},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SantisY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SarkarM12,
  author       = {Santanu Sarkar and
                  Subhamoy Maitra},
  title        = {More on Correcting Errors in {RSA} Private Keys: Breaking {CRT-RSA}
                  with Low Weight Decryption Exponents},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {106},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/106},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SarkarM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Sasaki012,
  author       = {Yu Sasaki and
                  Lei Wang},
  title        = {2-Dimension Sums: Distinguishers Beyond Three Rounds of {RIPEMD-128}
                  and {RIPEMD-160}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {49},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/049},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Sasaki012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Schnoor12,
  author       = {Henning Schnoor},
  title        = {Deciding Epistemic and Strategic Properties of Cryptographic Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {340},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/340},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Schnoor12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SchnorrS12,
  author       = {Claus{-}Peter Schnorr and
                  Taras Shevchenko},
  title        = {Solving Subset Sum Problems of Densioty close to 1 by "randomized"
                  BKZ-reduction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {620},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/620},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SchnorrS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Schulman12,
  author       = {Leonard J. Schulman},
  title        = {Cryptography from tensor problems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {244},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/244},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Schulman12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Scott12,
  author       = {Michael Scott},
  title        = {Client-Server Authentication Using Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {148},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/148},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Scott12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Scott12a,
  author       = {Michael Scott},
  title        = {Cryptanalysis of a recent two factor authentication scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {527},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/527},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Scott12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Sekar12,
  author       = {Gautham Sekar},
  title        = {The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing
                  Attacks and Countermeasures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {425},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/425},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Sekar12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviVVR12,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  Dhinakaran Vinayagamurthy and
                  C. Pandu Rangan},
  title        = {{ID} Based Signcryption Scheme in Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {392},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/392},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviVVR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Seo12,
  author       = {Jae Hong Seo},
  title        = {Short Signatures From Diffie-Hellman: Realizing Short Public Key},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {480},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/480},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Seo12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SeoC12,
  author       = {Jae Hong Seo and
                  Jung Hee Cheon},
  title        = {Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal
                  Blind Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {198},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/198},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SeoC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SettyBVBPW12,
  author       = {Srinath T. V. Setty and
                  Benjamin Braun and
                  Victor Vu and
                  Andrew J. Blumberg and
                  Bryan Parno and
                  Michael Walfish},
  title        = {Resolving the conflict between generality and plausibility in verified
                  computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {622},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/622},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SettyBVBPW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SettyVPBBW12,
  author       = {Srinath T. V. Setty and
                  Victor Vu and
                  Nikhil Panpalia and
                  Benjamin Braun and
                  Andrew J. Blumberg and
                  Michael Walfish},
  title        = {Taking proof-based verified computation a few steps closer to practicality
                  (extended version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {598},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/598},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SettyVPBBW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Seurin12,
  author       = {Yannick Seurin},
  title        = {On the Exact Security of Schnorr-Type Signatures in the Random Oracle
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {29},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/029},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Seurin12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SeurinT12,
  author       = {Yannick Seurin and
                  Joana Treger},
  title        = {A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {649},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/649},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SeurinT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShahM12,
  author       = {Jay Shah and
                  Ayan Mahalanobis},
  title        = {A New Guess-and-Determine Attack on the {A5/1}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {208},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/208},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShahM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShahandashtiSO12,
  author       = {Siamak Fayyaz Shahandashti and
                  Reihaneh Safavi{-}Naini and
                  Philip Ogunbona},
  title        = {Private Fingerprint Matching},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {219},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/219},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShahandashtiSO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShamirZ12,
  author       = {Adi Shamir and
                  Eldad Zinger},
  title        = {A Practical Polynomial-Time Known-Plaintext Attack on a Cryptosystem
                  Proposed by John Nash},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {339},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/339},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShamirZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Shens12,
  author       = {Limin Shen and
                  Yinxia Sun},
  title        = {On security of a Certificateless Aggregate Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {152},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/152},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Shens12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Shikata12,
  author       = {Junji Shikata},
  title        = {Formalization of Information-Theoretic Security for Encryption and
                  Key Agreement, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {383},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/383},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Shikata12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShinHK12,
  author       = {Young{-}joo Shin and
                  Junbeom Hur and
                  Kwangjo Kim},
  title        = {Security weakness in the Proof of Storage with Deduplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {554},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/554},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShinHK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShinoharaSHT12,
  author       = {Naoyuki Shinohara and
                  Takeshi Shimoyama and
                  Takuya Hayashi and
                  Tsuyoshi Takagi},
  title        = {Key Length Estimation of Pairing-based Cryptosystems using {\(\eta\)}\({}_{\mbox{T}}\)
                  Pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {42},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/042},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShinoharaSHT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SidorenkoBFGV12,
  author       = {Andrey Sidorenko and
                  Joachim van den Berg and
                  Remko Foekema and
                  Michiel Grashuis and
                  Jaap de Vos},
  title        = {Bellcore attack in practice},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {553},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/553},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SidorenkoBFGV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SimoneS12,
  author       = {Antonino Simone and
                  Boris Skoric},
  title        = {False Positive probabilities in q-ary Tardos codes: comparison of
                  attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {522},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/522},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SimoneS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SimoneS12a,
  author       = {Antonino Simone and
                  Boris Skoric},
  title        = {False Negative probabilities in Tardos codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {667},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/667},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SimoneS12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Sin12,
  author       = {Chol{-}Sun Sin},
  title        = {Regular Ternary Algorithm for Scalar Multiplication on Elliptic Curves
                  over Finite Fields of Characteristic Three},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {390},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/390},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Sin12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Singh12,
  author       = {Brajesh Kumar Singh},
  title        = {Secondary constructions on generalized bent functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {17},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/017},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Singh12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Singh12a,
  author       = {Brajesh Kumar Singh},
  title        = {Third-order nonlinearities of some biquadratic monomial Boolean functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {186},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/186},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Singh12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Singh12b,
  author       = {Brajesh Kumar Singh},
  title        = {On second-order nonlinearity and maximum algebraic immunity of some
                  bent functions in PS\({}^{\mbox{+}}\)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {396},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/396},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Singh12b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SinghB12,
  author       = {Deep Singh and
                  Maheshanand Bhaintwal},
  title        = {Additive autocorrelation of some classes of cubic semi-bent Boolean
                  functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {127},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/127},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SinghB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SinghB12a,
  author       = {Deep Singh and
                  Maheshanand Bhaintwal},
  title        = {Some properties of q-ary functions based on spectral analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {283},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/283},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SinghB12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SinghBS12,
  author       = {Deep Singh and
                  Maheshanand Bhaintwal and
                  Brajesh Kumar Singh},
  title        = {Recent Results on Generalized q-ary Bent Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {37},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/037},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SinghBS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SkoricO12,
  author       = {Boris Skoric and
                  Jan{-}Jaap Oosterwijk},
  title        = {Binary and q-ary Tardos codes, revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {249},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/249},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SkoricO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SkorobogatovW12,
  author       = {Sergei Skorobogatov and
                  Christopher Woods},
  title        = {In the blink of an eye: There goes your {AES} key},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {296},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/296},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SkorobogatovW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Smith-ToneT12,
  author       = {Daniel Smith{-}Tone and
                  Cristina Tone},
  title        = {A Measure of Dependence for Cryptographic Primitives Relative to Ideal
                  Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {647},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/647},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Smith-ToneT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Smyth12,
  author       = {Ben Smyth},
  title        = {Replay attacks that violate ballot secrecy in Helios},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {185},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/185},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Smyth12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SmythRC12,
  author       = {Ben Smyth and
                  Mark Dermot Ryan and
                  Liqun Chen},
  title        = {Formal analysis of privacy in Direct Anonymous Attestation schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {650},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/650},
  timestamp    = {Sun, 22 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SmythRC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Soleimany12,
  author       = {Hadi Soleimany},
  title        = {Zero-Correlation Linear Cryptanalysis of Reduced-Round LBlock},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {570},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/570},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Soleimany12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SongL12,
  author       = {Yun Song and
                  Zhihui Li},
  title        = {An ideal multi-secret sharing scheme based on minimal privileged coalitions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {719},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/719},
  timestamp    = {Thu, 15 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SongL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Stanek12,
  author       = {Martin Stanek},
  title        = {Attacking Scrambled Burrows-Wheeler Transform},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {149},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/149},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Stanek12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StefanovS12,
  author       = {Emil Stefanov and
                  Elaine Shi},
  title        = {FastPRP: Fast Pseudo-Random Permutations for Small Domains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {254},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/254},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StefanovS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Steinberger12,
  author       = {John P. Steinberger},
  title        = {Improved Security Bounds for Key-Alternating Ciphers via Hellinger
                  Distance},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {481},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/481},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Steinberger12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SteinbergerSY12,
  author       = {John P. Steinberger and
                  Xiaoming Sun and
                  Zhe Yang},
  title        = {Stam's Conjecture and Threshold Phenomena in Collision Resistance},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {451},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/451},
  timestamp    = {Wed, 26 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SteinbergerSY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Stevens12,
  author       = {Marc Stevens},
  title        = {Single-block collision attack on {MD5}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {40},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/040},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Stevens12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Sun12,
  author       = {Da{-}Zhi Sun},
  title        = {An error in "On a new formal proof model for {RFID} location privacy"},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {31},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/031},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Sun12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SwansonS12,
  author       = {Colleen Swanson and
                  Douglas R. Stinson},
  title        = {Combinatorial Solutions Providing Improved Security for the Generalized
                  Russian Cards Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {376},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/376},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SwansonS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ta12,
  author       = {Vinh{-}Thong Ta},
  title        = {Formal verification of secure ad-hoc network routing protocols using
                  deductive model-checking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {139},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/139},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ta12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TanHW12,
  author       = {Xiao Tan and
                  Qiong Huang and
                  Duncan S. Wong},
  title        = {Concurrent Signature without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {576},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/576},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/TanHW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Tang12,
  author       = {ZhaoHui Tang},
  title        = {Homomorphic A-codes for Network Coding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {331},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/331},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Tang12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Tang12a,
  author       = {Qiang Tang},
  title        = {Search in Encrypted Data: Theoretical Models and Practical Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {648},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/648},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Tang12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TangCQ12,
  author       = {Ming Tang and
                  Pingpan Cheng and
                  Zhenlong Qiu},
  title        = {Differential Power Analysis on {ZUC} Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {299},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/299},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/TangCQ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TangL12a,
  author       = {ZhaoHui Tang and
                  Hoon Wei Lim},
  title        = {Multi-receiver Homomorphic Authentication Codes for Network Coding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {447},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/447},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TangL12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TangZ0M12,
  author       = {Qiang Tang and
                  Yuanjie Zhao and
                  Xiaofeng Chen and
                  Hua Ma},
  title        = {Refine the Concept of Public Key Encryption with Delegated Search},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {654},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/654},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TangZ0M12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Tews12,
  author       = {Erik Tews},
  title        = {{DECT} Security Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {321},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/321},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Tews12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Thomae12,
  author       = {Enrico Thomae},
  title        = {A Generalization of the Rainbow Band Separation Attack and its Applications
                  to Multivariate Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {223},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/223},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Thomae12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Thomae12a,
  author       = {Enrico Thomae},
  title        = {Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-Commutative
                  Rings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {270},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/270},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Thomae12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TillichW12,
  author       = {Stefan Tillich and
                  Marcin W{\'{o}}jcik},
  title        = {Security Analysis of an Open Car Immobilizer Protocol Stack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {617},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/617},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TillichW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TiranM12,
  author       = {S{\'{e}}bastien Tiran and
                  Philippe Maurine},
  title        = {Magnitude Squared Coherence based {SCA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {77},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/077},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TiranM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Tsaban12,
  author       = {Boaz Tsaban},
  title        = {Polynomial time cryptanalysis of noncommutative-algebraic key exchange
                  protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {615},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/615},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Tsaban12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TsujiiTGF12,
  author       = {Shigeo Tsujii and
                  Kohtaro Tadaki and
                  Masahito Gotaishi and
                  Ryou Fujita},
  title        = {Construction of the Tsujii-Shamir-Kasahara {(TSK)} Type Multivariate
                  Public Key Cryptosystem, which relies on the Difficulty of Prime Factorization},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {145},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/145},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TsujiiTGF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Tunstall12,
  author       = {Michael Tunstall},
  title        = {Improved "Partial Sums"-based Square Attack on {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {280},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/280},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Tunstall12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Turan12,
  author       = {Meltem S{\"{o}}nmez Turan},
  title        = {On The Nonlinearity of Maximum-length {NFSR} Feedbacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {112},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/112},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Turan12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Unruh12,
  author       = {Dominique Unruh},
  title        = {Everlasting Quantum Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {177},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/177},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Unruh12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Unruh12a,
  author       = {Dominique Unruh},
  title        = {Programmable encryption and key-dependent messages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {423},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/423},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Unruh12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Vajda12,
  author       = {Istv{\'{a}}n Vajda},
  title        = {On instance separation in the UC-framework},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {302},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/302},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Vajda12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Veyrat-CharvillonGS12,
  author       = {Nicolas Veyrat{-}Charvillon and
                  Beno{\^{\i}}t G{\'{e}}rard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Security Evaluations Beyond Computing Power: How to Analyze Side-Channel
                  Attacks you Cannot Mount?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {578},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/578},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Veyrat-CharvillonGS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/VivekSBR12,
  author       = {S. Sree Vivek and
                  S. Sharmila Deva Selvi and
                  Guhan Balasubramanian and
                  C. Pandu Rangan},
  title        = {Strongly Unforgeable Proxy Re-Signature Schemes in the Standard model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {80},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/080},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/VivekSBR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/VivekSR12,
  author       = {S. Sree Vivek and
                  S. Sharmila Deva Selvi and
                  C. Pandu Rangan},
  title        = {Stronger Public Key Encryption Schemes Withstanding {RAM} Scraper
                  Like Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {118},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/118},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/VivekSR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/VoltePN12,
  author       = {Emmanuel Volte and
                  Jacques Patarin and
                  Val{\'{e}}rie Nachef},
  title        = {Zero Knowledge with Rubik's Cubes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {174},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/174},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/VoltePN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Wang12,
  author       = {Yongge Wang},
  title        = {Password Protected Smart Card and Memory Stick Authentication Against
                  Off-line Dictionary Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {120},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/120},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Wang12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Wang12a,
  author       = {Bin Wang},
  title        = {A unidirectional conditional proxy re-encryption scheme based on non-monotonic
                  access structure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {641},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/641},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Wang12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangAS12,
  author       = {Yang Wang and
                  Man Ho Au and
                  Willy Susilo},
  title        = {Perfect Ambiguous Optimistic Fair Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {462},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/462},
  timestamp    = {Tue, 09 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangAS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangCWC12,
  author       = {Shaohui Wang and
                  Dan{-}wei Chen and
                  Zhi{-}Wei Wang and
                  Suqin Chang},
  title        = {Public Auditing for Ensuring Cloud Data Storage Security With Zero
                  Knowledge Privacy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {365},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/365},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/WangCWC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangHLC12,
  author       = {Shaohui Wang and
                  Zhijie Han and
                  Sujuan Liu and
                  Dan{-}wei Chen},
  title        = {Security Analysis of {RAPP} An {RFID} Authentication Protocol based
                  on Permutation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {327},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/327},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangHLC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangLC12,
  author       = {Shaohui Wang and
                  Sujuan Liu and
                  Dan{-}wei Chen},
  title        = {Analysis and Construction of Efficient {RFID} Authentication Protocol
                  with Backward Privacy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {391},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/391},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangLC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangM12,
  author       = {Ding Wang and
                  Chunguang Ma},
  title        = {On the Security of an Improved Password Authentication Scheme Based
                  on {ECC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {190},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/190},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangM12a,
  author       = {Ding Wang and
                  Chunguang Ma},
  title        = {Robust Smart Card based Password Authentication Scheme against Smart
                  Card Loss Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {439},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/439},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangM12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangM12b,
  author       = {Ding Wang and
                  Chunguang Ma},
  title        = {On the (in)security of some smart-card-based password authentication
                  schemes for {WSN}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {581},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/581},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangM12b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangMGC12,
  author       = {Ding Wang and
                  Chunguang Ma and
                  De{-}li Gu and
                  Zhen{-}shan Cui},
  title        = {Cryptanalysis of Two Dynamic ID-based Remote User Authentication Schemes
                  for Multi-Server Architecture},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {484},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/484},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangMGC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangS12,
  author       = {Gaoli Wang and
                  Yanzhao Shen},
  title        = {Preimage and Pseudo-Collision Attacks on Step-Reduced {SM3} Hash Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {640},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/640},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangWZ12,
  author       = {Peng Wang and
                  Wenling Wu and
                  Liting Zhang},
  title        = {Cryptanalysis of the {OKH} Authenticated Encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {580},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/580},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangWZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangX12,
  author       = {Qinglong Wang and
                  Li Xu},
  title        = {Cryptanalysis on a novel unconditionally secure oblivious polynomial
                  evaluation protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {478},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/478},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangY12,
  author       = {Xu An Wang and
                  Xiaoyuan Yang},
  title        = {New Identity Based Encryption And Its Proxy Re-encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {250},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/250},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangYF12,
  author       = {Zilong Wang and
                  Danfeng (Daphne) Yao and
                  Rongquan Feng},
  title        = {Adaptive Key Protection in Complex Cryptosystems with Attributes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {136},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/136},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangYF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangYX12,
  author       = {Guilin Wang and
                  Jiangshan Yu and
                  Qi Xie},
  title        = {Security Analysis of {A} Single Sign-On Mechanism for Distributed
                  Computer Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {107},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/107},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangYX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WatanabeSS12,
  author       = {Yohei Watanabe and
                  Takenobu Seito and
                  Junji Shikata},
  title        = {Information-Theoretic Timed-Release Security: Key-Agreement, Encryption,
                  and Authentication Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {460},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/460},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WatanabeSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Waters12,
  author       = {Brent Waters},
  title        = {Functional Encryption for Regular Languages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {384},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/384},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Waters12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Weber12,
  author       = {Stefan G. Weber},
  title        = {On Transaction Pseudonyms with Implicit Attributes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {568},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/568},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Weber12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WeiPSLPW12,
  author       = {Lei Wei and
                  Thomas Peyrin and
                  Przemyslaw Sokolowski and
                  San Ling and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  title        = {On the (In)Security of {IDEA} in Various Hashing Modes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {264},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/264},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WeiPSLPW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WeiTW12,
  author       = {Wei Wei and
                  Chengliang Tian and
                  Xiaoyun Wang},
  title        = {New Transference Theorems on Lattices Possessing n\({}^{\mbox{{\(\epsilon\)}}}\)-unique
                  Shortest Vectors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {293},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/293},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WeiTW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WhitnallOS12,
  author       = {Carolyn Whitnall and
                  Elisabeth Oswald and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {The myth of generic DPA...and the magic of learning},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {256},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/256},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WhitnallOS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Wichs12,
  author       = {Daniel Wichs},
  title        = {Barriers in Cryptography with Weak, Correlated and Leaky Sources},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {459},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/459},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Wichs12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Wiemers12,
  author       = {Andreas Wiemers},
  title        = {A note on invariant linear transformations in multivariate public
                  key cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {602},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/602},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Wiemers12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Wilcox-OHearnW12,
  author       = {Zooko Wilcox{-}O'Hearn and
                  Brian Warner},
  title        = {Tahoe - The Least-Authority Filesystem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {524},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/524},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Wilcox-OHearnW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuFWGDZ12,
  author       = {Shuang Wu and
                  Dengguo Feng and
                  Wenling Wu and
                  Jian Guo and
                  Le Dong and
                  Jian Zou},
  title        = {(Pseudo) Preimage Attack on Round-Reduced Gr{\o}stl Hash Function
                  and Others (Extended Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {206},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/206},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/WuFWGDZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuG12,
  author       = {Teng Wu and
                  Guang Gong},
  title        = {The Weakness of Integrity Protection for {LTE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {690},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/690},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WuG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuW12,
  author       = {Shengbao Wu and
                  Mingsheng Wang},
  title        = {Automatic Search of Truncated Impossible Differentials and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {214},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/214},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WuW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XiaoBY12,
  author       = {Liangliang Xiao and
                  Osbert Bastani and
                  I{-}Ling Yen},
  title        = {An Efficient Homomorphic Encryption Protocol for Multi-User Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {193},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/193},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XiaoBY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XiaoY12,
  author       = {Liangliang Xiao and
                  I{-}Ling Yen},
  title        = {Security Analysis and Enhancement for Prefix-Preserving Encryption
                  Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {191},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/191},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XiaoY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XiaoY12a,
  author       = {Liangliang Xiao and
                  I{-}Ling Yen},
  title        = {A Note for the Ideal Order-Preserving Encryption Object and Generalized
                  Order-Preserving Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {350},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/350},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XiaoY12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XiaoYH12,
  author       = {Liangliang Xiao and
                  I{-}Ling Yen and
                  Dung T. Huynh},
  title        = {Extending Order Preserving Encryption for Multi-User Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {192},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/192},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XiaoYH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XieX012,
  author       = {Xiang Xie and
                  Rui Xue and
                  Rui Zhang},
  title        = {Deterministic Public Key Encryption and Identity-Based Encryption
                  from Lattices in the Auxiliary-Input Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {463},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/463},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XieX012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XiongF12,
  author       = {Xi Xiong and
                  Haining Fan},
  title        = {Bit-Parallel GF(2\({}^{\mbox{n}}\)) Squarer Using Shifted Polynomial
                  Basis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {626},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/626},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XiongF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XiongLDF12,
  author       = {Hai Xiong and
                  Chao Li and
                  Qingping Dai and
                  Shaojing Fu},
  title        = {New Constructions of Low Correlation Sequences with High Linear Complexity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {161},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/161},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XiongLDF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XuX12,
  author       = {ZiJie Xu and
                  Ke Xu},
  title        = {A Way Reduce Signed Bitwise Differences that Transformed Into Same
                  Modular Differences},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {330},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/330},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XuX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Yagisawa12,
  author       = {Masahiro Yagisawa},
  title        = {Key distribution system and attribute-based encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {241},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/241},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Yagisawa12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YanL12,
  author       = {Xiangtao Yan and
                  Yifa Li},
  title        = {A new remote data integrity checking scheme for cloud storage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {25},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/025},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YanL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangMWZ12,
  author       = {Min Yang and
                  Qingshu Meng and
                  Zhang{-}yi Wang and
                  Huanguo Zhang},
  title        = {Some observations to speed the polynomial selection in the number
                  field sieve},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {599},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/599},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangMWZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YaoZ12,
  author       = {Andrew C. Yao and
                  Yunlei Zhao},
  title        = {Digital Signatures from Challenge-Divided Sigma-Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/001},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YaoZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YaoZ12a,
  author       = {Andrew C. Yao and
                  Yunlei Zhao},
  title        = {Computationally-Fair Group and Identity-Based Key-Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {287},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/287},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YaoZ12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YiT12,
  author       = {Haibo Yi and
                  Shaohua Tang},
  title        = {A Versatile Multi-Input Multiplier over Finite Fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {545},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/545},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YiT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YonemuraIMH12,
  author       = {Tomoko Yonemura and
                  Taichi Isogai and
                  Hirofumi Muratani and
                  Yoshikazu Hanatani},
  title        = {Factor-4 and 6 (De)compression for Values of Pairings using Trace
                  Maps},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {593},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/593},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YonemuraIMH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YuCW12,
  author       = {Hongbo Yu and
                  Jiazhe Chen and
                  Xiaoyun Wang},
  title        = {The Boomerang Attacks on the Round-Reduced Skein-512},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {238},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/238},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YuCW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YuanY12,
  author       = {Jiawei Yuan and
                  Shucheng Yu},
  title        = {Proofs of Retrievability with Public Verifiability and Constant Communication
                  Cost in Cloud},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {682},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/682},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YuanY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Zaverucha12,
  author       = {Gregory M. Zaverucha},
  title        = {Hybrid Encryption in the Multi-User Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {159},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/159},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Zaverucha12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Zhandry12,
  author       = {Mark Zhandry},
  title        = {Identity-based Encryption is Secure in the Quantum Random Oracle Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {76},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/076},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Zhandry12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Zhandry12a,
  author       = {Mark Zhandry},
  title        = {How to Construct Quantum Random Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {182},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/182},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Zhandry12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangB12,
  author       = {Yihua Zhang and
                  Marina Blanton},
  title        = {Efficient Dynamic Provable Possession of Remote Data via Update Trees},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {291},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/291},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangC12,
  author       = {J. H. Zhang and
                  Y. B. Cui},
  title        = {Comment an Anonymous Multi-receiver Identity-based Encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {201},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/201},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangLL12,
  author       = {Yin Zhang and
                  Meicheng Liu and
                  Dongdai Lin},
  title        = {On the Immunity of Rotation Symmetric Boolean Functions Against Fast
                  Algebraic Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {111},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/111},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangWL12,
  author       = {Xusheng Zhang and
                  Kunpeng Wang and
                  Dongdai Lin},
  title        = {On Efficient Pairings on Elliptic Curves over Extension Fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {247},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/247},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangWL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangZ12,
  author       = {Bo Zhang and
                  Fangguo Zhang},
  title        = {Secure Similarity Coefficients Computation with Malicious Adversaries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {202},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/202},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangZC12,
  author       = {Jiang Zhang and
                  Zhenfeng Zhang and
                  Yu Chen},
  title        = {{PRE} - Stronger Security Notion and Efficient Construction with New
                  Property},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {664},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/664},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangZC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoGZWSJ12,
  author       = {Xin{-}jie Zhao and
                  Shize Guo and
                  Fan Zhang and
                  Tao Wang and
                  Zhijie Shi and
                  Keke Ji},
  title        = {Algebraic Differential Fault Attacks on {LED} using a Single Fault
                  Injection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {347},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/347},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoGZWSJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoWCZ12,
  author       = {Jingyuan Zhao and
                  Meiqin Wang and
                  Jiazhe Chen and
                  Yuliang Zheng},
  title        = {New Impossible Differential Attack on SAFER\({}_{\mbox{+}}\) and SAFER\({}_{\mbox{++}}\)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {715},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/715},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoWCZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhengQ12,
  author       = {Qun{-}Xiong Zheng and
                  Wen{-}Feng Qi},
  title        = {Further results on the distinctness of binary sequences derived from
                  primitive sequences modulo square-free odd integers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {709},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/709},
  timestamp    = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhengQ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhengQT12,
  author       = {Qun{-}Xiong Zheng and
                  Wen{-}Feng Qi and
                  Tian Tian},
  title        = {On the distinctness of binary sequences derived from primitive sequences
                  modulo square-free odd integers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {3},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/003},
  timestamp    = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhengQT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhengXA12,
  author       = {Qingji Zheng and
                  Shouhuai Xu and
                  Giuseppe Ateniese},
  title        = {Efficient Query Integrity for Outsourced Dynamic Databases},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {493},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/493},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhengXA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhongW12,
  author       = {Xiao Zhong and
                  Mingsheng Wang},
  title        = {Algebraic Attack on LFSR-Based Multi-Output Stream Ciphers and Research
                  on Algebraic Immunity for Multi-Output Boolean Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {338},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/338},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhongW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Zhou12,
  author       = {Cai{-}xue Zhou},
  title        = {Cryptanalysis and Improvement of a Multi-Receiver Generalized Signcryption
                  Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {638},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/638},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Zhou12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhouC12,
  author       = {Jun Zhou and
                  Zhenfu Cao},
  title        = {{PSCPA:} Patient Self-controllable Privacy-preserving Cooperative
                  Authentication in Distributed m-Healthcare Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {44},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/044},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhouC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Zhu12,
  author       = {Zhian Zhu},
  title        = {Cryptanalysis of pairing-free certificateless authenticated key agreement
                  protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {253},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/253},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Zhu12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZouWWD12,
  author       = {Jian Zou and
                  Wenling Wu and
                  Shuang Wu and
                  Le Dong},
  title        = {Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced
                  Gr{\o}stl},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {686},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/686},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ZouWWD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Aimani12,
  title        = {The Joint Signature and Encryption Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {154},
  year         = {2012},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2012/154},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Aimani12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlaouiDVGC12,
  title        = {Extended Security Arguments for (Ring) Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {68},
  year         = {2012},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2012/068},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlaouiDVGC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AvoineBC12,
  title        = {Discarding the Endpoints makes the Cryptanalytic Time-Memory Trade-Offs
                  even Faster},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {683},
  year         = {2012},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2012/683},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AvoineBC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CuiM12,
  title        = {Chosen-Ciphertext Secure Efficiently Searchable Encryption in the
                  Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {109},
  year         = {2012},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2012/109},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CuiM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DemirelVJ12,
  title        = {Efficient Mix-Net Veri cation by Proofs of Random Blocks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {16},
  year         = {2012},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2012/016},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DemirelVJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EM12,
  title        = {Design of Secure Image Transmission in {MANET} using Number Theory
                  Based Image Compression and Quasigroup Encryption {(NTICQE)} Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {660},
  year         = {2012},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2012/660},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GeCMZ12,
  title        = {Short and Efficient Expressive Attribute-Based Signature in the Standard
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {125},
  year         = {2012},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2012/125},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GeCMZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HongKK12,
  title        = {New Preimage Attacks on Hash Modes of {AES-256}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {372},
  year         = {2012},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2012/372},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HongKK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JamilMZUZ12,
  title        = {{STITCH-256:} {A} New Dedicated Cryptographic Hash Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {41},
  year         = {2012},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2012/041},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JamilMZUZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LangloisS12a,
  title        = {Hardness of decision {(R)LWE} for any modulus},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {91},
  year         = {2012},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2012/091},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LangloisS12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Li12,
  title        = {Remarks on- an ideal multi-secret sharing scheme based on {MSP}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {86},
  year         = {2012},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2012/086},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Li12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiL0JW12,
  title        = {Secure Outsourced Attribute-based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {635},
  year         = {2012},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2012/635},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiL0JW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lin12,
  title        = {The Transformation from the Galois {NLFSR} to the Fibonacci Configuration},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {257},
  year         = {2012},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2012/257},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lin12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LingS12,
  title        = {A Lattice-Based Traitor Tracing Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {88},
  year         = {2012},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2012/088},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LingS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MackvandiSN12,
  title        = {Breaking the provably secure {SAKE-C} authenticated key exchange protocol
                  with Extended Key Compromise Impersonation {(E-KCI)} Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {27},
  year         = {2012},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2012/027},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MackvandiSN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MorchonTGG12,
  title        = {Towards fully collusion-resistant ID-based establishment of pairwise
                  keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {618},
  year         = {2012},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2012/618},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MorchonTGG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OuZ12,
  title        = {Unbalanced Elementary Symmetric Boolean Functions with the Degree
                  "d" and "wt(d){\(\geq\)} 3"},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {101},
  year         = {2012},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2012/101},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OuZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Schmidt12,
  title        = {2048XKS - {A} Software Oriented High Security Block Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {541},
  year         = {2012},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2012/541},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Schmidt12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviVR12,
  title        = {On the Security of Attribute Based Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {62},
  year         = {2012},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2012/062},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviVR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TangL12,
  title        = {Cryptanalysis of Mun et al.'s anonymous authentication scheme for
                  roaming service in global mobility networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {55},
  year         = {2012},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2012/055},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TangL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TolueeAS12,
  title        = {An anonymous proxy signature scheme without random oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {313},
  year         = {2012},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2012/313},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TolueeAS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Toorani12,
  title        = {Security Analysis of {J-PAKE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {21},
  year         = {2012},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2012/021},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Toorani12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/VigilCWB12,
  title        = {Authenticity, Integrity and Proof-of-Existence for Long-Term Archiving:
                  a Survey},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {499},
  year         = {2012},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2012/499},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/VigilCWB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangJ12,
  title        = {Higher Order Algebraic Attacks on Stream Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {13},
  year         = {2012},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2012/013},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangMW12,
  title        = {Secure password-based remote user authentication scheme with non-tamper
                  resistant smart cards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {227},
  year         = {2012},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2012/227},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangMW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangSC12,
  title        = {Homomorphic Signature for Identity Authentication in Cloud Computing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {271},
  year         = {2012},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2012/271},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangSC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XiongQL12,
  title        = {New Construction of Perfect Sequence Set and Low Correlation Zone
                  Sequence Set},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {160},
  year         = {2012},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2012/160},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XiongQL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangJR12,
  title        = {{DAC-MACS:} Effective Data Access Control for Multi-Authority Cloud
                  Storage Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {419},
  year         = {2012},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2012/419},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangJR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangLCJWR12,
  title        = {{TAAC:} Temporal Attribute-based Access Control for Multi-Authority
                  Cloud Storage Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {651},
  year         = {2012},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2012/651},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangLCJWR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangS12,
  title        = {Strongly Authenticated Key Exchange Protocol from Bilinear Groups
                  without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {381},
  year         = {2012},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2012/381},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangDG12,
  title        = {Cryptanalysis of Hummingbird-2},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {207},
  year         = {2012},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2012/207},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangDG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics