Search dblp for Publications

export results for "toc:db/journals/iacr/iacr2011.bht:"

 download as .bib file

@article{DBLP:journals/iacr/AbazariS11,
  author       = {Farzaneh Abazari and
                  Babak Sadeghian},
  title        = {Cryptanalysis with Ternary Difference: Applied to Block Cipher {PRESENT}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {22},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/022},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbazariS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbbasiA11,
  author       = {Imran Abbasi and
                  Mehreen Afzal},
  title        = {A Compact S-Box Design for {SMS4} Block Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {522},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/522},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbbasiA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdelraheemBNVZ11,
  author       = {Mohamed Ahmed Abdelraheem and
                  C{\'{e}}line Blondeau and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Marion Videau and
                  Erik Zenner},
  title        = {Cryptanalysis of {ARMADILLO2}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {160},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/160},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdelraheemBNVZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdelraheemBZ11,
  author       = {Mohamed Ahmed Abdelraheem and
                  Julia Borghoff and
                  Erik Zenner},
  title        = {Cryptanalysis of the Light-Weight Cipher {A2U2} - Reduced draft version},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {262},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/262},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdelraheemBZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AcarLNS11,
  author       = {Tolga Acar and
                  Kristin E. Lauter and
                  Michael Naehrig and
                  Daniel Shumow},
  title        = {Affine Pairings on {ARM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {243},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/243},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AcarLNS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalBVVW11,
  author       = {Shweta Agrawal and
                  Xavier Boyen and
                  Vinod Vaikuntanathan and
                  Panagiotis Voulgaris and
                  Hoeteck Wee},
  title        = {Fuzzy Identity Based Encryption from Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {414},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/414},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalBVVW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalFV11,
  author       = {Shweta Agrawal and
                  David Mandell Freeman and
                  Vinod Vaikuntanathan},
  title        = {Functional Encryption for Inner Product Predicates from Learning with
                  Errors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {410},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/410},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalFV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalMS11,
  author       = {Shashank Agrawal and
                  Abhinav Mehta and
                  Kannan Srinathan},
  title        = {Secure Message Transmission In Asynchronous Directed Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {13},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/013},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalMS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalMS11a,
  author       = {Shashank Agrawal and
                  Abhinav Mehta and
                  Kannan Srinathan},
  title        = {Unconditionally Reliable Message Transmission in Directed Neighbour
                  Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {14},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/014},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalMS11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Agren11,
  author       = {Martin {\AA}gren},
  title        = {Some Instant- and Practical-Time Related-Key Attacks on {KTANTAN32/48/64}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {140},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/140},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Agren11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrenJ11,
  author       = {Martin {\AA}gren and
                  Thomas Johansson},
  title        = {Linear Cryptanalysis of PRINTcipher - Trails and Samples Everywhere},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {423},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/423},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrenJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AhmadLSS11,
  author       = {Junaid Jameel Ahmad and
                  Shujun Li and
                  Ahmad{-}Reza Sadeghi and
                  Thomas Schneider},
  title        = {{CTL:} {A} Platform-Independent Crypto Tools Library Based on Dataflow
                  Programming Paradigm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {679},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/679},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AhmadLSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AhmadiG11,
  author       = {Omran Ahmadi and
                  Robert Granger},
  title        = {On isogeny classes of Edwards curves over finite fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {135},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/135},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AhmadiG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AhmadiG11a,
  author       = {Omran Ahmadi and
                  Robert Granger},
  title        = {An efficient deterministic test for Kloosterman sum zeros},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {199},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/199},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AhmadiG11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AhmadiS11,
  author       = {Hadi Ahmadi and
                  Reihaneh Safavi{-}Naini},
  title        = {Secret Keys from Channel Noise},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {63},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/063},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AhmadiS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AhmadiS11a,
  author       = {Hadi Ahmadi and
                  Reihaneh Safavi{-}Naini},
  title        = {Common Randomness and Secret Key Capacities of Two-way Channels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {106},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/106},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AhmadiS11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AhmedJZ11,
  author       = {Naveed Ahmed and
                  Christian Damsgaard Jensen and
                  Erik Zenner},
  title        = {Private-key Symbolic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {564},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/564},
  timestamp    = {Fri, 19 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AhmedJZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AhnBCHSW11,
  author       = {Jae Hyun Ahn and
                  Dan Boneh and
                  Jan Camenisch and
                  Susan Hohenberger and
                  Abhi Shelat and
                  Brent Waters},
  title        = {Computing on Authenticated Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {96},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/096},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AhnBCHSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Aimani11,
  author       = {Laila El Aimani},
  title        = {Generic Constructions for Verifiable Signcryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {592},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/592},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Aimani11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AkinyeleGR11,
  author       = {Joseph A. Akinyele and
                  Matthew Green and
                  Aviel D. Rubin},
  title        = {Charm: {A} framework for Rapidly Prototyping Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {617},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/617},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AkinyeleGR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Al-KuwariDB11,
  author       = {Saif Al{-}Kuwari and
                  James H. Davenport and
                  Russell J. Bradford},
  title        = {Cryptographic Hash Functions: Recent Design Trends and Security Notions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {565},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/565},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Al-KuwariDB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtC11,
  author       = {Martin R. Albrecht and
                  Carlos Cid},
  title        = {Cold Boot Key Recovery by Solving Polynomial Systems with Noise},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {38},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/038},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbrechtC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtCFP11,
  author       = {Martin R. Albrecht and
                  Carlos Cid and
                  Jean{-}Charles Faug{\`{e}}re and
                  Ludovic Perret},
  title        = {On the Relation Between the Mutant Strategy and the Normal Selection
                  Strategy in Gr{\"{o}}bner Basis Algorithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {164},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/164},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbrechtCFP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtFFP11,
  author       = {Martin R. Albrecht and
                  Pooya Farshim and
                  Jean{-}Charles Faug{\`{e}}re and
                  Ludovic Perret},
  title        = {Polly Cracker, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {289},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/289},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbrechtFFP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtFPW11,
  author       = {Martin R. Albrecht and
                  Pooya Farshim and
                  Kenneth G. Paterson and
                  Gaven J. Watson},
  title        = {On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {213},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/213},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbrechtFPW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlekseychukK11,
  author       = {A. N. Alekseychuk and
                  L. V. Kovalchuk},
  title        = {Towards a Theory of Security Evaluation for GOST-like Ciphers against
                  Differential and Linear Cryptanalysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {489},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/489},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlekseychukK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlizadehM11,
  author       = {Javad Alizadeh and
                  Abdolrasoul Mirghadri},
  title        = {A New Distinguisher for CubeHash-8/b and CubeHash-15/b Compression
                  Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {550},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/550},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlizadehM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlwenKMZ11,
  author       = {Jo{\"{e}}l Alwen and
                  Jonathan Katz and
                  Ueli Maurer and
                  Vassilis Zikas},
  title        = {Collusion-Preserving Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {433},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/433},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlwenKMZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AmarilliMNPRT11,
  author       = {Antoine Amarilli and
                  Sascha M{\"{u}}ller and
                  David Naccache and
                  Daniel Page and
                  Pablo Rauzy and
                  Michael Tunstall},
  title        = {Can Code Polymorphism Limit Information Leakage?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {99},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/099},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AmarilliMNPRT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AmarilliNRS11,
  author       = {Antoine Amarilli and
                  David Naccache and
                  Pablo Rauzy and
                  Emil Simion},
  title        = {Can a Program Reverse-Engineer Itself?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {497},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/497},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AmarilliNRS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndreevaLM11,
  author       = {Elena Andreeva and
                  Atul Luykx and
                  Bart Mennink},
  title        = {Provable Security of {BLAKE} with Non-Ideal Compression Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {620},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/620},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AndreevaLM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndreevaMP11,
  author       = {Elena Andreeva and
                  Bart Mennink and
                  Bart Preneel},
  title        = {The Parazoa Family: Generalizing the Sponge Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {28},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/028},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AndreevaMP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AouinatouB11,
  author       = {Rkia Aouinatou and
                  Mostafa Belkasmi},
  title        = {Identification Based Encryption with {RSA-OAEP.} Using {SEM} and Without},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {684},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/684},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AouinatouB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ApplebaumBR11,
  author       = {Benny Applebaum and
                  Andrej Bogdanov and
                  Alon Rosen},
  title        = {A Dichotomy for Local Small-Bias Generators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {512},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/512},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ApplebaumBR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AriffinAA11,
  author       = {Muhammad Rezal Kamel Ariffin and
                  M. A. Asbullah and
                  Nor Azman Abu},
  title        = {Security Features of an Asymmetric Cryptosystem based on the Diophantine
                  Equation Discrete Log Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {467},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/467},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AriffinAA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Arita11,
  author       = {Seiko Arita},
  title        = {A constant-round resettably-sound resettable zero-knowledge argument
                  in the {BPK} model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {404},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/404},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Arita11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArmknechtAPS11,
  author       = {Frederik Armknecht and
                  Daniel Augot and
                  Ludovic Perret and
                  Ahmad{-}Reza Sadeghi},
  title        = {On Constructing Homomorphic Encryption Schemes from Coding Theory},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {309},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/309},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArmknechtAPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AsharovCH11,
  author       = {Gilad Asharov and
                  Ran Canetti and
                  Carmit Hazay},
  title        = {Towards a Game Theoretic View of Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {137},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/137},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AsharovCH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AsharovJW11,
  author       = {Gilad Asharov and
                  Abhishek Jain and
                  Daniel Wichs},
  title        = {Multiparty Computation with Low Communication, Computation and Interaction
                  via Threshold {FHE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {613},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/613},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AsharovJW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AsharovL11,
  author       = {Gilad Asharov and
                  Yehuda Lindell},
  title        = {A Full Proof of the {BGW} Protocol for Perfectly-Secure Multiparty
                  Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {136},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/136},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AsharovL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AvoineC11,
  author       = {Gildas Avoine and
                  Xavier Carpent},
  title        = {Yet Another Ultralightweight Authentication Protocol that is Broken},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {691},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/691},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AvoineC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BabaKT11,
  author       = {Srinath Baba and
                  Srinivas Kotyad and
                  Raghu Teja},
  title        = {A non-Abelian factorization problem and an associated cryptosystem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {48},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/048},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BabaKT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesGKM11,
  author       = {Michael Backes and
                  Ian Goldberg and
                  Aniket Kate and
                  Esfandiar Mohammadi},
  title        = {Provably Secure and Practical Onion Routing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {308},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/308},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesGKM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesKP11,
  author       = {Michael Backes and
                  Aniket Kate and
                  Arpita Patra},
  title        = {Computational Verifiable Secret Sharing Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {281},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/281},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesKP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BagheriSNS11,
  author       = {Nasour Bagheri and
                  Masoumeh Safkhani and
                  Majid Naderi and
                  Somitra Kumar Sanadhya},
  title        = {Security Analysis of LMAP\({}^{\mbox{++}}\), an {RFID} Authentication
                  Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {193},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/193},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BagheriSNS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaiL11,
  author       = {Dongxia Bai and
                  Leibo Li},
  title        = {New Impossible Differential Attacks on Camellia},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {661},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/661},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaiL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BainMSSZ11,
  author       = {Alex Bain and
                  John C. Mitchell and
                  Rahul Sharma and
                  Deian Stefan and
                  Joe Zimmerman},
  title        = {A Domain-Specific Language for Computing on Encrypted Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {561},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/561},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BainMSSZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Balamohan11,
  author       = {Balasingham Balamohan},
  title        = {{ACCELERATING} {THE} {SCALAR} {MULTIPLICATION} {ON} {GENUS} 2 {HYPERELLIPTIC}
                  {CURVE} {CRYPTOSYSTEMS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {578},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/578},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Balamohan11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BanerjeePR11,
  author       = {Abhishek Banerjee and
                  Chris Peikert and
                  Alon Rosen},
  title        = {Pseudorandom Functions and Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {401},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/401},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BanerjeePR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarakDKPPSY11,
  author       = {Boaz Barak and
                  Yevgeniy Dodis and
                  Hugo Krawczyk and
                  Olivier Pereira and
                  Krzysztof Pietrzak and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Yu Yu},
  title        = {Leftover Hash Lemma, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {88},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/088},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarakDKPPSY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarbosaF11,
  author       = {Manuel Barbosa and
                  Pooya Farshim},
  title        = {Delegatable Homomorphic Encryption with Applications to Secure Outsourcing
                  of Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {215},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/215},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarbosaF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BargK11,
  author       = {Alexander Barg and
                  Grigory Kabatiansky},
  title        = {Robust parent-identifying codes and combinatorial arrays},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {227},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/227},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BargK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarretoLM11,
  author       = {Paulo S. L. M. Barreto and
                  Richard Lindner and
                  Rafael Misoczki},
  title        = {Monoidic Codes in Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {371},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/371},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarretoLM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarsoumH11,
  author       = {Ayad F. Barsoum and
                  M. Anwar Hasan},
  title        = {On Verifying Dynamic Multiple Data Copies over Cloud Servers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {447},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/447},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarsoumH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BartheK11,
  author       = {Gilles Barthe and
                  Boris K{\"{o}}pf},
  title        = {Information-theoretic Bounds for Differentially Private Mechanisms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {71},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/071},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BartheK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaumslagFNSS11,
  author       = {Gilbert Baumslag and
                  Nelly Fazio and
                  Antonio Nicolosi and
                  Vladimir Shpilrain and
                  William E. Skeith III},
  title        = {Generalized Learning Problems and Applications to Non-Commutative
                  Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {357},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/357},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaumslagFNSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeckerCJ11,
  author       = {Anja Becker and
                  Jean{-}S{\'{e}}bastien Coron and
                  Antoine Joux},
  title        = {Improved Generic Algorithms for Hard Knapsacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {474},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/474},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeckerCJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareCK11,
  author       = {Mihir Bellare and
                  David Cash and
                  Sriram Keelveedhi},
  title        = {Ciphers that Securely Encipher their own Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {432},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/432},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareCK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareCM11,
  author       = {Mihir Bellare and
                  David Cash and
                  Rachel Miller},
  title        = {Cryptography Secure Against Related-Key Attacks and Tampering},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {252},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/252},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareCM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareDWY11,
  author       = {Mihir Bellare and
                  Rafael Dowsley and
                  Brent Waters and
                  Scott Yilek},
  title        = {Standard Security Does Not Imply Security Against Selective-Opening},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {581},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/581},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareDWY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareK11,
  author       = {Mihir Bellare and
                  Sriram Keelveedhi},
  title        = {Authenticated and Misuse-Resistant Encryption of Key-Dependent Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {269},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/269},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareKPW11,
  author       = {Mihir Bellare and
                  Eike Kiltz and
                  Chris Peikert and
                  Brent Waters},
  title        = {Identity-Based (Lossy) Trapdoor Functions and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {479},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/479},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareKPW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ben-SassonFO11,
  author       = {Eli Ben{-}Sasson and
                  Serge Fehr and
                  Rafail Ostrovsky},
  title        = {Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest
                  Minority},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {629},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/629},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ben-SassonFO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenabbasGV11,
  author       = {Siavosh Benabbas and
                  Rosario Gennaro and
                  Yevgeniy Vahlis},
  title        = {Verifiable Delegation of Computation over Large Datasets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {132},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/132},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenabbasGV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BendlinNNO11,
  author       = {Rikke Bendlin and
                  Jesper Buus Nielsen and
                  Peter Sebastian Nordholt and
                  Claudio Orlandi},
  title        = {Lower and Upper Bounds for Deniable Public-Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {46},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/046},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BendlinNNO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernhardFGSW11,
  author       = {David Bernhard and
                  Georg Fuchsbauer and
                  Essam Ghadafi and
                  Nigel P. Smart and
                  Bogdan Warinschi},
  title        = {Anonymous attestation with user-controlled linkability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {658},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/658},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernhardFGSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinDLSY11,
  author       = {Daniel J. Bernstein and
                  Niels Duif and
                  Tanja Lange and
                  Peter Schwabe and
                  Bo{-}Yin Yang},
  title        = {High-speed high-security signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {368},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/368},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinDLSY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinLP11,
  author       = {Daniel J. Bernstein and
                  Tanja Lange and
                  Christiane Peters},
  title        = {Wild McEliece Incognito},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {502},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/502},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinLP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinLPS11,
  author       = {Daniel J. Bernstein and
                  Tanja Lange and
                  Christiane Peters and
                  Peter Schwabe},
  title        = {Really fast syndrome-based hashing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {74},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/074},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinLPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinLPS11a,
  author       = {Daniel J. Bernstein and
                  Tanja Lange and
                  Christiane Peters and
                  Peter Schwabe},
  title        = {Faster 2-regular information-set decoding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {120},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/120},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinLPS11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinLS11,
  author       = {Daniel J. Bernstein and
                  Tanja Lange and
                  Peter Schwabe},
  title        = {On the correct use of the negation map in the Pollard rho method},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {3},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/003},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinLS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinLS11a,
  author       = {Daniel J. Bernstein and
                  Tanja Lange and
                  Peter Schwabe},
  title        = {The security impact of a new cryptographic library},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {646},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/646},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinLS11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BertoniDPA11,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche},
  title        = {Duplexing the sponge: single-pass authenticated encryption and other
                  applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {499},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/499},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BertoniDPA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BettaleFP11,
  author       = {Luk Bettale and
                  Jean{-}Charles Faug{\`{e}}re and
                  Ludovic Perret},
  title        = {Cryptanalysis of HFE, Multi-HFE and Variants for Odd and Even Characteristic},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {399},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/399},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BettaleFP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeuchatOY11,
  author       = {Jean{-}Luc Beuchat and
                  Eiji Okamoto and
                  Teppei Yamazaki},
  title        = {A Low-Area Unified Hardware Architecture for the {AES} and the Cryptographic
                  Hash Function {ECHO}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {78},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/078},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeuchatOY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeyeV11,
  author       = {Michael Beye and
                  Thijs Veugen},
  title        = {Improved Anonymity for Key-Trees},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {395},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/395},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeyeV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhaskarBGLT11,
  author       = {Raghav Bhaskar and
                  Abhishek Bhowmick and
                  Vipul Goyal and
                  Srivatsan Laxman and
                  Abhradeep Thakurta},
  title        = {Noiseless Database Privacy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {487},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/487},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BhaskarBGLT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhattacherjeeS11,
  author       = {Sanjay Bhattacherjee and
                  Palash Sarkar},
  title        = {Complete Tree Subset Difference Broadcast Encryption Scheme and its
                  Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {480},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/480},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BhattacherjeeS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BiC11,
  author       = {Jingguo Bi and
                  Qi Cheng},
  title        = {Lower bounds of shortest vector lengths in random knapsack lattices
                  and random {NTRU} lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {153},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/153},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BiC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BihamDKS11,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  title        = {New Data-Efficient Attacks on Reduced-Round {IDEA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {417},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/417},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BihamDKS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BirknerLS11,
  author       = {Peter Birkner and
                  Patrick Longa and
                  Francesco Sica},
  title        = {Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {608},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/608},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BirknerLS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BiryukovG11,
  author       = {Alex Biryukov and
                  Johann Gro{\ss}sch{\"{a}}dl},
  title        = {Cryptanalysis of the Full {AES} Using GPU-Like Special-Purpose Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {710},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/710},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BiryukovG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BiryukovKZ11,
  author       = {Alex Biryukov and
                  Ilya Kizhvatov and
                  Bin Zhang},
  title        = {Cryptanalysis of The Atmel Cipher in SecureMemory, CryptoMemory and
                  CryptoRF},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {707},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/707},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BiryukovKZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bisson11,
  author       = {Gaetan Bisson},
  title        = {Computing endomorphism rings of elliptic curves under the {GRH}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {42},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/042},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bisson11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BissonS11,
  author       = {Gaetan Bisson and
                  Andrew V. Sutherland},
  title        = {A low-memory algorithm for finding short product representations in
                  finite groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {4},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/004},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BissonS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyCCT11,
  author       = {Nir Bitansky and
                  Ran Canetti and
                  Alessandro Chiesa and
                  Eran Tromer},
  title        = {From Extractable Collision Resistance to Succinct Non-Interactive
                  Arguments of Knowledge, and Back Again},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {443},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/443},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BitanskyCCT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyCGHKR11,
  author       = {Nir Bitansky and
                  Ran Canetti and
                  Shafi Goldwasser and
                  Shai Halevi and
                  Yael Tauman Kalai and
                  Guy N. Rothblum},
  title        = {Program Obfuscation with Leaky Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {660},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/660},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BitanskyCGHKR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyCH11,
  author       = {Nir Bitansky and
                  Ran Canetti and
                  Shai Halevi},
  title        = {Leakage Tolerant Interactive Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {204},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/204},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BitanskyCH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyP11,
  author       = {Nir Bitansky and
                  Omer Paneth},
  title        = {From Point Obfuscation To 3-round Zero-Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {493},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/493},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BitanskyP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlackburnCM11,
  author       = {Simon R. Blackburn and
                  Carlos Cid and
                  Ciaran Mullan},
  title        = {Cryptanalysis of three matrix-based key establishment protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {73},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/073},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlackburnCM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlackburnOS11,
  author       = {Simon R. Blackburn and
                  Alina Ostafe and
                  Igor E. Shparlinski},
  title        = {On the Distribution of the Subset Sum Pseudorandom Number Generator
                  on Elliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {67},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/067},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlackburnOS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlantonA11,
  author       = {Marina Blanton and
                  Mehrdad Aliasgari},
  title        = {Secure Outsourced Computation of Iris Matching},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {462},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/462},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlantonA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlantonA11a,
  author       = {Marina Blanton and
                  Everaldo Aguiar},
  title        = {Private and Oblivious Set and Multiset Operations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {464},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/464},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlantonA11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlassPMO11,
  author       = {Erik{-}Oliver Blass and
                  Roberto Di Pietro and
                  Refik Molva and
                  Melek {\"{O}}nen},
  title        = {{PRISM} - Privacy-Preserving Search in MapReduce},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {244},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/244},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlassPMO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlomerGL11,
  author       = {Johannes Bl{\"{o}}mer and
                  Peter G{\"{u}}nther and
                  Gennadij Liske},
  title        = {Improved Side Channel Attacks on Pairing Based Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {706},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/706},
  timestamp    = {Sun, 27 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlomerGL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlondeauG11,
  author       = {C{\'{e}}line Blondeau and
                  Beno{\^{\i}}t G{\'{e}}rard},
  title        = {Multiple Differential Cryptanalysis: Theory and Practice (Corrected)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {115},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/115},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlondeauG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogdanovKLTVV11,
  author       = {Andrey Bogdanov and
                  Miroslav Knezevic and
                  Gregor Leander and
                  Deniz Toz and
                  Kerem Varici and
                  Ingrid Verbauwhede},
  title        = {{SPONGENT:} The Design Space of Lightweight Cryptographic Hashing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {697},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/697},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BogdanovKLTVV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogdanovKR11,
  author       = {Andrey Bogdanov and
                  Dmitry Khovratovich and
                  Christian Rechberger},
  title        = {Biclique Cryptanalysis of the Full {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {449},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/449},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BogdanovKR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogdanovL11,
  author       = {Andrej Bogdanov and
                  Chin Ho Lee},
  title        = {Homomorphic encryption from codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {622},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/622},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BogdanovL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogdanovR11,
  author       = {Andrey Bogdanov and
                  Vincent Rijmen},
  title        = {Zero-Correlation Linear Cryptanalysis of Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {123},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/123},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BogdanovR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogdanovTW11,
  author       = {Dan Bogdanov and
                  Riivo Talviste and
                  Jan Willemson},
  title        = {Deploying secure multi-party computation for financial data analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {662},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/662},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BogdanovTW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BohlHK11,
  author       = {Florian B{\"{o}}hl and
                  Dennis Hofheinz and
                  Daniel Kraschewski},
  title        = {On definitions of selective opening security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {678},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/678},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BohlHK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehF11,
  author       = {Dan Boneh and
                  David Mandell Freeman},
  title        = {Homomorphic Signatures for Polynomial Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {18},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/018},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehSW11,
  author       = {Dan Boneh and
                  Gil Segev and
                  Brent Waters},
  title        = {Targeted Malleability: Homomorphic Encryption for Restricted Computations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {311},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/311},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonisC11,
  author       = {Annalisa De Bonis and
                  Giovanni Di Crescenzo},
  title        = {A Group Testing Approach to Improved Corruption Localizing Hashing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {562},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/562},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonisC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosleyHN11,
  author       = {Carl Bosley and
                  Kristiyan Haralambiev and
                  Antonio Nicolosi},
  title        = {HB\({}^{\mbox{N}}\): An HB-like protocol secure against man-in-the-middle
                  attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {350},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/350},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosleyHN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouillaguetFM11,
  author       = {Charles Bouillaguet and
                  Pierre{-}Alain Fouque and
                  Gilles Macario{-}Rat},
  title        = {Practical Key-recovery For All Possible Parameters of {SFLASH}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {271},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/271},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouillaguetFM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoumanF11,
  author       = {Niek J. Bouman and
                  Serge Fehr},
  title        = {Secure Authentication from a Weak Key, Without Leaking Information},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {34},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/034},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoumanF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouraC11,
  author       = {Christina Boura and
                  Anne Canteaut},
  title        = {On the influence of the algebraic degree of F\({}^{\mbox{-1}}\) on
                  the algebraic degree of {G} circ {F}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {503},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/503},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouraC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyarP11,
  author       = {Joan Boyar and
                  Ren{\'{e}} Peralta},
  title        = {A depth-16 circuit for the {AES} S-box},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {332},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/332},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyarP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleGK11,
  author       = {Elette Boyle and
                  Shafi Goldwasser and
                  Yael Tauman Kalai},
  title        = {Leakage-Resilient Coin Tossing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {291},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/291},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyleGK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiGV11,
  author       = {Zvika Brakerski and
                  Craig Gentry and
                  Vinod Vaikuntanathan},
  title        = {Fully Homomorphic Encryption without Bootstrapping},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {277},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/277},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiGV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiK11,
  author       = {Zvika Brakerski and
                  Yael Tauman Kalai},
  title        = {A Parallel Repetition Theorem for Leakage Resilience},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {250},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/250},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiS11,
  author       = {Zvika Brakerski and
                  Gil Segev},
  title        = {Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input
                  Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {209},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/209},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiV11,
  author       = {Zvika Brakerski and
                  Vinod Vaikuntanathan},
  title        = {Efficient Fully Homomorphic Encryption from (Standard) {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {344},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/344},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrierNNT11,
  author       = {Eric Brier and
                  David Naccache and
                  Phong Q. Nguyen and
                  Mehdi Tibouchi},
  title        = {Modulus Fault Attacks Against {RSA-CRT} Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {388},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/388},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrierNNT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BringerP11,
  author       = {Julien Bringer and
                  Alain Patey},
  title        = {Backward Unlinkability for a {VLR} Group Signature Scheme with Efficient
                  Revocation Check},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {376},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/376},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BringerP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrogleGR11,
  author       = {Kyle Brogle and
                  Sharon Goldberg and
                  Leonid Reyzin},
  title        = {Sequential Aggregate Signatures with Lazy Verification from Trapdoor
                  Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {222},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/222},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrogleGR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Brown11,
  author       = {Daniel R. L. Brown},
  title        = {Identity-Based Decryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {266},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/266},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Brown11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Brown11a,
  author       = {Daniel R. L. Brown},
  title        = {Formally Assessing Cryptographic Entropy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {659},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/659},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Brown11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrumleyBPV11,
  author       = {Billy Bob Brumley and
                  Manuel Barbosa and
                  Dan Page and
                  Frederik Vercauteren},
  title        = {Practical realisation and elimination of an ECC-related software bug
                  attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {633},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/633},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrumleyBPV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrumleyT11,
  author       = {Billy Bob Brumley and
                  Nicola Tuveri},
  title        = {Remote Timing Attacks are Still Practical},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {232},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/232},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrumleyT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrzuskaFSK11,
  author       = {Christina Brzuska and
                  Marc Fischlin and
                  Heike Schr{\"{o}}der and
                  Stefan Katzenbeisser},
  title        = {Physically Uncloneable Functions in the Universal Composition Framework},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {681},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/681},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrzuskaFSK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BuchmannDEHR11,
  author       = {Johannes Buchmann and
                  Erik Dahmen and
                  Sarah Ereth and
                  Andreas H{\"{u}}lsing and
                  Markus R{\"{u}}ckert},
  title        = {On the Security of the Winternitz One-Time Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {191},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/191},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BuchmannDEHR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BuchmannDH11,
  author       = {Johannes Buchmann and
                  Erik Dahmen and
                  Andreas H{\"{u}}lsing},
  title        = {{XMSS} - {A} Practical Forward Secure Signature Scheme based on Minimal
                  Security Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {484},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/484},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BuchmannDH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bulygin11,
  author       = {Stanislav Bulygin},
  title        = {Algebraic cryptanalysis of the round-reduced and side channel analysis
                  of the full PRINTCipher-48},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {287},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/287},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bulygin11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Cai-SenTXP11,
  author       = {Cai{-}Sen Chen and
                  Tao Wang and
                  Xiaocen Chen and
                  Ping Zhou},
  title        = {An Improved Trace Driven Instruction Cache Timing Attack on {RSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {557},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/557},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Cai-SenTXP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Camacho11,
  author       = {Philippe Camacho},
  title        = {Optimal Data Authentication from Directed Transitive Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {439},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/439},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Camacho11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamachoH11,
  author       = {Philippe Camacho and
                  Alejandro Hevia},
  title        = {Short Transitive Signatures for Directed Trees},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {438},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/438},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamachoH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischHKLN11,
  author       = {Jan Camenisch and
                  Kristiyan Haralambiev and
                  Markulf Kohlweiss and
                  Jorn Lapon and
                  Vincent Naessens},
  title        = {Structure Preserving {CCA} Secure Encryption and Its Application to
                  Oblivious Third Parties},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {319},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/319},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischHKLN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischKS11,
  author       = {Jan Camenisch and
                  Stephan Krenn and
                  Victor Shoup},
  title        = {A Framework for Practical Universally Composable Zero-Knowledge Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {228},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/228},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischKS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiRR11,
  author       = {Ran Canetti and
                  Ben Riva and
                  Guy N. Rothblum},
  title        = {Two 1-Round Protocols for Delegation of Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {518},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/518},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiRR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CaoZZ11,
  author       = {Zhenfu Cao and
                  Zongyang Zhang and
                  Yunlei Zhao},
  title        = {Adaptive Security of Concurrent Non-Malleable Zero-Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {621},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/621},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CaoZZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CaroIP11,
  author       = {Angelo De Caro and
                  Vincenzo Iovino and
                  Giuseppe Persiano},
  title        = {Hidden Vector Encryption Fully Secure Against Unrestricted Queries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {546},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/546},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CaroIP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CatalanoF11,
  author       = {Dario Catalano and
                  Dario Fiore},
  title        = {Concise Vector Commitments and their Applications to Zero-Knowledge
                  Elementary Databases},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {495},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/495},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CatalanoF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CatalanoFW11,
  author       = {Dario Catalano and
                  Dario Fiore and
                  Bogdan Warinschi},
  title        = {Adaptive Pseudo-Free Groups and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {53},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/053},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CatalanoFW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CatalanoFW11a,
  author       = {Dario Catalano and
                  Dario Fiore and
                  Bogdan Warinschi},
  title        = {Efficient Network Coding Signatures in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {696},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/696},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CatalanoFW11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaiFG11,
  author       = {Qi Chai and
                  Xinxin Fan and
                  Guang Gong},
  title        = {An Ultra-Efficient Key Recovery Attack on the Lightweight Stream Cipher
                  {A2U2}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {247},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/247},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaiFG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChakrabortyMRS11,
  author       = {Debrup Chakraborty and
                  Cuauhtemoc Mancillas{-}L{\'{o}}pez and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and
                  Palash Sarkar},
  title        = {Efficient Hardware Implementations of {BRW} Polynomials and Tweakable
                  Enciphering Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {161},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/161},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChakrabortyMRS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChanSS11,
  author       = {T.{-}H. Hubert Chan and
                  Elaine Shi and
                  Dawn Song},
  title        = {Privacy-Preserving Stream Aggregation with Fault Tolerance},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {655},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/655},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChanSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChandranCV11,
  author       = {Nishanth Chandran and
                  Melissa Chase and
                  Vinod Vaikuntanathan},
  title        = {Collusion Resistant Obfuscation and Functional Re-encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {337},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/337},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChandranCV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangNY11,
  author       = {Donghoon Chang and
                  Mridul Nandi and
                  Moti Yung},
  title        = {Indifferentiability of the Hash Algorithm {BLAKE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {623},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/623},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangNY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChariJR11,
  author       = {Suresh Chari and
                  Charanjit S. Jutla and
                  Arnab Roy},
  title        = {Universally Composable Security Analysis of OAuth v2.0},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {526},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/526},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChariJR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaseK11,
  author       = {Melissa Chase and
                  Seny Kamara},
  title        = {Structured Encryption and Controlled Disclosure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {10},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/010},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaseK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaseK11a,
  author       = {Melissa Chase and
                  Markulf Kohlweiss},
  title        = {A Domain Transformation for Structure-Preserving Signatures on Group
                  Elements},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {342},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/342},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaseK11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaseL11,
  author       = {Melissa Chase and
                  Kristin E. Lauter},
  title        = {An Anonymous Health Care System},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {16},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/016},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaseL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChatterjeeMS11,
  author       = {Sanjit Chatterjee and
                  Alfred Menezes and
                  Palash Sarkar},
  title        = {Another Look at Tightness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {442},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/442},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChatterjeeMS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chen11,
  author       = {Keke Chen},
  title        = {On Security of the Utility Preserving {RASP} Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {614},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/614},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chen11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chen11a,
  author       = {Yitao Chen},
  title        = {Comments of an efficient and secure multi-server authentication scheme
                  with key agreement},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {702},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/702},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chen11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenC11,
  author       = {Liqun Chen and
                  Yu Chen},
  title        = {The n-Diffie-Hellman Problem and its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {397},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/397},
  timestamp    = {Fri, 06 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenCC11,
  author       = {Yu Chen and
                  Liqun Chen and
                  Zhong Chen},
  title        = {Generic Methods to Achieve Tighter Security Reductions for a Category
                  of {IBE} Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {90},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/090},
  timestamp    = {Thu, 22 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenCC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenCLW11,
  author       = {Yalin Chen and
                  Jue{-}Sam Chou and
                  Chi{-}Fong Lin and
                  Cheng{-}Lun Wu},
  title        = {A Novel {RFID} Authentication Protocol based on Elliptic Curve Cryptosystem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {381},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/381},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenCLW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenCWL11,
  author       = {Yalin Chen and
                  Jue{-}Sam Chou and
                  Cheng{-}Lun Wu and
                  Chi{-}Fong Lin},
  title        = {Identifying Large-Scale {RFID} Tags Using Non-Cryptographic Approach},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {167},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/167},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenCWL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenCZ11,
  author       = {Yu Chen and
                  Liqun Chen and
                  Zongyang Zhang},
  title        = {{CCA} Secure {IB-KEM} from the Computational Bilinear Diffie-Hellman
                  Assumption in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {593},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/593},
  timestamp    = {Fri, 06 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenCZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenDLSWW11,
  author       = {Liqun Chen and
                  Kurt Dietrich and
                  Hans L{\"{o}}hr and
                  Ahmad{-}Reza Sadeghi and
                  Christian Wachsmann and
                  Johannes Winter},
  title        = {Lightweight Anonymous Authentication with {TLS} and {DAA} for Embedded
                  Mobile Devices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {101},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/101},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenDLSWW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenH11,
  author       = {Yu{-}Chi Chen and
                  Gwoboa Horng},
  title        = {On the security models for certificateless signature schemes achieving
                  level 3 security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {554},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/554},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenJYW11,
  author       = {Jiazhe Chen and
                  Keting Jia and
                  Hongbo Yu and
                  Xiaoyun Wang},
  title        = {New Impossible Differential Attacks of Reduced-Round Camellia-192
                  and Camellia-256},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {17},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/017},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenJYW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenLLW11,
  author       = {Jie Chen and
                  Hoon Wei Lim and
                  San Ling and
                  Huaxiong Wang},
  title        = {The Relation and Transformation between Hierarchical Inner Product
                  Encryption and Spatial Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {455},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/455},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenLLW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenLLW11a,
  author       = {Jie Chen and
                  Hoon Wei Lim and
                  San Ling and
                  Huaxiong Wang},
  title        = {Fully Secure Spatial Encryption under Simple Assumptions with Constant-Size
                  Ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {650},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/650},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenLLW11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenLLWN11,
  author       = {Jie Chen and
                  Hoon Wei Lim and
                  San Ling and
                  Huaxiong Wang and
                  Khoa Nguyen},
  title        = {Revocable Identity-Based Encryption from Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {583},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/583},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenLLWN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenN11,
  author       = {Yuanmi Chen and
                  Phong Q. Nguyen},
  title        = {Faster Algorithms for Approximate Common Divisors: Breaking Fully-Homomorphic-Encryption
                  Challenges over the Integers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {436},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/436},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenTH11,
  author       = {Yu{-}Chi Chen and
                  Du{-}shiau Tsai and
                  Gwoboa Horng},
  title        = {On the Security of a Cheating Immune Visual Secret Sharing Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {631},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/631},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenTH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenWP11,
  author       = {Jiazhe Chen and
                  Meiqin Wang and
                  Bart Preneel},
  title        = {Impossible Differential Cryptanalysis of the Lightweight Block Ciphers
                  TEA, {XTEA} and {HIGHT}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {616},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/616},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenWP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenZF11,
  author       = {Cheng Chen and
                  Zhenfeng Zhang and
                  Dengguo Feng},
  title        = {Fully Secure (Doubly-)Spatial Encryption under Simpler Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {692},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/692},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenZF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Cheong11,
  author       = {Kai{-}Yuen Cheong},
  title        = {A Survey of Cryptography Based on Physically Unclonable Objects},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {488},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/488},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Cheong11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChilikovA11,
  author       = {Alexey A. Chilikov and
                  Evgeny K. Alekseev},
  title        = {Some Words About Cryptographic Key Recognition In Data Streams},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {643},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/643},
  timestamp    = {Thu, 19 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChilikovA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoiHKMR11,
  author       = {Seung Geol Choi and
                  Kyung{-}Wook Hwang and
                  Jonathan Katz and
                  Tal Malkin and
                  Dan Rubenstein},
  title        = {Secure Multi-Party Computation of Boolean Circuits with Applications
                  to Privacy in On-Line Marketplaces},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {257},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/257},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoiHKMR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoiKKZ11,
  author       = {Seung Geol Choi and
                  Jonathan Katz and
                  Ranjit Kumaresan and
                  Hong{-}Sheng Zhou},
  title        = {On the Security of the Free-XOR Technique},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {510},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/510},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoiKKZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChouCWL11,
  author       = {Jue{-}Sam Chou and
                  Yalin Chen and
                  Cheng{-}Lun Wu and
                  Chi{-}Fong Lin},
  title        = {An efficient {RFID} mutual authentication scheme based on {ECC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {418},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/418},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChouCWL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChouHC11,
  author       = {Jue{-}Sam Chou and
                  Shih{-}Che Hung and
                  Yalin Chen},
  title        = {An Efficient Secure Anonymous Proxy Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {498},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/498},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChouHC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChouWC11,
  author       = {Jue{-}Sam Chou and
                  Cheng{-}Lun Wu and
                  Yalin Chen},
  title        = {A Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {150},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/150},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChouWC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Choudhury11,
  author       = {Ashish Choudhury},
  title        = {Simple and Asymptotically Optimal t-Cheater Identifiable Secret Sharing
                  Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {330},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/330},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Choudhury11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoudhuryKP11,
  author       = {Ashish Choudhury and
                  Kaoru Kurosawa and
                  Arpita Patra},
  title        = {Simple and Efficient Single Round Almost Perfectly Secure Message
                  Transmission Tolerating Generalized Adversary},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {27},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/027},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoudhuryKP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoudhuryP11,
  author       = {Ashish Choudhury and
                  Arpita Patra},
  title        = {Statistical Asynchronous Weak Commitment Scheme: {A} New Primitive
                  to Design Statistical Asynchronous Verifiable Secret Sharing Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {31},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/031},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoudhuryP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoudhuryP11a,
  author       = {Ashish Choudhury and
                  Arpita Patra},
  title        = {On the Communication Complexity of Reliable and Secure Message Transmission
                  in Asynchronous Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {288},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/288},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoudhuryP11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoyZKHP11,
  author       = {Jiali Choy and
                  Aileen Zhang and
                  Khoongming Khoo and
                  Matt Henricksen and
                  Axel Poschmann},
  title        = {{AES} Variants Secure Against Related-Key Differential and Boomerang
                  Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {72},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/072},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoyZKHP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChungKLR11,
  author       = {Kai{-}Min Chung and
                  Yael Tauman Kalai and
                  Feng{-}Hao Liu and
                  Ran Raz},
  title        = {Memory Delegation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {273},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/273},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChungKLR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chunsheng11a,
  author       = {Chunsheng Gu},
  title        = {Fully Homomorphic Encryption, Approximate Lattice Problem and {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {114},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/114},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chunsheng11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chunsheng11b,
  author       = {Chunsheng Gu},
  title        = {Cryptanalysis of the Smart-Vercauteren and Gentry-Halevi's Fully Homomorphic
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {328},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/328},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chunsheng11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ciobotaru11,
  author       = {Oana Ciobotaru},
  title        = {Comparing {UC} Security Variants},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {355},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/355},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ciobotaru11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CissS11,
  author       = {Abdoul Aziz Ciss and
                  Djiby Sow},
  title        = {On a new generalization of Huff curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {580},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/580},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CissS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CissS11a,
  author       = {Abdoul Aziz Ciss and
                  Djiby Sow},
  title        = {Randomness Extraction in finite fields F\({}_{\mbox{p\({}^{\mbox{n}}\)}}\)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {582},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/582},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CissS11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ClarkE11,
  author       = {Jeremy Clark and
                  Aleksander Essex},
  title        = {CommitCoin: Carbon Dating Commitments with Bitcoin},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {677},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/677},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ClarkE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ClarkH11,
  author       = {Jeremy Clark and
                  Urs Hengartner},
  title        = {Selections: Internet Voting with Over-the-Shoulder Coercion-Resistance},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {166},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/166},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ClarkH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CohenF11,
  author       = {G{\'{e}}rard D. Cohen and
                  Jean{-}Pierre Flori},
  title        = {On a generalized combinatorial conjecture involving addition mod 2\({}^{\mbox{k}}\)-1},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {400},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/400},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CohenF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CohnH11,
  author       = {Henry Cohn and
                  Nadia Heninger},
  title        = {Approximate common divisors via lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {437},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/437},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CohnH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronGIP11,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Aline Gouget and
                  Thomas Icart and
                  Pascal Paillier},
  title        = {Supplemental Access Control {(PACE} v2): Security Analysis of {PACE}
                  Integrated Mapping},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {58},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/058},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronGIP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronMNT11,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Avradip Mandal and
                  David Naccache and
                  Mehdi Tibouchi},
  title        = {Fully Homomorphic Encryption over the Integers with Shorter Public
                  Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {441},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/441},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronMNT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronNT11,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  David Naccache and
                  Mehdi Tibouchi},
  title        = {Another Look at {RSA} Signatures With Affine Padding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {57},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/057},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronNT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronNT11a,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  David Naccache and
                  Mehdi Tibouchi},
  title        = {Optimization of Fully Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {440},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/440},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronNT11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CossetR11,
  author       = {Romain Cosset and
                  Damien Robert},
  title        = {Computing (l, l)-isogenies in polynomial time on Jacobians of genus
                  2 curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {143},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/143},
  timestamp    = {Wed, 16 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CossetR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CostelloL11,
  author       = {Craig Costello and
                  Kristin E. Lauter},
  title        = {Group Law Computations on Jacobians of Hyperelliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {306},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/306},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CostelloL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CostelloLN11,
  author       = {Craig Costello and
                  Kristin E. Lauter and
                  Michael Naehrig},
  title        = {Attractive Subfamilies of {BLS} Curves for Implementing High-Security
                  Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {465},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/465},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CostelloLN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Courtois11,
  author       = {Nicolas T. Courtois},
  title        = {Security Evaluation of {GOST} 28147-89 In View Of International Standardisation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {211},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/211},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Courtois11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Courtois11a,
  author       = {Nicolas T. Courtois},
  title        = {Algebraic Complexity Reduction and Cryptanalysis of {GOST}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {626},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/626},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Courtois11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CourtoisHM11,
  author       = {Nicolas T. Courtois and
                  Daniel Hulme and
                  Theodosis Mourouzis},
  title        = {Solving Circuit Optimisation Problems in Cryptography and Cryptanalysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {475},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/475},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CourtoisHM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CourtoisM11,
  author       = {Nicolas T. Courtois and
                  Michal Misztal},
  title        = {Differential Cryptanalysis of {GOST}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {312},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/312},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CourtoisM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CouveignesK11,
  author       = {Jean Marc Couveignes and
                  Jean{-}Gabriel Kammerer},
  title        = {The Geometry of Flex Tangents to a Cubic Curve and its Parameterizations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {33},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/033},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CouveignesK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerDKZZ11,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Eike Kiltz and
                  Sarah Zakarias and
                  Angela Zottarel},
  title        = {DDH-like Assumptions Based on Extension Rings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {280},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/280},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerDKZZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerDP11,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Valerio Pastro},
  title        = {On the Amortized Complexity of Zero Knowledge Protocols for Multiplicative
                  Relations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {301},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/301},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerDP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CremersF11,
  author       = {Cas Cremers and
                  Mich{\`{e}}le Feltz},
  title        = {One-round Strongly Secure Key Exchange with Perfect Forward Secrecy
                  and Deniability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {300},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/300},
  timestamp    = {Mon, 23 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CremersF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CremersRC11,
  author       = {Cas Cremers and
                  Kasper Bonne Rasmussen and
                  Srdjan Capkun},
  title        = {Distance Hijacking Attacks on Distance Bounding Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {129},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/129},
  timestamp    = {Mon, 23 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CremersRC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CristofaroDA11,
  author       = {Emiliano De Cristofaro and
                  Anthony Durussel and
                  Imad Aad},
  title        = {Reclaiming Privacy for Smartphone Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {41},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/041},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CristofaroDA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CristofaroGT11,
  author       = {Emiliano De Cristofaro and
                  Paolo Gasti and
                  Gene Tsudik},
  title        = {Fast and Private Computation of Set Intersection Cardinality},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {141},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/141},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CristofaroGT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CristofaroLT11,
  author       = {Emiliano De Cristofaro and
                  Yanbin Lu and
                  Gene Tsudik},
  title        = {Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {113},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/113},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CristofaroLT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CristofaroMP11,
  author       = {Emiliano De Cristofaro and
                  Mark Manulis and
                  Bertram Poettering},
  title        = {Private Discovery of Common Social Contacts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {26},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/026},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CristofaroMP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CristofaroSTW11,
  author       = {Emiliano De Cristofaro and
                  Claudio Soriente and
                  Gene Tsudik and
                  Andrew Williams},
  title        = {Hummingbird: Privacy at the time of Twitter},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {640},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/640},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CristofaroSTW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Csirmaz11,
  author       = {L{\'{a}}szl{\'{o}} Csirmaz},
  title        = {Complexity of universal access structures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {375},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/375},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Csirmaz11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Csirmaz11a,
  author       = {L{\'{a}}szl{\'{o}} Csirmaz},
  title        = {How to share secrets simultaneously},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {386},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/386},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Csirmaz11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CsirmazT11,
  author       = {L{\'{a}}szl{\'{o}} Csirmaz and
                  G{\'{a}}bor Tardos},
  title        = {On-line secret sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {174},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/174},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CsirmazT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledGKM11,
  author       = {Dana Dachman{-}Soled and
                  Rosario Gennaro and
                  Hugo Krawczyk and
                  Tal Malkin},
  title        = {Computational Extractors and Pseudorandomness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {708},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/708},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-SoledGKM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledMRV11,
  author       = {Dana Dachman{-}Soled and
                  Tal Malkin and
                  Mariana Raykova and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Adaptive and Concurrent Secure Computation from New Notions of Non-Malleability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {611},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/611},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-SoledMRV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaemenDA11,
  author       = {Joan Daemen and
                  Tony Dusenge and
                  Gilles Van Assche},
  title        = {Sufficient conditions for sound hashing using a truncated permutation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {459},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/459},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DaemenDA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaiL11,
  author       = {Zhaopeng Dai and
                  Zhuojun Liu},
  title        = {The Single Cycle T-functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {547},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/547},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DaiL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardFH11,
  author       = {Ivan Damg{\aa}rd and
                  Sebastian Faust and
                  Carmit Hazay},
  title        = {Secure Two-Party Computation with Low Communication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {508},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/508},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardFH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardFNS11,
  author       = {Ivan Damg{\aa}rd and
                  Jakob Funder and
                  Jesper Buus Nielsen and
                  Louis Salvail},
  title        = {Superposition Attacks on Cryptographic Protocols\}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {421},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/421},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardFNS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardPSZ11,
  author       = {Ivan Damg{\aa}rd and
                  Valerio Pastro and
                  Nigel P. Smart and
                  Sarah Zakarias},
  title        = {Multiparty Computation from Somewhat Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {535},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/535},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardPSZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DanezisKR11,
  author       = {George Danezis and
                  Markulf Kohlweiss and
                  Alfredo Rial},
  title        = {Differentially Private Billing with Rebates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {134},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/134},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DanezisKR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DavidNT11,
  author       = {Bernardo Machado David and
                  Anderson C. A. Nascimento and
                  Rafael Tonicelli},
  title        = {A Framework for Secure Single Sign-On},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {246},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/246},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DavidNT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DegabrieleLPSS11,
  author       = {Jean Paul Degabriele and
                  Anja Lehmann and
                  Kenneth G. Paterson and
                  Nigel P. Smart and
                  Mario Strefler},
  title        = {On the Joint Security of Encryption and Signature in {EMV}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {615},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/615},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DegabrieleLPSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DehbaouiTMSV11,
  author       = {Amine Dehbaoui and
                  S{\'{e}}bastien Tiran and
                  Philippe Maurine and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Nicolas Veyrat{-}Charvillon},
  title        = {Spectral Coherence Analysis - First Experimental Results -},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {56},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/056},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DehbaouiTMSV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DengFGLSY11,
  author       = {Yi Deng and
                  Dengguo Feng and
                  Vipul Goyal and
                  Dongdai Lin and
                  Amit Sahai and
                  Moti Yung},
  title        = {Resettable Cryptography in Constant Rounds - the Case of Zero Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {408},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/408},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DengFGLSY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ding11,
  author       = {Jintai Ding},
  title        = {Inverting the Square systems is exponential},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {275},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/275},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ding11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DingK11,
  author       = {Jintai Ding and
                  Thorsten Kleinjung},
  title        = {Degree of regularity for {HFE-}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {570},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/570},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DingK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DinurDS11,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Adi Shamir},
  title        = {Improved Attacks on Full {GOST}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {558},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/558},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DinurDS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DinurDS11a,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Adi Shamir},
  title        = {New attacks on Keccak-224 and Keccak-256},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {624},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/624},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DinurDS11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DinurGPSZ11,
  author       = {Itai Dinur and
                  Tim G{\"{u}}neysu and
                  Christof Paar and
                  Adi Shamir and
                  Ralf Zimmermann},
  title        = {An Experimentally Verified Attack on Full Grain-128 Using Dedicated
                  Reconfigurable Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {282},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/282},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DinurGPSZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisHT11,
  author       = {Yevgeniy Dodis and
                  Iftach Haitner and
                  Aris Tentes},
  title        = {On the (In)Security of {RSA} Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {87},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/087},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisHT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisLWW11,
  author       = {Yevgeniy Dodis and
                  Allison B. Lewko and
                  Brent Waters and
                  Daniel Wichs},
  title        = {Storing Secrets on Continually Leaky Devices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {369},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/369},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisLWW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DogetDP11,
  author       = {Julien Doget and
                  Guillaume Dabosville and
                  Emmanuel Prouff},
  title        = {Defeat Masking With a (Very) Few Knowledge About the Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {505},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/505},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DogetDP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DogetPRS11,
  author       = {Julien Doget and
                  Emmanuel Prouff and
                  Matthieu Rivain and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Univariate Side Channel Attacks and Leakage Modeling},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {302},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/302},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DogetPRS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dorrendorf11,
  author       = {Leo Dorrendorf},
  title        = {Protecting Drive Encryption Systems Against Memory Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {221},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/221},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dorrendorf11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingMMN11,
  author       = {Nico D{\"{o}}ttling and
                  Thilo Mie and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Tobias Nilges},
  title        = {Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {675},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/675},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingMMN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DoustiJ11,
  author       = {Mohammad Sadeq Dousti and
                  Rasool Jalili},
  title        = {Milder Definitions of Computational Approximability: The Case of Zero-Knowledge
                  Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {514},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/514},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DoustiJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DreierK11,
  author       = {Jannik Dreier and
                  Florian Kerschbaum},
  title        = {Practical Secure and Efficient Multiparty Linear Programming Based
                  on Problem Transformation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {108},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/108},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DreierK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DrelikhovMP11,
  author       = {Vladimir O. Drelikhov and
                  Grigory B. Marshalko and
                  Alexey V. Pokrovskiy},
  title        = {On the security of MQ{\_}DRBG},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {548},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/548},
  timestamp    = {Thu, 29 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DrelikhovMP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuanL11,
  author       = {Ming Duan and
                  Xuejia Lai},
  title        = {Improved zero-sum distinguisher for full round Keccak-f permutation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {23},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/023},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuanL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dubrova11,
  author       = {Elena Dubrova},
  title        = {A Scalable Method for Constructing Galois NLFSRs with Period 2\({}^{\mbox{n}}\)-1
                  using Cross-Join Pairs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {632},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/632},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dubrova11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DucGPW11,
  author       = {Alexandre Duc and
                  Jian Guo and
                  Thomas Peyrin and
                  Lei Wei},
  title        = {Unaligned Rebound Attack - Application to Keccak},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {420},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/420},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DucGPW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DucJ11,
  author       = {Alexandre Duc and
                  Dimitar Jetchev},
  title        = {Hardness of Computing Individual Bits for Pairing-based One-way Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {329},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/329},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DucJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DunkelmanKS11,
  author       = {Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  title        = {{ALRED} Blues: New Attacks on AES-Based MAC's},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {95},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/095},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DunkelmanKS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DunkelmanKS11a,
  author       = {Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  title        = {Minimalism in Cryptography: The Even-Mansour Scheme Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {541},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/541},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DunkelmanKS11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuquesneG11,
  author       = {Sylvain Duquesne and
                  Nicolas Guillermin},
  title        = {A {FPGA} pairing implementation using the Residue Number System},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {176},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/176},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuquesneG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DurholzFKO11,
  author       = {Ulrich D{\"{u}}rholz and
                  Marc Fischlin and
                  Michael Kasper and
                  Cristina Onete},
  title        = {A Formal Approach to Distance-Bounding {RFID} Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {321},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/321},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DurholzFKO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DurmuthF11,
  author       = {Markus D{\"{u}}rmuth and
                  David Mandell Freeman},
  title        = {Deniable Encryption with Negligible Detection Probability: An Interactive
                  Construction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {66},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/066},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DurmuthF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DziembowskiF11,
  author       = {Stefan Dziembowski and
                  Sebastian Faust},
  title        = {Leakage-Resilient Cryptography From the Inner-Product Extractor},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {519},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/519},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DziembowskiF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DziembowskiKW11,
  author       = {Stefan Dziembowski and
                  Tomasz Kazana and
                  Daniel Wichs},
  title        = {Key-Evolution Schemes Resilient to Space-Bounded Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {530},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/530},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DziembowskiKW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ElkhiyaouiBM11,
  author       = {Kaoutar Elkhiyaoui and
                  Erik{-}Oliver Blass and
                  Refik Molva},
  title        = {{CHECKER:} On-site checking in RFID-based supply chains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {651},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/651},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ElkhiyaouiBM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EngelsSSS11,
  author       = {Daniel W. Engels and
                  Markku{-}Juhani O. Saarinen and
                  Peter Schweitzer and
                  Eric M. Smith},
  title        = {The Hummingbird-2 Lightweight Authenticated Encryption Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {126},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/126},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EngelsSSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EricksonJS11,
  author       = {Stefan Erickson and
                  Michael J. Jacobson Jr. and
                  Andreas Stein},
  title        = {Explicit Formulas for Real Hyperelliptic Curves of Genus 2 in Affine
                  Representation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {105},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/105},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EricksonJS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EscalaHM11,
  author       = {Alex Escala and
                  Javier Herranz and
                  Paz Morillo},
  title        = {Revocable Attribute-Based Signatures with Adaptive Security in the
                  Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {52},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/052},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EscalaHM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EslamiP11,
  author       = {Ziba Eslami and
                  Nasrollah Pakniat},
  title        = {Certificateless Aggregate Signcryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {360},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/360},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EslamiP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EssexHH11,
  author       = {Aleksander Essex and
                  Christian Henrich and
                  Urs Hengartner},
  title        = {Single Layer Optical-scan Voting with Fully Distributed Trust},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {568},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/568},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EssexHH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FarashAB11,
  author       = {Mohammad Sabzinejad Farash and
                  Mahmoud Ahmadian{-}Attari and
                  Majid Bayat},
  title        = {Security of Multiple-Key Agreement Protocols and Propose an Enhanced
                  Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {634},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/634},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FarashAB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FarashahiMW11,
  author       = {Reza Rezaeian Farashahi and
                  Dustin Moody and
                  Hongfeng Wu},
  title        = {Isomorphism classes of Edwards curves over finite fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {206},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/206},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FarashahiMW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FarhatSS11,
  author       = {Farshid Farhat and
                  Somayeh Salimi and
                  Ahmad Salahi},
  title        = {Private Identification, Authentication and Key Agreement Protocol
                  with Security Mode Setup},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {45},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/045},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FarhatSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaugerePPR11,
  author       = {Jean{-}Charles Faug{\`{e}}re and
                  Ludovic Perret and
                  Christophe Petit and
                  Gu{\'{e}}na{\"{e}}l Renault},
  title        = {New Subexponential Algorithms for Factoring in SL(2, fq)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {598},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/598},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FaugerePPR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustPV11,
  author       = {Sebastian Faust and
                  Krzysztof Pietrzak and
                  Daniele Venturi},
  title        = {Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {314},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/314},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FaustPV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FazioINPS11,
  author       = {Nelly Fazio and
                  Kevin Iga and
                  Antonio Nicolosi and
                  Ludovic Perret and
                  William E. Skeith III},
  title        = {Random Self-Reducibility Properties of Learning Problems over Burnside
                  Groups of Exponent 3},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {398},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/398},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FazioINPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FilardoA11,
  author       = {Nathaniel Wesley Filardo and
                  Giuseppe Ateniese},
  title        = {High-Entropy Visual Identification for Touch Screen Devices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {359},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/359},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FilardoA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FischlinLS11,
  author       = {Marc Fischlin and
                  Anja Lehmann and
                  Dominique Schr{\"{o}}der},
  title        = {History-Free Sequential Aggregate Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {231},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/231},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FischlinLS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FleischhackerGKMP11,
  author       = {Nils Fleischhacker and
                  Felix G{\"{u}}nther and
                  Franziskus Kiefer and
                  Mark Manulis and
                  Bertram Poettering},
  title        = {Pseudorandom Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {673},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/673},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FleischhackerGKMP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FleischmannFL11,
  author       = {Ewan Fleischmann and
                  Christian Forler and
                  Stefan Lucks and
                  Jakob Wenzel},
  title        = {McOE: {A} Foolproof On-Line Authenticated Encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {644},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/644},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FleischmannFL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FloriM11,
  author       = {Jean{-}Pierre Flori and
                  Sihem Mesnager},
  title        = {An efficient characterization of a family of hyperbent functions with
                  multiple trace terms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {373},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/373},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FloriM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FloriMC11,
  author       = {Jean{-}Pierre Flori and
                  Sihem Mesnager and
                  G{\'{e}}rard D. Cohen},
  title        = {The Value 4 of Binary Kloosterman Sums},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {364},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/364},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FloriMC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FloriR11,
  author       = {Jean{-}Pierre Flori and
                  Hugues Randriam},
  title        = {On the Number of Carries Occuring in an Addition mod 2\({}^{\mbox{k}}\)-1},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {245},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/245},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FloriR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FouqueT11,
  author       = {Pierre{-}Alain Fouque and
                  Mehdi Tibouchi},
  title        = {Close to Uniform Prime Number Generation With Fewer Random Bits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {481},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/481},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FouqueT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FrancisHMM11,
  author       = {Lishoy Francis and
                  Gerhard P. Hancke and
                  Keith Mayes and
                  Konstantinos Markantonakis},
  title        = {Practical Relay Attack on Contactless Transactions by Using {NFC}
                  Mobile Phones},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {618},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/618},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FrancisHMM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargG11,
  author       = {Manish Garg and
                  Sugata Gangopadhyay},
  title        = {On lower bounds on second-order nonliearities of bent functions obtained
                  by using Niho power functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {171},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/171},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargG11a,
  author       = {Manish Garg and
                  Sugata Gangopadhyay},
  title        = {The Good lower bound of Second-order nonlinearity of a class of Boolean
                  function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {452},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/452},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargG11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargGJS11,
  author       = {Sanjam Garg and
                  Vipul Goyal and
                  Abhishek Jain and
                  Amit Sahai},
  title        = {Concurrently Secure Computation in Constant Rounds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {251},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/251},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargGJS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargOVW11,
  author       = {Sanjam Garg and
                  Rafail Ostrovsky and
                  Ivan Visconti and
                  Akshay Wadia},
  title        = {Resettable Statistical Zero Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {457},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/457},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargOVW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaudryKS11,
  author       = {Pierrick Gaudry and
                  David R. Kohel and
                  Benjamin A. Smith},
  title        = {Counting Points on Genus 2 Curves with Real Multiplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {295},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/295},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaudryKS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GenellePQ11,
  author       = {Laurie Genelle and
                  Emmanuel Prouff and
                  Micha{\"{e}}l Quisquater},
  title        = {Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative
                  Maskings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {425},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/425},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GenellePQ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryH11,
  author       = {Craig Gentry and
                  Shai Halevi},
  title        = {Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic
                  Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {279},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/279},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryHS11,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Nigel P. Smart},
  title        = {Fully Homomorphic Encryption with Polylog Overhead},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {566},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/566},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryHS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryHS11a,
  author       = {Craig Gentry and
                  Shai Halevi and
                  Nigel P. Smart},
  title        = {Better Bootstrapping in Fully Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {680},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/680},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryHS11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ghadafi11a,
  author       = {Essam Ghadafi},
  title        = {Formalizing Group Blind Signatures and Practical Constructions without
                  Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {402},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/402},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ghadafi11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GhoshMC11,
  author       = {Santosh Ghosh and
                  Debdeep Mukhopadhyay and
                  Dipanwita Roy Chowdhury},
  title        = {Security of Prime Field Pairing Cryptoprocessor Against Differential
                  Power Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {181},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/181},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GhoshMC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gittins11,
  author       = {Benjamin Gittins},
  title        = {Outline of a proposal responding to {E.U.} and {U.S.} calls for trustworthy
                  global-scale IdM and {CKM} designs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {29},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/029},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gittins11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GligoroskiOJ11,
  author       = {Danilo Gligoroski and
                  Rune Steinsmo {\O}deg{\aa}rd and
                  Rune Erlend Jensen},
  title        = {{OBSERVATION:} An explicit form for a class of second preimages for
                  any message {M} for the {SHA-3} candidate Keccak},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {261},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/261},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GligoroskiOJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldwasserLR11,
  author       = {Shafi Goldwasser and
                  Huijia Lin and
                  Aviad Rubinstein},
  title        = {Delegation of Computation without Rejection Problem from Designated
                  Verifier CS-Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {456},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/456},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldwasserLR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GordonKKMRV11,
  author       = {S. Dov Gordon and
                  Jonathan Katz and
                  Vladimir Kolesnikov and
                  Tal Malkin and
                  Mariana Raykova and
                  Yevgeniy Vahlis},
  title        = {Secure Computation with Sublinear Amortized Work},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {482},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/482},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GordonKKMRV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GordonKV11,
  author       = {S. Dov Gordon and
                  Jonathan Katz and
                  Vinod Vaikuntanathan},
  title        = {A Group Signature Scheme from Lattice Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {60},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/060},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GordonKV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GorenL11,
  author       = {Eyal Z. Goren and
                  Kristin E. Lauter},
  title        = {A Gross-Zagier formula for quaternion algebras over totally real fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {666},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/666},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GorenL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GotaishiT11,
  author       = {Masahito Gotaishi and
                  Shigeo Tsujii},
  title        = {Hidden Pair of Bijection Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {353},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/353},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GotaishiT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoubinM11,
  author       = {Louis Goubin and
                  Ange Martinelli},
  title        = {Protecting {AES} with Shamir's Secret Sharing Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {516},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/516},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoubinM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Goyal11,
  author       = {Vipul Goyal},
  title        = {Positive Results for Concurrently Secure Computation in the Plain
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {602},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/602},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Goyal11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalOR11,
  author       = {Vipul Goyal and
                  Adam O'Neill and
                  Vanishree Rao},
  title        = {Correlated-Input Secure Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {233},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/233},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalOR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrangerM11,
  author       = {Robert Granger and
                  Andrew Moss},
  title        = {Generalised Mersenne Numbers Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {444},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/444},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrangerM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrechnikovA11,
  author       = {Evgeny A. Grechnikov and
                  Andrew V. Adinetz},
  title        = {Collision for 75-step {SHA-1:} Intensive Parallelization with {GPU}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {641},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/641},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrechnikovA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Green11,
  author       = {Matthew Green},
  title        = {Secure Blind Decryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {109},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/109},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Green11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GroceK11,
  author       = {Adam Groce and
                  Jonathan Katz},
  title        = {Fair Computation with Rational Players},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {396},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/396},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GroceK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrossschadlP11,
  author       = {Johann Gro{\ss}sch{\"{a}}dl and
                  Dan Page},
  title        = {Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled
                  Mobile Devices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {712},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/712},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrossschadlP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Groth11,
  author       = {Jens Groth},
  title        = {Minimizing Non-interactive Zero-Knowledge Proofs Using Fully Homomorphic
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {12},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/012},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Groth11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gu11,
  author       = {Chunsheng Gu},
  title        = {New Fully Homomorphic Encryption over the Integers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {118},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/118},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gu11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gu11b,
  author       = {Chunsheng Gu},
  title        = {More Practical Fully Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {121},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/121},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gu11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gu11c,
  author       = {Chunsheng Gu},
  title        = {New Fully Homomorphic Encryption without Bootstrapping},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {645},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/645},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gu11c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gueron11,
  author       = {Shay Gueron},
  title        = {Efficient Software Implementations of Modular Exponentiation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {239},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/239},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gueron11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GueronK11,
  author       = {Shay Gueron and
                  Michael E. Kounavis},
  title        = {Security Enhancement of the Vortex Family of Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {652},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/652},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GueronK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Guillermin11,
  author       = {Nicolas Guillermin},
  title        = {A coprocessor for secure and high speed modular arithmetic},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {354},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/354},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Guillermin11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuillevicV11,
  author       = {Aurore Guillevic and
                  Damien Vergnaud},
  title        = {Genus 2 Hyperelliptic Curve Families with Explicit Jacobian Order
                  Evaluation and Pairing-Friendly Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {604},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/604},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuillevicV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuntherMS11,
  author       = {Felix G{\"{u}}nther and
                  Mark Manulis and
                  Thorsten Strufe},
  title        = {Cryptographic Treatment of Private User Profiles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {64},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/064},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuntherMS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoPP11,
  author       = {Jian Guo and
                  Thomas Peyrin and
                  Axel Poschmann},
  title        = {The {PHOTON} Family of Lightweight Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {609},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/609},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoPP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Haider11,
  author       = {Raja Zeshan Haider},
  title        = {Birthday Forgery Attack on 128-EIA3 Version 1.5},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {268},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/268},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Haider11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaitnerB11,
  author       = {Iftach Haitner and
                  Itay Berman},
  title        = {From Non-Adaptive to Adaptive Pseudorandom Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {504},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/504},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaitnerB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviHPS11,
  author       = {Shai Halevi and
                  Danny Harnik and
                  Benny Pinkas and
                  Alexandra Shulman{-}Peleg},
  title        = {Proofs of Ownership in Remote Storage Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {207},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/207},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviHPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviL11,
  author       = {Shai Halevi and
                  Huijia Lin},
  title        = {After-the-Fact Leakage in Public-Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {11},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/011},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviLP11,
  author       = {Shai Halevi and
                  Yehuda Lindell and
                  Benny Pinkas},
  title        = {Secure Computation on the Web: Computing without Simultaneous Interaction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {157},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/157},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviLP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hamburg11,
  author       = {Mike Hamburg},
  title        = {Spatial Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {389},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/389},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hamburg11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HanleyTM11,
  author       = {Neil Hanley and
                  Michael Tunstall and
                  William P. Marnane},
  title        = {Using Templates to Distinguish Multiplications from Squaring Operations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {236},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/236},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HanleyTM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HanrotPS11,
  author       = {Guillaume Hanrot and
                  Xavier Pujol and
                  Damien Stehl{\'{e}}},
  title        = {Terminating {BKZ}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {198},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/198},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HanrotPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hars11,
  author       = {Laszlo Hars},
  title        = {Random Number Generation Based on Oscillatory Metastability in Ring
                  Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {637},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/637},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hars11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaustenneNP11,
  author       = {Laurie Haustenne and
                  Quentin De Neyer and
                  Olivier Pereira},
  title        = {Elliptic Curve Cryptography in JavaScript},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {654},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/654},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaustenneNP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HazayMRT11,
  author       = {Carmit Hazay and
                  Gert L{\ae}ss{\o}e Mikkelsen and
                  Tal Rabin and
                  Tomas Toft},
  title        = {Efficient {RSA} Key Generation and Threshold Paillier in the Two-Party
                  Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {494},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/494},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HazayMRT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/He11,
  author       = {Debiao He},
  title        = {Comments on a secure dynamic ID-based remote user authentication scheme
                  for multi-server environment using smart cards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {234},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/234},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/He11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/He11a,
  author       = {Debiao He},
  title        = {Cryptanalysis of a key agreement protocol based on chaotic Hash},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {333},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/333},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/He11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/He11d,
  author       = {Debiao He},
  title        = {Security flaws in a biometrics-based multi-server authentication with
                  key agreement scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {365},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/365},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/He11d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/He11e,
  author       = {Debiao He},
  title        = {Comments on a password authentication and update scheme based on elliptic
                  curve cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {411},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/411},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/He11e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeCH11,
  author       = {Debiao He and
                  Jianhua Chen and
                  Jin Hu},
  title        = {Identity-based Digital Signature Scheme Without Bilinear Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {79},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/079},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeCH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeH11,
  author       = {Debiao He and
                  Jin Hu},
  title        = {An efficient certificateless two-party authenticated key agreement
                  scheme from pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {112},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/112},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeP11,
  author       = {Debiao He and
                  Sahadeo Padhye},
  title        = {A Pairing-free Certificateless Authenticated Key Agreement Protocol
                  in the eCK Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {478},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/478},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Heilman11,
  author       = {Ethan Heilman},
  title        = {Restoring the Differential Resistance of {MD6}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {374},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/374},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Heilman11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HermelinN11,
  author       = {Miia Hermelin and
                  Kaisa Nyberg},
  title        = {Linear Cryptanalysis Using Multiple Linear Approximations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {93},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/093},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HermelinN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HirtLMR11,
  author       = {Martin Hirt and
                  Christoph Lucas and
                  Ueli Maurer and
                  Dominik Raub},
  title        = {Graceful Degradation in Multi-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {94},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/094},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HirtLMR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hofheinz11,
  author       = {Dennis Hofheinz},
  title        = {All-But-Many Lossy Trapdoor Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {230},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/230},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hofheinz11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HofheinzJ11,
  author       = {Dennis Hofheinz and
                  Tibor Jager},
  title        = {Waters Signatures with Optimal Security Reduction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {703},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/703},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HofheinzJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HofheinzJK11,
  author       = {Dennis Hofheinz and
                  Tibor Jager and
                  Eike Kiltz},
  title        = {Short Signatures From Weaker Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {296},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/296},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HofheinzJK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HofheinzK11,
  author       = {Dennis Hofheinz and
                  Eike Kiltz},
  title        = {Programmable Hash Functions and Their Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {270},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/270},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HofheinzK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HofheinzS11,
  author       = {Dennis Hofheinz and
                  Victor Shoup},
  title        = {{GNUC:} {A} New Universal Composability Framework},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {303},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/303},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HofheinzS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HongKKPC11,
  author       = {Jeongdae Hong and
                  Jung Woo Kim and
                  Jihye Kim and
                  Kunsoo Park and
                  Jung Hee Cheon},
  title        = {Constant-Round Privacy Preserving Multiset Union},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {138},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/138},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HongKKPC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HongLLP11,
  author       = {Hoon Hong and
                  Eunjeong Lee and
                  Hyang{-}Sook Lee and
                  Cheol{-}Min Park},
  title        = {Simple and Exact Formula for Minimum Loop Length in Ate\({}_{\mbox{i}}\)
                  Pairing based on Brezing-Weng Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {40},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/040},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HongLLP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HongLM11,
  author       = {Jin Hong and
                  Ga Won Lee and
                  Daegun Ma},
  title        = {Analysis of the Parallel Distinguished Point Tradeoff},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {387},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/387},
  timestamp    = {Wed, 18 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HongLM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuLX11,
  author       = {Zhi Hu and
                  Patrick Longa and
                  Maozhi Xu},
  title        = {Implementing 4-Dimensional {GLV} Method on {GLS} Elliptic Curves with
                  j-Invariant 0},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {315},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/315},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuLX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Huang11,
  author       = {Hai Huang},
  title        = {Strongly Secure One Round Authenticated Key Exchange Protocol with
                  Perfect Forward Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {346},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/346},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Huang11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IonRC11,
  author       = {Mihaela Ion and
                  Giovanni Russello and
                  Bruno Crispo},
  title        = {Supporting Publication and Subscription Confidentiality in Pub/Sub
                  Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {25},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/025},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IonRC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JagerKSS11,
  author       = {Tibor Jager and
                  Florian Kohlar and
                  Sven Sch{\"{a}}ge and
                  J{\"{o}}rg Schwenk},
  title        = {A Standard-Model Security Analysis of {TLS-DHE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {219},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/219},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JagerKSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JainP11,
  author       = {Abhishek Jain and
                  Omkant Pandey},
  title        = {Non-Malleable Zero Knowledge: Black-Box Constructions and Definitional
                  Relationships},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {513},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/513},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JainP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JaoF11,
  author       = {David Jao and
                  Luca De Feo},
  title        = {Towards quantum-resistant cryptosystems from supersingular elliptic
                  curve isogenies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {506},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/506},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JaoF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JeanNS11,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Martin Schl{\"{a}}ffer},
  title        = {Improved Analysis of {ECHO-256}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {422},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/422},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JeanNS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JiaYW11,
  author       = {Keting Jia and
                  Hongbo Yu and
                  Xiaoyun Wang},
  title        = {A Meet-in-the-Middle Attack on the Full {KASUMI}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {466},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/466},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JiaYW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JinLW11,
  author       = {Qingfang Jin and
                  Zhuojun Liu and
                  Baofeng Wu},
  title        = {1-Resilient Boolean Function with Optimal Algebraic Immunity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {549},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/549},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JinLW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JinLWZ11,
  author       = {Qingfang Jin and
                  Zhuojun Liu and
                  Baofeng Wu and
                  Xiaoming Zhang},
  title        = {A general conjecture similar to {T-D} conjecture and its applications
                  in constructing Boolean functions with optimal algebraic immunity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {515},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/515},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JinLWZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JivanyanK11,
  author       = {Aram Jivanyan and
                  Gurgen Khachatryan},
  title        = {New Receipt-Free E-Voting Scheme and Self-Proving Mix Net as New Paradigm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {325},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/325},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JivanyanK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JonssonKU11,
  author       = {Kristj{\'{a}}n Valur J{\'{o}}nsson and
                  Gunnar Kreitz and
                  Misbah Uddin},
  title        = {Secure Multi-Party Sorting and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {122},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/122},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JonssonKU11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JouxV11,
  author       = {Antoine Joux and
                  Vanessa Vitse},
  title        = {Cover and Decomposition Index Calculus on Elliptic Curves made practical.
                  Application to a seemingly secure curve over F\({}_{\mbox{p\({}^{\mbox{6}}\)}}\)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {20},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/020},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JouxV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JutlaR11,
  author       = {Charanjit S. Jutla and
                  Arnab Roy},
  title        = {Relatively-Sound NIZKs and Password-Based Key-Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {507},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/507},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JutlaR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KamaraMR11,
  author       = {Seny Kamara and
                  Payman Mohassel and
                  Mariana Raykova},
  title        = {Outsourcing Multi-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {272},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/272},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KamaraMR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KamaraR11,
  author       = {Seny Kamara and
                  Mariana Raykova},
  title        = {Parallel Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {596},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/596},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KamaraR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kaosar11,
  author       = {Md. Golam Kaosar},
  title        = {Routing Protocol Based Shared and Session Key Exchange Protocol for
                  Wireless Mobile Ad-hoc Network},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {229},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/229},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kaosar11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kar11,
  author       = {Jayaprakash Kar},
  title        = {Proxy Blind Multi-signature Scheme using {ECC} for handheld devices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {43},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/043},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kar11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kasahara11,
  author       = {Masao Kasahara},
  title        = {A New Class of Biometrics on the Basis of Forgotten Secret Recovering
                  Scheme, {KSS(I)}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {124},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/124},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kasahara11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kasahara11a,
  author       = {Masao Kasahara},
  title        = {A Construction of {A} New Class of Knapsack-Type Public Key Cryptosystem,
                  K(III)Sigma {PKC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {125},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/125},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kasahara11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kasahara11b,
  author       = {Masao Kasahara},
  title        = {Public Key Cryptosystems Constructed Based on Random Pseudo Cyclic
                  Codes, K(IX)SE(1)PKC, Realizing Coding Rate of Exactly 1.0},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {545},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/545},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kasahara11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kasahara11c,
  author       = {Masao Kasahara},
  title        = {A New Class of Multivariate Public Key Cryptosystems Constructed Based
                  on Random Pseudo Cyclic Codes, K(XIII)SE(2)PKC, Realizing Coding Rate
                  of Exactly 1.0},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {573},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/573},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kasahara11c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kasahara11d,
  author       = {Masao Kasahara},
  title        = {A New Class of Multivariate Public Key Cryptosystem Constructed on
                  the Basis of Message-Dependent Transformation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {690},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/690},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kasahara11d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KatohHCT11,
  author       = {Yosuke Katoh and
                  Yun{-}Ju Huang and
                  Chen{-}Mou Cheng and
                  Tsuyoshi Takagi},
  title        = {Efficient Implementation of the eta\({}_{\mbox{T}}\) Pairing on {GPU}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {540},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/540},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KatohHCT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KatzMTZ11,
  author       = {Jonathan Katz and
                  Ueli Maurer and
                  Bj{\"{o}}rn Tackmann and
                  Vassilis Zikas},
  title        = {Universally Composable Synchronous Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {310},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/310},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KatzMTZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KatzenbeisserKLSSSW11,
  author       = {Stefan Katzenbeisser and
                  {\"{U}}nal Ko{\c{c}}abas and
                  Vincent van der Leest and
                  Ahmad{-}Reza Sadeghi and
                  Geert Jan Schrijen and
                  Heike Schr{\"{o}}der and
                  Christian Wachsmann},
  title        = {Recyclable PUFs: Logically Reconfigurable PUFs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {552},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/552},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KatzenbeisserKLSSSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KawachiPT11,
  author       = {Akinori Kawachi and
                  Christopher Portmann and
                  Keisuke Tanaka},
  title        = {Characterization of the relations between information-theoretic non-malleability,
                  secrecy, and authenticity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {92},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/092},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KawachiPT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KendallM11,
  author       = {Michelle Kendall and
                  Keith M. Martin},
  title        = {On the Role of Expander Graphs in Key Predistribution Schemes for
                  Wireless Sensor Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {555},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/555},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KendallM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhaderR11,
  author       = {Dalia Khader and
                  Peter Y. A. Ryan},
  title        = {Receipt Freeness of Pr{\^{e}}t {\`{a}} Voter Provably Secure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {594},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/594},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KhaderR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhanM11,
  author       = {Azhar Ali Khan and
                  Ghulam Murtaza},
  title        = {Efficient Implementation of Grand Cru with {TI} C6x+ Processor},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {385},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/385},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KhanM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhovratovichRS11,
  author       = {Dmitry Khovratovich and
                  Christian Rechberger and
                  Alexandra Savelieva},
  title        = {Bicliques for Preimages: Attacks on Skein-512 and the {SHA-2} family},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {286},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/286},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KhovratovichRS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiltzOS11,
  author       = {Eike Kiltz and
                  Adam O'Neill and
                  Adam D. Smith},
  title        = {Instantiability of {RSA-OAEP} under Chosen-Plaintext Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {559},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/559},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiltzOS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kim11,
  author       = {Chong Hee Kim},
  title        = {Differential Fault Analysis of {AES:} Toward Reducing Number of Faults},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {178},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/178},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kim11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kim11a,
  author       = {Chong Hee Kim},
  title        = {Efficient Methods for Exploiting Faults Induced at {AES} Middle Rounds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {349},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/349},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kim11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimJLJH11,
  author       = {ChangKyun Kim and
                  Eun{-}Gu Jung and
                  Dong Hoon Lee and
                  Chang{-}Ho Jung and
                  Daewan Han},
  title        = {Cryptanalysis of INCrypt32 in HID's iCLASS Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {469},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/469},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimJLJH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimJLW11,
  author       = {Hakhyun Kim and
                  Woongryul Jeon and
                  Yunho Lee and
                  Dongho Won},
  title        = {Cryptanalysis and improvement of a biometrics-based multi-server authentication
                  with key agreement scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {451},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/451},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimJLW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimLC11,
  author       = {Myungsun Kim and
                  Hyung Tae Lee and
                  Jung Hee Cheon},
  title        = {Mutual Private Set Intersection with Linear Complexity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {267},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/267},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimLC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kirchner11,
  author       = {Paul Kirchner},
  title        = {Improved Generalized Birthday Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {377},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/377},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kirchner11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KleinjungLPS11,
  author       = {Thorsten Kleinjung and
                  Arjen K. Lenstra and
                  Dan Page and
                  Nigel P. Smart},
  title        = {Using the Cloud to Determine Key Strengths},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {254},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/254},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KleinjungLPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Koblitz11,
  author       = {Neal Koblitz},
  title        = {Another Look at Automated Theorem-Proving. {II}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {485},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/485},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Koblitz11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoblitzM11,
  author       = {Neal Koblitz and
                  Alfred Menezes},
  title        = {Another Look at Security Definitions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {343},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/343},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoblitzM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KolesnikovS11,
  author       = {Vladimir Kolesnikov and
                  Ganapathy S. Sundaram},
  title        = {{IBAKE:} Identity-Based Authenticated Key Exchange Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {612},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/612},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KolesnikovS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KolokotronisL11,
  author       = {Nicholas Kolokotronis and
                  Konstantinos Limniotis},
  title        = {Maiorana-McFarland Functions with High Second-Order Nonlinearity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {212},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/212},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KolokotronisL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KongWHG11,
  author       = {Jiejun Kong and
                  Dapeng Wu and
                  Xiaoyan Hong and
                  Mario Gerla},
  title        = {Towards a Probabilistic Complexity-theoretic Modeling of Biological
                  Cyanide Poisoning as Service Attack in Self-organizing Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {639},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/639},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KongWHG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KooJK11,
  author       = {Namhun Koo and
                  Gooc Hwa Jo and
                  Soonhak Kwon},
  title        = {On Nonlinear Polynomial Selection and Geometric Progression (mod {N)}
                  for Number Field Sieve},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {292},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/292},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KooJK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KramerGO11,
  author       = {Simon Kramer and
                  Rajeev Gor{\'{e}} and
                  Eiji Okamoto},
  title        = {Computer-Aided Decision-Making for Formal Relations and Domains of
                  Trust, Distrust, and Mistrust with Cryptographic Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {235},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/235},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KramerGO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KrauseH11,
  author       = {Matthias Krause and
                  Matthias Hamann},
  title        = {The Cryptographic Power of Random Selection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {511},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/511},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KrauseH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kreitz11,
  author       = {Gunnar Kreitz},
  title        = {A Zero-One Law for Secure Multi-Party Computation with Ternary Outputs
                  (full version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {2},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/002},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kreitz11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KunihiroSI11,
  author       = {Noboru Kunihiro and
                  Naoyuki Shinohara and
                  Tetsuya Izu},
  title        = {A Unified Framework for Small Secret Exponent Attack on {RSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {591},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/591},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KunihiroSI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KurosawaNP11,
  author       = {Kaoru Kurosawa and
                  Ryo Nojima and
                  Le Trieu Phong},
  title        = {Generic Fully Simulatable Adaptive Oblivious Transfer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {382},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/382},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KurosawaNP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KurosawaP11,
  author       = {Kaoru Kurosawa and
                  Le Trieu Phong},
  title        = {Maximum Leakage Resilient {IBE} and {IPE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {628},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/628},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KurosawaP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KushilevitzLO11,
  author       = {Eyal Kushilevitz and
                  Steve Lu and
                  Rafail Ostrovsky},
  title        = {On the (In)security of Hash-based Oblivious {RAM} and a New Balancing
                  Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {327},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/327},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KushilevitzLO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KushwahL11,
  author       = {Prashant Kushwah and
                  Sunder Lal},
  title        = {Identity based signcryption schemes without random oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {372},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/372},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KushwahL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KustersT11,
  author       = {Ralf K{\"{u}}sters and
                  Max Tuengerthal},
  title        = {Composition Theorems Without Pre-Established Session Identifiers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {406},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/406},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KustersT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KustersTV11,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Andreas Vogt},
  title        = {Verifiability, Privacy, and Coercion-Resistance: New Insights from
                  a Case Study},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {517},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/517},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KustersTV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LambergerM11,
  author       = {Mario Lamberger and
                  Florian Mendel},
  title        = {Higher-Order Differential Attack on Reduced {SHA-256}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {37},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/037},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LambergerM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LampeP11,
  author       = {Rodolphe Lampe and
                  Jacques Patarin},
  title        = {Analysis of some natural variants of the {PKP} Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {686},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/686},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LampeP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaptyevaFK11,
  author       = {T. V. Laptyeva and
                  Sergej Flach and
                  K. Kladko},
  title        = {The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {172},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/172},
  timestamp    = {Wed, 11 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LaptyevaFK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaurWZ11,
  author       = {Sven Laur and
                  Jan Willemson and
                  Bingsheng Zhang},
  title        = {Round-efficient Oblivious Database Manipulation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {429},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/429},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LaurWZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LauterNV11,
  author       = {Kristin E. Lauter and
                  Michael Naehrig and
                  Vinod Vaikuntanathan},
  title        = {Can Homomorphic Encryption be Practical?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {405},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/405},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LauterNV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Le11,
  author       = {Duc{-}Phong Le},
  title        = {Fast Quadrupling of a Point in Elliptic Curve Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {39},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/039},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Le11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lee11,
  author       = {Moon Sung Lee},
  title        = {On the sparse subset sum problem from Gentry-Halevi's implementation
                  of fully homomorphic encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {567},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/567},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lee11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeCH11,
  author       = {Hyung Tae Lee and
                  Jung Hee Cheon and
                  Jin Hong},
  title        = {Analysis of Discrete Logarithm Algorithm using Pre-computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {187},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/187},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeCH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeH11,
  author       = {Jooyoung Lee and
                  Deukjo Hong},
  title        = {Collision Resistance of the {JH} Hash Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {19},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/019},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeSS11,
  author       = {Jooyoung Lee and
                  Martijn Stam and
                  John P. Steinberger},
  title        = {The preimage security of double-block-length compression functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {210},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/210},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lewko11,
  author       = {Allison B. Lewko},
  title        = {Tools for Simulating Features of Composite Order Bilinear Groups in
                  the Prime Order Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {490},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/490},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lewko11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LewkoW11,
  author       = {Allison B. Lewko and
                  Brent Waters},
  title        = {Unbounded {HIBE} and Attribute-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {49},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/049},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LewkoW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiCW11,
  author       = {Leibo Li and
                  Jiazhe Chen and
                  Xiaoyun Wang},
  title        = {Multiplied Conditional Impossible Differential Attack on Reduced-Round
                  Camellia},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {524},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/524},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiCW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiDY11,
  author       = {Hongwei Li and
                  Yuanshun Dai and
                  Bo Yang},
  title        = {Identity-Based Cryptography for Cloud Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {169},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/169},
  timestamp    = {Mon, 17 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiDY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiMZ11,
  author       = {Ming Li and
                  Ali Miri and
                  Daming Zhu},
  title        = {Analysis of the Hamming Weight of the Extended wmbNAF},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {569},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/569},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiMZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiNLOS11,
  author       = {Yang Li and
                  Daisuke Nakatsu and
                  Qi Li and
                  Kazuo Ohta and
                  Kazuo Sakiyama},
  title        = {Clockwise Collision Analysis - Overlooked Side-Channel Leakage Inside
                  Your Measurements},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {579},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/579},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiNLOS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiPLZ11,
  author       = {Jianwei Li and
                  Yanbin Pan and
                  Mingjie Liu and
                  Guizhen Zhu},
  title        = {An Efficient Broadcast Attack against {NTRU}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {590},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/590},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiPLZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiW11,
  author       = {Yongqiang Li and
                  Mingsheng Wang},
  title        = {Constructing differentially 4-uniform permutations over 2\({}^{\mbox{2m}}\)
                  from quadratic {APN} permutations over 2\({}^{\mbox{2m+1}}\)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {642},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/642},
  timestamp    = {Mon, 31 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiY11,
  author       = {Lei Li and
                  Siman Yang},
  title        = {On the Access Structures of Hyperelliptic Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {415},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/415},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertPQ11,
  author       = {Beno{\^{\i}}t Libert and
                  Kenneth G. Paterson and
                  Elizabeth A. Quaglia},
  title        = {Anonymous Broadcast Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {476},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/476},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertPQ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinFPW11,
  author       = {Dongdai Lin and
                  Jean{-}Charles Faug{\`{e}}re and
                  Ludovic Perret and
                  Tianze Wang},
  title        = {On Enumeration of Polynomial Equivalence Classes and Their Application
                  to {MPKC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {55},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/055},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinFPW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinP11,
  author       = {Zhiqiang Lin and
                  Dingyi Pei},
  title        = {Constructing a Diversified {FCSR} with a Given Connection Integer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {358},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/358},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinSY11,
  author       = {Dongdai Lin and
                  Tao Shi and
                  Zifeng Yang},
  title        = {Ergodic Theory Over F\({}_{\mbox{2[[T]]}}\)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {130},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/130},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinSY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lindell11,
  author       = {Yehuda Lindell},
  title        = {Highly-Efficient Universally-Composable Commitments based on the {DDH}
                  Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {180},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/180},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lindell11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LindellO11,
  author       = {Yehuda Lindell and
                  Eran Omri},
  title        = {A Practical Application of Differential Privacy to Personalized Online
                  Advertising},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {152},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/152},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LindellO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LindellPO11,
  author       = {Yehuda Lindell and
                  Benny Pinkas and
                  Eli Oxman},
  title        = {The {IPS} Compiler: Optimizations, Variants and Concrete Efficiency},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {435},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/435},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LindellPO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lipmaa11,
  author       = {Helger Lipmaa},
  title        = {Progression-Free Sets and Sublinear Pairing-Based Non-Interactive
                  Zero-Knowledge Arguments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {9},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/009},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lipmaa11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lipmaa11a,
  author       = {Helger Lipmaa},
  title        = {Two Simple Code-Verification Voting Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {317},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/317},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lipmaa11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LipmaaZ11,
  author       = {Helger Lipmaa and
                  Bingsheng Zhang},
  title        = {A More Efficient Computationally Sound Non-Interactive Zero-Knowledge
                  Shuffle Argument},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {394},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/394},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LipmaaZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuBZ11,
  author       = {Joseph K. Liu and
                  Feng Bao and
                  Jianying Zhou},
  title        = {Short and Efficient Certificate-Based Signature},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {192},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/192},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuBZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuGLLM11,
  author       = {Ya Liu and
                  Dawu Gu and
                  Zhiqiang Liu and
                  Wei Li and
                  Ying Man},
  title        = {Improved Results on Impossible Differential Cryptanalysis of Reduced-Round
                  Camellia-192/256},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {671},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/671},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuGLLM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuHY11,
  author       = {Jing Liu and
                  Qiong Huang and
                  Bo Yang},
  title        = {Efficient Multicast Key Distribution Using HOWF-based Access Control
                  Structures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {576},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/576},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuHY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuLW11,
  author       = {Feng Liu and
                  Peng Li and
                  Chuan Kun Wu},
  title        = {Encrypting More Information in Visual Cryptography Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {340},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/340},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuLW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuLXF11,
  author       = {Fanbao Liu and
                  Yi Liu and
                  Tao Xie and
                  Yumeng Feng},
  title        = {Fast Password Recovery Attack: Application to {APOP}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {248},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/248},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuLXF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuSXF11,
  author       = {Fanbao Liu and
                  Changxiang Shen and
                  Tao Xie and
                  Dengguo Feng},
  title        = {On the Security of {NMAC} and Its Variants},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {649},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/649},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuSXF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuW11,
  author       = {Jing Liu and
                  Changji Wang},
  title        = {Exclusive Key-Based Group Rekeying},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {575},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/575},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuWG11,
  author       = {Shusheng Liu and
                  Libin Wang and
                  Zheng Gong},
  title        = {Improved Related-Key Boomerang Distinguishing Attack of Threefish-256},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {323},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/323},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuWG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuWXZ11,
  author       = {Mingjie Liu and
                  Xiaoyun Wang and
                  Guangwu Xu and
                  Xuexin Zheng},
  title        = {Shortest Lattice Vectors in the Presence of Gaps},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {139},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/139},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuWXZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuXS11,
  author       = {Fanbao Liu and
                  Tao Xie and
                  Changxiang Shen},
  title        = {Breaking H\({}^{\mbox{2}}\)-MAC Using Birthday Paradox},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {647},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/647},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuXS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuYZ11,
  author       = {Joseph K. Liu and
                  Tsz Hon Yuen and
                  Jianying Zhou},
  title        = {Forward Secure Ring Signature without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {472},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/472},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuYZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuZYF11,
  author       = {Jiye Liu and
                  Yongbin Zhou and
                  Shuguo Yang and
                  Dengguo Feng},
  title        = {Generic Side-channel Distinguisher Based on Kolmogorov-Smirnov Test:
                  Explicit Construction and Practical Evaluation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {694},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/694},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuZYF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lopez-AltTV11,
  author       = {Adriana L{\'{o}}pez{-}Alt and
                  Eran Tromer and
                  Vinod Vaikuntanathan},
  title        = {Cloud-Assisted Multiparty Computation from Fully Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {663},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/663},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lopez-AltTV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Loubet-MoundiVO11,
  author       = {Philippe Loubet{-}Moundi and
                  David Vigilant and
                  Francis Olivier},
  title        = {Static Fault Attacks on Hardware {DES} Registers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {531},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/531},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Loubet-MoundiVO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuL11,
  author       = {Yang Lu and
                  Jiguo Li},
  title        = {Certificate-Based Signcryption: Security Model and Efficient Construction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {542},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/542},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuO11,
  author       = {Steve Lu and
                  Rafail Ostrovsky},
  title        = {Multi-Server Oblivious {RAM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {384},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/384},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LuO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuRZ11,
  author       = {Jian{-}Zhu Lu and
                  Hong{-}Qing Ren and
                  Jipeng Zhou},
  title        = {Efficient Delegation-Based Authentication Protocol with Strong Mobile
                  Privacy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {528},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/528},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuRZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuT11,
  author       = {Yanbin Lu and
                  Gene Tsudik},
  title        = {Enhancing Data Privacy in the Cloud},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {158},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/158},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuZQ11,
  author       = {Jian{-}Zhu Lu and
                  Shaoyuan Zhang and
                  Shijie Qie},
  title        = {Enhanced Biometrics-based Remote User Authentication Scheme Using
                  Smart Cards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {676},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/676},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuZQ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LunemannN11,
  author       = {Carolin Lunemann and
                  Jesper Buus Nielsen},
  title        = {Fully Simulatable Quantum-Secure Coin-Flipping and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {65},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/065},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LunemannN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuoL11,
  author       = {Yiyuan Luo and
                  Xuejia Lai},
  title        = {Attacks On a Double Length Blockcipher-based Hash Proposal},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {238},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/238},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuoL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lyubashevsky11,
  author       = {Vadim Lyubashevsky},
  title        = {Lattice Signatures Without Trapdoors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {537},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/537},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lyubashevsky11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ma11,
  author       = {Xiao Ma},
  title        = {Turbo Codes Can Be Asymptotically Information-Theoretically Secure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {80},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/080},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ma11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaA11,
  author       = {Chunbo Ma and
                  Jun Ao},
  title        = {Group-oriented ring signature},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {205},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/205},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaghebiGCD11,
  author       = {Houssem Maghrebi and
                  Sylvain Guilley and
                  Claude Carlet and
                  Jean{-}Luc Danger},
  title        = {Classification of High-Order Boolean Masking Schemes and Improvements
                  of their Efficiency},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {520},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/520},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaghebiGCD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Mahalanobis11,
  author       = {Ayan Mahalanobis},
  title        = {The ElGamal cryptosystem over circulant matrices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {572},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/572},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Mahalanobis11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MahmoodyMV11,
  author       = {Mohammad Mahmoody and
                  Tal Moran and
                  Salil P. Vadhan},
  title        = {Non-Interactive Time-Stamping and Proofs of Work in the Random Oracle
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {553},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/553},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MahmoodyMV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaitiGS11,
  author       = {Abhranil Maiti and
                  Vikash Gunreddy and
                  Patrick Schaumont},
  title        = {A Systematic Method to Evaluate and Compare the Performance of Physical
                  Unclonable Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {657},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/657},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/MaitiGS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaitraP11,
  author       = {Arpita Maitra and
                  Goutam Paul},
  title        = {A Note on Four-State {BB84} Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {588},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/588},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaitraP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MajiOPR11,
  author       = {Hemanta K. Maji and
                  Pichayoot Ouppaphan and
                  Manoj Prabhakaran and
                  Mike Rosulek},
  title        = {Exploring the Limits of Common Coins Using Frontier Analysis of Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {6},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/006},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MajiOPR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Mala11,
  author       = {Hamid Mala},
  title        = {Biclique Cryptanalysis of the Block Cipher {SQUARE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {500},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/500},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Mala11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MalikN11,
  author       = {Muhammad Yasir Malik and
                  Jong{-}Seon No},
  title        = {Dynamic {MDS} Matrices for Substantial Cryptographic Strength},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {177},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/177},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MalikN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MandalPS11,
  author       = {Avradip Mandal and
                  Jacques Patarin and
                  Yannick Seurin},
  title        = {On the Public Indifferentiability and Correlation Intractability of
                  the 6-Round Feistel Construction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {496},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/496},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MandalPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Maubach11,
  author       = {Stefan Maubach},
  title        = {A representation of the p-sylow subgroup of Perm(F\({}_{\mbox{p}}\)\({}^{\mbox{n}}\))
                  and a cryptographic application},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {383},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/383},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Maubach11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MedwedS11,
  author       = {Marcel Medwed and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Extractors Against Side-Channel Attacks: Weak or Strong?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {348},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/348},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MedwedS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MelchorBGH11,
  author       = {Carlos Aguilar Melchor and
                  Slim Bettaieb and
                  Philippe Gaborit and
                  Javier Herranz},
  title        = {Improving Additive and Multiplicative Homomorphic Encryption Schemes
                  Based on Worst-Case Hardness Assumptions\}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {607},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/607},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MelchorBGH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MenninkP11,
  author       = {Bart Mennink and
                  Bart Preneel},
  title        = {Hash Functions Based on Three Permutations: {A} Generic Security Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {532},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/532},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MenninkP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Mesnager11,
  author       = {Sihem Mesnager},
  title        = {A note on semi-bent functions with multiple trace terms and hyperelliptic
                  curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {627},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/627},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Mesnager11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MicciancioM11,
  author       = {Daniele Micciancio and
                  Petros Mol},
  title        = {Pseudorandom Knapsacks and the Sample Complexity of {LWE} Search-to-Decision
                  Reductions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {521},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/521},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MicciancioM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MicciancioP11,
  author       = {Daniele Micciancio and
                  Chris Peikert},
  title        = {Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {501},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/501},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MicciancioP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MilesV11,
  author       = {Eric Miles and
                  Emanuele Viola},
  title        = {The Advanced Encryption Standard, Candidate Pseudorandom Functions,
                  and Natural Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {226},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/226},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MilesV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MinierNP11,
  author       = {Marine Minier and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Thomas Peyrin},
  title        = {Analysis of reduced-SHAvite-3-256 v2},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {175},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/175},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MinierNP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Mohassel11,
  author       = {Payman Mohassel},
  title        = {Efficient and Secure Delegation of Linear Algebra},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {605},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/605},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Mohassel11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MohasselNSS11,
  author       = {Payman Mohassel and
                  Salman Niksefat and
                  Seyed Saeed Sadeghian and
                  Babak Sadeghiyan},
  title        = {A New Protocol for Oblivious {DFA} Evaluation and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {434},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/434},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MohasselNSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Molina-MarkhamDFSI11,
  author       = {Andres Molina{-}Markham and
                  George Danezis and
                  Kevin Fu and
                  Prashant J. Shenoy and
                  David E. Irwin},
  title        = {Designing Privacy-preserving Smart Meters with Low-cost Microcontrollers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {544},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/544},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Molina-MarkhamDFSI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MondalCDM11,
  author       = {Mainack Mondal and
                  Avik Chakraborti and
                  Nilanjan Datta and
                  Debdeep Mukhopadhyay},
  title        = {TweLEX: {A} Tweaked Version of the {LEX} Stream Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {586},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/586},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MondalCDM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoodyPS11,
  author       = {Dustin Moody and
                  Souradyuti Paul and
                  Daniel Smith{-}Tone},
  title        = {Indifferentiability Security of the Fast Widepipe Hash: Breaking the
                  Birthday Barrier},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {630},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/630},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoodyPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoodyS11,
  author       = {Dustin Moody and
                  Daniel Shumow},
  title        = {Analogues of Velu's formulas for Isogenies on Alternate Models of
                  Elliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {430},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/430},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoodyS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoradiBKP11,
  author       = {Amir Moradi and
                  Alessandro Barenghi and
                  Timo Kasper and
                  Christof Paar},
  title        = {On the Vulnerability of {FPGA} Bitstream Encryption against Power
                  Analysis Attacks - Extracting Keys from Xilinx Virtex-II FPGAs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {390},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/390},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoradiBKP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoradiKP11,
  author       = {Amir Moradi and
                  Markus Kasper and
                  Christof Paar},
  title        = {On the Portability of Side-Channel Attacks - An Analysis of the Xilinx
                  Virtex 4 and Virtex 5 Bitstream Encryption Mechanism},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {391},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/391},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoradiKP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoradiMP11,
  author       = {Amir Moradi and
                  Oliver Mischke and
                  Christof Paar},
  title        = {Collision Timing Attack when Breaking 42 {AES} {ASIC} Cores},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {162},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/162},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoradiMP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Mortazavi11,
  author       = {Seyyed Amir Mortazavi},
  title        = {A new attack on Jakobsson Hybrid Mix-Net},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {305},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/305},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Mortazavi11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MosesR11,
  author       = {William K. Moses Jr. and
                  C. Pandu Rangan},
  title        = {Rational Secret Sharing with Honest Players over an Asynchronous Channel},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {68},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/068},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MosesR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MossOPT11,
  author       = {Andrew Moss and
                  Elisabeth Oswald and
                  Dan Page and
                  Michael Tunstall},
  title        = {Automatic Insertion of {DPA} Countermeasures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {412},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/412},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MossOPT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Mrabet11,
  author       = {Nadia El Mrabet},
  title        = {Fault Attack against Miller's algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {709},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/709},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Mrabet11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MroczkowskiS11,
  author       = {Piotr Mroczkowski and
                  Janusz Szmidt},
  title        = {Corrigendum to: The Cube Attack on Stream Cipher Trivium and Quadraticity
                  Tests},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {32},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/032},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MroczkowskiS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MullerK11,
  author       = {Sascha M{\"{u}}ller and
                  Stefan Katzenbeisser},
  title        = {Hiding the Policy in Cryptographic Access Control},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {255},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/255},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MullerK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MunizL11,
  author       = {Madeline Gonz{\'{a}}lez Mu{\~{n}}iz and
                  Peeter Laud},
  title        = {Strong Forward Security in Identity-Based Signcryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {156},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/156},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MunizL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MurtazaI11,
  author       = {Ghulam Murtaza and
                  Nassar Ikram},
  title        = {Direct Exponent and Scalar Multiplication Classes of an {MDS} Matrix},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {151},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/151},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MurtazaI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MurtazaKAF11,
  author       = {Ghulam Murtaza and
                  Azhar Ali Khan and
                  Syed Wasi Alam and
                  Aqeel Farooqi},
  title        = {Fortification of {AES} with Dynamic Mix-Column Transformation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {184},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/184},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MurtazaKAF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MyersSS11,
  author       = {Steven A. Myers and
                  Mona Sergi and
                  Abhi Shelat},
  title        = {Threshold Fully Homomorphic Encryption and Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {454},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/454},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MyersSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NachefVP11,
  author       = {Val{\'{e}}rie Nachef and
                  Emmanuel Volte and
                  Jacques Patarin},
  title        = {Differential Attacks on Generalized Feistel Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {705},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/705},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NachefVP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NassarGD11,
  author       = {Maxime Nassar and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {Formal Analysis of the Entropy / Security Trade-off in First-Order
                  Masking Countermeasures against Side-Channel Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {534},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/534},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NassarGD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NayakAS11,
  author       = {Manan Nayak and
                  Shashank Agrawal and
                  Kannan Srinathan},
  title        = {Minimal Connectivity for Unconditionally Secure Message Transmission
                  in Synchronous Directed Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {320},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/320},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NayakAS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NeugebauerMW11,
  author       = {Georg Neugebauer and
                  Ulrike Meyer and
                  Susanne Wetzel},
  title        = {Fair and Privacy-Preserving Multi-Party Protocols for Reconciling
                  Ordered Input Sets (Extended version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {200},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/200},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NeugebauerMW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nguyen11,
  author       = {Long Hoang Nguyen},
  title        = {Rational authentication protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {70},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/070},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nguyen11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nguyen11a,
  author       = {Long Hoang Nguyen},
  title        = {Rational distance-bounding protocols over noisy channels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {492},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/492},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nguyen11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NguyenR11,
  author       = {Long Hoang Nguyen and
                  Andrew William Roscoe},
  title        = {On the construction of digest functions for manual authentication
                  protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {116},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/116},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NguyenR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nguyenova-StepanikovaD11,
  author       = {Alice Nguyenova{-}Stepanikova and
                  Tran Ngoc Duong},
  title        = {The block cipher {NSABC} (public domain)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {237},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/237},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nguyenova-StepanikovaD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NielsenNOB11,
  author       = {Jesper Buus Nielsen and
                  Peter Sebastian Nordholt and
                  Claudio Orlandi and
                  Sai Sheshank Burra},
  title        = {A New Approach to Practical Active-Secure Two-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {91},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/091},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NielsenNOB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NingX11,
  author       = {Chao Ning and
                  Qiuliang Xu},
  title        = {Constant-Rounds, Linear Multi-party Computation for Exponentiation
                  and Modulo Reduction with Perfect Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {69},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/069},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NingX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nitaj11,
  author       = {Abderrahmane Nitaj},
  title        = {A new attack on the KMOVcryptosystem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {427},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/427},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nitaj11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nitaj11a,
  author       = {Abderrahmane Nitaj},
  title        = {Cryptanalysis of {NTRU} with two public keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {477},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/477},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nitaj11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nojoumian11,
  author       = {Mehrdad Nojoumian},
  title        = {Socio-Rational Secret Sharing as a New Direction in Both Rational
                  Cryptography and Game Theory},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {370},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/370},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nojoumian11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ONeillPW11,
  author       = {Adam O'Neill and
                  Chris Peikert and
                  Brent Waters},
  title        = {Bi-Deniable Public-Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {352},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/352},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ONeillPW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OkamotoT11,
  author       = {Tatsuaki Okamoto and
                  Katsuyuki Takashima},
  title        = {Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {543},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/543},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OkamotoT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OkamotoT11a,
  author       = {Tatsuaki Okamoto and
                  Katsuyuki Takashima},
  title        = {Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure
                  General Inner-Product Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {648},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/648},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OkamotoT11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OkamotoT11b,
  author       = {Tatsuaki Okamoto and
                  Katsuyuki Takashima},
  title        = {Efficient Attribute-Based Signatures for Non-Monotone Predicates in
                  the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {700},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/700},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OkamotoT11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OkamotoT11c,
  author       = {Tatsuaki Okamoto and
                  Katsuyuki Takashima},
  title        = {Decentralized Attribute-Based Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {701},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/701},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OkamotoT11c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Oliynykov11,
  author       = {Roman Oliynykov},
  title        = {Cryptanalysis of Symmetric Block Ciphers Based on the Feistel Network
                  with Non-bijective S-boxes in the Round Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {685},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/685},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Oliynykov11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OneteV11,
  author       = {Cristina Onete and
                  Daniele Venturi},
  title        = {Security {\&} Indistinguishability in the Presence of Traffic
                  Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {260},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/260},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OneteV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OrumiehchihaPS11,
  author       = {Mohammad Ali Orumiehchiha and
                  Josef Pieprzyk and
                  Ron Steinfeld},
  title        = {Cryptanalysis of {WG-7} {(A} Lightweight Stream Cipher for {RFID}
                  Encryption)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {687},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/687},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OrumiehchihaPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OstrovskyRSV11,
  author       = {Rafail Ostrovsky and
                  Vanishree Rao and
                  Alessandra Scafuro and
                  Ivan Visconti},
  title        = {Revisiting Lower and Upper Bounds for Selective Decommitments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {536},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/536},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OstrovskyRSV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OtmaniT11,
  author       = {Ayoub Otmani and
                  Jean{-}Pierre Tillich},
  title        = {An Efficient Attack on All Concrete {KKS} Proposals},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {356},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/356},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OtmaniT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PanZ11,
  author       = {Yanbin Pan and
                  Feng Zhang},
  title        = {A Note on the Density of the Multiple Subset Sum Problems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {525},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/525},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PanZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PapamanthouST11,
  author       = {Charalampos Papamanthou and
                  Elaine Shi and
                  Roberto Tamassia},
  title        = {Publicly Verifiable Delegation of Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {587},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/587},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PapamanthouST11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PapamanthouT11,
  author       = {Charalampos Papamanthou and
                  Roberto Tamassia},
  title        = {Cryptography for Efficiency: Authenticated Data Structures Based on
                  Lattices and Parallel Online Memory Checking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {102},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/102},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PapamanthouT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ParnoRV11,
  author       = {Bryan Parno and
                  Mariana Raykova and
                  Vinod Vaikuntanathan},
  title        = {How to Delegate and Verify in Public: Verifiable Computation from
                  Attribute-based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {597},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/597},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ParnoRV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Partala11,
  author       = {Juha Partala},
  title        = {Key agreement based on homomorphisms of algebraic structures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {203},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/203},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Partala11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatersonS11,
  author       = {Maura B. Paterson and
                  Douglas R. Stinson},
  title        = {A Unified Approach to Combinatorial Key Predistribution Schemes for
                  Sensor Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {76},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/076},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatersonS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatersonSST11,
  author       = {Kenneth G. Paterson and
                  Jacob C. N. Schuldt and
                  Martijn Stam and
                  Susan Thomson},
  title        = {On the Joint Security of Encryption and Signature, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {486},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/486},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatersonSST11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Patra11,
  author       = {Arpita Patra},
  title        = {Error-free Multi-valued Broadcast and Byzantine Agreement with Optimal
                  Communication Complexity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {313},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/313},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Patra11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Persichetti11,
  author       = {Edoardo Persichetti},
  title        = {Compact McEliece keys based on Quasi-Dyadic Srivastava codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {179},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/179},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Persichetti11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PetitQ11,
  author       = {Christophe Petit and
                  Jean{-}Jacques Quisquater},
  title        = {Rubik's for cryptographers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {638},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/638},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/PetitQ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PetzoldtTBW11,
  author       = {Albrecht Petzoldt and
                  Enrico Thomae and
                  Stanislav Bulygin and
                  Christopher Wolf},
  title        = {Small Public Keys and Fast Verification for Multivariate Quadratic
                  Public Key Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {294},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/294},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PetzoldtTBW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PhanPS11,
  author       = {Duong Hieu Phan and
                  David Pointcheval and
                  Mario Strefler},
  title        = {Adaptively Secure Broadcast Encryption with Forward Secrecy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {463},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/463},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PhanPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Popovyan11,
  author       = {Ilya Popovyan},
  title        = {Efficient Parallelization of Lanczos Type Algorithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {416},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/416},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Popovyan11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ProuffR11,
  author       = {Emmanuel Prouff and
                  Thomas Roche},
  title        = {Higher-Order Glitches Free Implementation of the {AES} using Secure
                  Multi-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {413},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/413},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ProuffR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PuDL11,
  author       = {Shi Pu and
                  Pu Duan and
                  Jyh{-}Charn Liu},
  title        = {Fastplay-A Parallelization Model and Implementation of {SMC} on {CUDA}
                  based {GPU} Cluster Architecture},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {97},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/097},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PuDL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PurohitR11,
  author       = {G. N. Purohit and
                  Asmita Singh Rawat},
  title        = {Fast Scalar Multiplication in {ECC} using The Multi base Number System},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {44},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/044},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PurohitR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Rackoff11,
  author       = {Charles Rackoff},
  title        = {On "identities", "names", "NAMES", "ROLES" and Security: {A} Manifesto},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {214},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/214},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Rackoff11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RanellucciTWW11,
  author       = {Samuel Ranellucci and
                  Alain Tapp and
                  Severin Winkler and
                  J{\"{u}}rg Wullschleger},
  title        = {On the Efficiency of Bit Commitment Reductions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {324},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/324},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RanellucciTWW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RangasamySKBN11,
  author       = {Jothi Rangasamy and
                  Douglas Stebila and
                  Lakshmi Kuppusamy and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Efficient Modular Exponentiation-based Puzzles for Denial-of-Service
                  Protection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {665},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/665},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RangasamySKBN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Rhrmair11,
  author       = {Ulrich R{\"{u}}hrmair},
  title        = {Physical Turing Machines and the Formalization of Physical Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {188},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/188},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Rhrmair11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Rhrmair11a,
  author       = {Ulrich R{\"{u}}hrmair},
  title        = {{SIMPL} Systems as a Keyless Cryptographic and Security Primitive},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {189},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/189},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Rhrmair11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RistenpartSS11,
  author       = {Thomas Ristenpart and
                  Hovav Shacham and
                  Thomas Shrimpton},
  title        = {Careful with Composition: Limitations of Indifferentiability and Universal
                  Composability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {339},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/339},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RistenpartSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Rivain11,
  author       = {Matthieu Rivain},
  title        = {Fast and Regular Algorithms for Scalar Multiplication over Elliptic
                  Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {338},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/338},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Rivain11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RockN11,
  author       = {Andrea R{\"{o}}ck and
                  Kaisa Nyberg},
  title        = {Exploiting Linear Hull in Matsui's Algorithm 1 (extended version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {285},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/285},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RockN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RogawskiG11,
  author       = {Marcin Rogawski and
                  Kris Gaj},
  title        = {Groestl Tweaks and their Effect on {FPGA} Results},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {635},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/635},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RogawskiG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Romsy11,
  author       = {Mario Romsy},
  title        = {Adaption of Pollard's kangaroo algorithm to the {FACTOR} problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {483},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/483},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Romsy11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Rose11,
  author       = {Greg Rose},
  title        = {{KISS:} {A} Bit Too Simple},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {7},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/007},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Rose11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RostovtsevBM11,
  author       = {Alexander Rostovtsev and
                  Alexey Bogdanov and
                  Mikhail Mikhaylov},
  title        = {Secure evaluation of polynomial using privacy ring homomorphisms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {24},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/024},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RostovtsevBM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Rosulek11,
  author       = {Mike Rosulek},
  title        = {Universal Composability from Essentially Any Trusted Setup},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {240},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/240},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Rosulek11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RoyDL11,
  author       = {Swapnoneel Roy and
                  Amlan K. Das and
                  Yu Li},
  title        = {Cryptanalysis and Security Enhancement of an Advanced Authentication
                  Scheme using Smart Cards, and a Key Agreement Scheme for Two-Party
                  Communication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {62},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/062},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RoyDL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RoyRMTF11,
  author       = {Sujoy Sinha Roy and
                  Chester Rebeiro and
                  Debdeep Mukhopadhyay and
                  Junko Takahashi and
                  Toshinori Fukunaga},
  title        = {Scalar Multiplication on Koblitz Curves using tau\({}^{\mbox{2}}\)-NAF},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {318},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/318},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RoyRMTF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RuanFC11,
  author       = {Ou Ruan and
                  Cai Fu and
                  Guohua Cui},
  title        = {An Efficient Protocol for the Commit-Prove-Fair-Open functionality},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {577},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/577},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RuanFC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Saarinen11,
  author       = {Markku{-}Juhani O. Saarinen},
  title        = {GCM, {GHASH} and Weak Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {202},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/202},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Saarinen11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Saarinen11a,
  author       = {Markku{-}Juhani O. Saarinen},
  title        = {Cryptographic Analysis of All 4 x 4 - Bit S-Boxes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {218},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/218},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Saarinen11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Saarinen11b,
  author       = {Markku{-}Juhani O. Saarinen},
  title        = {{SGCM:} The Sophie Germain Counter Mode},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {326},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/326},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Saarinen11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SafkhaniBN11,
  author       = {Masoumeh Safkhani and
                  Nasour Bagheri and
                  Majid Naderi},
  title        = {Cryptanalysis of Chen \emph{et al.}'s {RFID} Access Control Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {194},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/194},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SafkhaniBN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SafkhaniBN11a,
  author       = {Masoumeh Safkhani and
                  Nasour Bagheri and
                  Majid Naderi},
  title        = {Cryptanalysis of {AZUMI:} an {EPC} Class-1 Generation-2 Standard Compliant
                  {RFID} Authentication Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {424},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/424},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SafkhaniBN11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SafkhaniBN11b,
  author       = {Masoumeh Safkhani and
                  Nasour Bagheri and
                  Majid Naderi},
  title        = {On the Security of {RFID} Anti Cloning Security Protocol(ACSP)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {563},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/563},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SafkhaniBN11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SafkhaniBN11c,
  author       = {Masoumeh Safkhani and
                  Nasour Bagheri and
                  Majid Naderi},
  title        = {Security Analysis of a {PUF} based {RFID} Authentication Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {704},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/704},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SafkhaniBN11c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SafkhaniBSN11,
  author       = {Masoumeh Safkhani and
                  Nasour Bagheri and
                  Somitra Kumar Sanadhya and
                  Majid Naderi},
  title        = {Cryptanalysis of improved Yeh \emph{et al.}'s authentication Protocol:
                  An {EPC} Class-1 Generation-2 standard compliant protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {426},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/426},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SafkhaniBSN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SafkhaniNBS11,
  author       = {Masoumeh Safkhani and
                  Majid Naderi and
                  Nasour Bagheri and
                  Somitra Kumar Sanadhya},
  title        = {Cryptanalysis of Some Protocols for {RFID} Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {61},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/061},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SafkhaniNBS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SafkhaniPCBN11,
  author       = {Masoumeh Safkhani and
                  Pedro Peris{-}Lopez and
                  Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and
                  Nasour Bagheri and
                  Majid Naderi},
  title        = {Cryptanalysis of Cho \emph{et al.}'s Protocol, {A} Hash-Based Mutual
                  Authentication Protocol for {RFID} Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {331},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/331},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SafkhaniPCBN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Saito11,
  author       = {Teruo Saito},
  title        = {A Single-Key Attack on 6-Round {KASUMI}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {584},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/584},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Saito11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Samid11,
  author       = {Gideon Samid},
  title        = {Integer Arithmetic without Arithmetic Addition},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {127},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/127},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Samid11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Sarkar11,
  author       = {Palash Sarkar},
  title        = {On Authenticated Encryption Using Stream Ciphers Supporting an Initialisation
                  Vector},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {299},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/299},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Sarkar11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Schneider11,
  author       = {Michael Schneider},
  title        = {Sieving for Shortest Vectors in Ideal Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {458},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/458},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Schneider11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SchollS11,
  author       = {Peter Scholl and
                  Nigel P. Smart},
  title        = {Improved Key Generation For Gentry's Fully Homomorphic Encryption
                  Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {471},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/471},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SchollS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SchroderU11,
  author       = {Dominique Schr{\"{o}}der and
                  Dominique Unruh},
  title        = {Round Optimal Blind Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {264},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/264},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SchroderU11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SchroderU11a,
  author       = {Dominique Schr{\"{o}}der and
                  Dominique Unruh},
  title        = {Security of Blind Signatures Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {316},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/316},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SchroderU11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SchwabeYY11,
  author       = {Peter Schwabe and
                  Bo{-}Yin Yang and
                  Shang{-}Yi Yang},
  title        = {{SHA-3} on {ARM11} processors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {670},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/670},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SchwabeYY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Scott11,
  author       = {Michael Scott},
  title        = {On the Efficient Implementation of Pairing-Based Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {334},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/334},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Scott11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviVR11,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  C. Pandu Rangan},
  title        = {Identity Based Deterministic Signature Scheme Without Forking-Lemma},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {217},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/217},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviVR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviVR11a,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  C. Pandu Rangan},
  title        = {Deterministic Identity Based Signature Scheme and its Application
                  for Aggregate Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {695},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/695},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviVR11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelviVVR11,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  Dhinakaran Vinayagamurthy and
                  C. Pandu Rangan},
  title        = {On the Security of {ID} Based Signcryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {664},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/664},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelviVVR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Semaev11,
  author       = {Igor A. Semaev},
  title        = {Local limit theorem for large deviations and statistical box-tests},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {298},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/298},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Semaev11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SemaevH11,
  author       = {Igor A. Semaev and
                  Mehdi M. Hassanzadeh},
  title        = {New Statistical Box-Test and its Power},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {297},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/297},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SemaevH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Sendrier11,
  author       = {Nicolas Sendrier},
  title        = {Decoding One Out of Many},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {367},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/367},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Sendrier11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SenguptaMPS11,
  author       = {Sourav Sen Gupta and
                  Subhamoy Maitra and
                  Goutam Paul and
                  Santanu Sarkar},
  title        = {{RC4:} (Non-)Random Words from (Non-)Random Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {448},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/448},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SenguptaMPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SeoC11,
  author       = {Jae Hong Seo and
                  Jung Hee Cheon},
  title        = {Fully Secure Anonymous Hierarchical Identity-Based Encryption with
                  Constant Size Ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {21},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/021},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SeoC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SheetritW11,
  author       = {Idan Sheetrit and
                  Avishai Wool},
  title        = {Cryptanalysis of KeeLoq code-hopping using a Single {FPGA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {242},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/242},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SheetritW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShelatS11,
  author       = {Abhi Shelat and
                  Chih{-}Hao Shen},
  title        = {Two-Output Secure Computation with Malicious Adversaries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {533},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/533},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShelatS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShiCSL11,
  author       = {Elaine Shi and
                  T.{-}H. Hubert Chan and
                  Emil Stefanov and
                  Mingfei Li},
  title        = {Oblivious {RAM} with O((log N)\({}^{\mbox{3}}\)) Worst-Case Cost},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {407},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/407},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShiCSL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SmartV11,
  author       = {Nigel P. Smart and
                  Frederik Vercauteren},
  title        = {Fully Homomorphic {SIMD} Operations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {133},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/133},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SmartV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Stanek11,
  author       = {Martin Stanek},
  title        = {Extending Baby-step Giant-step algorithm for {FACTOR} problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {59},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/059},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Stanek11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Stanek11a,
  author       = {Martin Stanek},
  title        = {Threshold Encryption into Multiple Ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {107},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/107},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Stanek11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StanicaGS11,
  author       = {Pantelimon Stanica and
                  Sugata Gangopadhyay and
                  Brajesh Kumar Singh},
  title        = {Some Results Concerning Generalized Bent Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {290},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/290},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StanicaGS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StanicaM11,
  author       = {Pantelimon Stanica and
                  Thor Martinsen},
  title        = {Octal Bent Generalized Boolean Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {89},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/089},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StanicaM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StefanovDOJ11,
  author       = {Emil Stefanov and
                  Marten van Dijk and
                  Alina Oprea and
                  Ari Juels},
  title        = {Iris: {A} Scalable Cloud File System with Efficient Integrity Checks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {585},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/585},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StefanovDOJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StefanovSS11,
  author       = {Emil Stefanov and
                  Elaine Shi and
                  Dawn Song},
  title        = {Policy-Enhanced Private Set Intersection: Sharing Information While
                  Enforcing Privacy Policies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {509},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/509},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StefanovSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Stinson11,
  author       = {Douglas R. Stinson},
  title        = {Comments on a sensor network key redistribution technique of Cichon,
                  Golebiewski and Kutylowski},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {259},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/259},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Stinson11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Strenzke11,
  author       = {Falko Strenzke},
  title        = {Fast and Secure Root-Finding for Code-based Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {672},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/672},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Strenzke11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Strenzke11a,
  author       = {Falko Strenzke},
  title        = {Timing Attacks against the Syndrome Inversionin Code-based Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {683},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/683},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Strenzke11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SuF11,
  author       = {Chen Su and
                  Haining Fan},
  title        = {Impact of Intel's New Instruction Sets on Software Implementation
                  of GF(2)[x] Multiplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {589},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/589},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SuF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Sule11,
  author       = {Virendra Sule},
  title        = {Trapdoor oneway functions associated with exponentiation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {131},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/131},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Sule11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SuppakitpaisarnEI11,
  author       = {Vorapong Suppakitpaisarn and
                  Masato Edahiro and
                  Hiroshi Imai},
  title        = {Fast Elliptic Curve Cryptography Using Optimal Double-Base Chains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {30},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/030},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SuppakitpaisarnEI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SwansonS11,
  author       = {Colleen Swanson and
                  Douglas R. Stinson},
  title        = {Unconditionally Secure Signature Schemes Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {104},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/104},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SwansonS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SwansonS11a,
  author       = {Colleen Swanson and
                  Douglas R. Stinson},
  title        = {Extended Combinatorial Constructions for Peer-to-peer User-Private
                  Information Retrieval},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {674},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/674},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SwansonS11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TakehisaNM11,
  author       = {Tatsuya Takehisa and
                  Hiroki Nogawa and
                  Masakatu Morii},
  title        = {{AES} Flow Interception: Key Snooping Method on Virtual Machine -
                  Exception Handling Attack for {AES-NI} -},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {428},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/428},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TakehisaNM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Tall11,
  author       = {Amadou Tall},
  title        = {A generalization of the Lucas addition chains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {378},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/378},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Tall11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TangCT11,
  author       = {Deng Tang and
                  Claude Carlet and
                  Xiaohu Tang},
  title        = {Highly Nonlinear Boolean Functions with Optimal Algebraic Immunity
                  and Good Behavior Against Fast Algebraic Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {366},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/366},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TangCT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TangDL11,
  author       = {Shaohua Tang and
                  Jintai Ding and
                  Yujun Liang},
  title        = {A Simple and Efficient New Group Key Management Approach Based on
                  Linear Geometry},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {225},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/225},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TangDL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TangDY11,
  author       = {Shaohua Tang and
                  Jintai Ding and
                  Zhiming Yang},
  title        = {Secure Group Key Management Approach Based upon N-dimensional Hyper-sphere},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {216},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/216},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TangDY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TangGZ11,
  author       = {Chunming Tang and
                  Shuhong Gao and
                  Chengli Zhang},
  title        = {The Optimal Linear Secret Sharing Scheme for Any Given Access Structure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {147},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/147},
  timestamp    = {Mon, 25 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/TangGZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TangWQGZW11,
  author       = {Ming Tang and
                  Xiaorong Wang and
                  Zhenlong Qiu and
                  Si Gao and
                  Huanguo Zhang and
                  Qianhong Wu},
  title        = {{DPA} Leakage Evaluation and Countermeasure Plug-in},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {77},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/077},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TangWQGZW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TaverneFARHL11,
  author       = {Jonathan Taverne and
                  Armando Faz{-}Hern{\'{a}}ndez and
                  Diego F. Aranha and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and
                  Darrel Hankerson and
                  Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez},
  title        = {Software implementation of binary elliptic curves: impact of the carry-less
                  multiplier on scalar multiplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {170},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/170},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TaverneFARHL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ThomaeW11,
  author       = {Enrico Thomae and
                  Christopher Wolf},
  title        = {Roots of Square: Cryptanalysis of Double-Layer Square and Square+},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {431},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/431},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ThomaeW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Toft11,
  author       = {Tomas Toft},
  title        = {Secure Datastructures based on Multiparty Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {81},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/081},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Toft11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Tokareva11,
  author       = {Natalia N. Tokareva},
  title        = {On the number of bent functions: lower bounds and hypotheses},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {83},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/083},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Tokareva11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Tokareva11a,
  author       = {Natalia N. Tokareva},
  title        = {Generalizations of Bent Functions. {A} Survey},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {111},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/111},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Tokareva11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Tunstall11,
  author       = {Michael Tunstall},
  title        = {Practical Complexity Differential Cryptanalysis and Fault Analysis
                  of {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {453},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/453},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Tunstall11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Turan11,
  author       = {Meltem S{\"{o}}nmez Turan},
  title        = {Evolutionary Construction of de Bruijn Sequences},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {711},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/711},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Turan11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TysowskiH11,
  author       = {Piotr K. Tysowski and
                  M. Anwarul Hasan},
  title        = {Re-Encryption-Based Key Management Towards Secure and Scalable Mobile
                  Applications in Clouds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {668},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/668},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TysowskiH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Vajda11,
  author       = {Istv{\'{a}}n Vajda},
  title        = {Cryptographically Sound Security Proof for On-Demand Source Routing
                  Protocol EndairA},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {103},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/103},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Vajda11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Vajda11a,
  author       = {Istv{\'{a}}n Vajda},
  title        = {Framework for Security Proofs for On-demand Routing Protocols in Multi-Hop
                  Wireless Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {220},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/220},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Vajda11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Vajda11b,
  author       = {Istv{\'{a}}n Vajda},
  title        = {New look at impossibility result on Dolev-Yao models with hashes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {335},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/335},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Vajda11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Vajda11c,
  author       = {Istv{\'{a}}n Vajda},
  title        = {Non-malleable public key encryption in {BRSIM/UC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {470},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/470},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Vajda11c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Vajda11d,
  author       = {Istv{\'{a}}n Vajda},
  title        = {{UC} framework for anonymous communication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {682},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/682},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Vajda11d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/VelichkaJS11,
  author       = {Mark Velichka and
                  Michael J. Jacobson Jr. and
                  Andreas Stein},
  title        = {Computing Discrete Logarithms in the Jacobian of High-Genus Hyperelliptic
                  Curves over Even Characteristic Finite Fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {98},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/098},
  timestamp    = {Wed, 23 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/VelichkaJS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Veyrat-CharvillonGRS11,
  author       = {Nicolas Veyrat{-}Charvillon and
                  Beno{\^{\i}}t G{\'{e}}rard and
                  Mathieu Renauld and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {An optimal Key Enumeration Algorithm and its Application to Side-Channel
                  Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {610},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/610},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Veyrat-CharvillonGRS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Veyrat-CharvillonS11,
  author       = {Nicolas Veyrat{-}Charvillon and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Generic Side-Channel Distinguishers: Improvements and Limitations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {149},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/149},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Veyrat-CharvillonS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/VivekSR11,
  author       = {S. Sree Vivek and
                  S. Sharmila Deva Selvi and
                  C. Pandu Rangan},
  title        = {Compact CCA-Secure Encryption with Ciphertext Verifiability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {361},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/361},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/VivekSR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Wang11,
  author       = {Xiuqun Wang},
  title        = {A Novel Adaptive Proactive Secret Sharing without a Trusted Party},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {241},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/241},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Wang11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangF11,
  author       = {Yongjia Wang and
                  Haining Fan},
  title        = {GF(2\({}^{\mbox{n}}\)) redundant representation using matrix embedding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {556},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/556},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangTQY11,
  author       = {Baocheng Wang and
                  Chunming Tang and
                  Yanfeng Qi and
                  Yixian Yang},
  title        = {A generalization of the class of hyper-bent Boolean functions in binomial
                  forms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {698},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/698},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/WangTQY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangTQYX11,
  author       = {Baocheng Wang and
                  Chunming Tang and
                  Yanfeng Qi and
                  Yixian Yang and
                  Maozhi Xu},
  title        = {A New Class of Hyper-bent Boolean Functions with Multiple Trace Terms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {600},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/600},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/WangTQYX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangWYW11,
  author       = {Xu An Wang and
                  Liqiang Wu and
                  Xiaoyuan Yang and
                  Huaqun Wang},
  title        = {Cryptanalysis and Improvement of an Efficient {CCA} Secure {PKE} Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {224},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/224},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangWYW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangWZ11,
  author       = {Mingqiang Wang and
                  Xiaoyun Wang and
                  Tao Zhan},
  title        = {Attack Cryptosystems Based on {HCDLP}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {253},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/253},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangWZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangWZ11a,
  author       = {Mingqiang Wang and
                  Xiaoyun Wang and
                  Tao Zhan},
  title        = {The Fault Attack {ECDLP} Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {283},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/283},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangWZ11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangXZ11,
  author       = {Guilin Wang and
                  Fubiao Xia and
                  Yunlei Zhao},
  title        = {Designated Confirmer Signatures With Unified Verification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {182},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/182},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangXZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangZ11,
  author       = {Ping Wang and
                  Fangguo Zhang},
  title        = {Computing Elliptic Curve Discrete Logarithms with the Negation Map},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {8},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/008},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangZ11a,
  author       = {Bin Wang and
                  Qing Zhao},
  title        = {A server-aided verification signature scheme without random oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {713},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/713},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangZ11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangZD11,
  author       = {Bin Wang and
                  Qing Zhao and
                  Ke Dai},
  title        = {A non-interactive deniable authentication scheme in the standard model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {693},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/693},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangZD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WeiCR11,
  author       = {Lei Wei and
                  Scott E. Coull and
                  Michael K. Reiter},
  title        = {Bounded Vector Signatures and their Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {117},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/117},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WeiCR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WeiRGWWL11,
  author       = {Lei Wei and
                  Christian Rechberger and
                  Jian Guo and
                  Hongjun Wu and
                  Huaxiong Wang and
                  San Ling},
  title        = {Improved Meet-in-the-Middle Cryptanalysis of {KTANTAN}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {201},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/201},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/WeiRGWWL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WeiZW11,
  author       = {Puwen Wei and
                  Yuliang Zheng and
                  Xiaoyun Wang},
  title        = {Public Key Encryption for the Forgetful},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {197},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/197},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/WeiZW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WengZ11,
  author       = {Jian Weng and
                  Yunlei Zhao},
  title        = {Direct Constructions of Bidirectional Proxy Re-Encryption with Alleviated
                  Trust in Proxy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {208},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/208},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WengZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WhitnallO11,
  author       = {Carolyn Whitnall and
                  Elisabeth Oswald},
  title        = {A Comprehensive Evaluation of Mutual Information Analysis Using a
                  Fair Evaluation Framework},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {322},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/322},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WhitnallO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WhitnallO11a,
  author       = {Carolyn Whitnall and
                  Elisabeth Oswald},
  title        = {A Fair Evaluation Framework for Comparing Side-Channel Distinguishers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {403},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/403},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WhitnallO11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WhitnallOM11,
  author       = {Carolyn Whitnall and
                  Elisabeth Oswald and
                  Luke Mather},
  title        = {An Exploration of the Kolmogorov-Smirnov Test as Competitor to Mutual
                  Information Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {380},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/380},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WhitnallOM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Wikstrom11,
  author       = {Douglas Wikstr{\"{o}}m},
  title        = {A Commitment-Consistent Proof of a Shuffle},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {168},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/168},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Wikstrom11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Williams11,
  author       = {Stephen C. Williams},
  title        = {Analysis of the {SSH} Key Exchange Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {276},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/276},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Williams11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WolfT11,
  author       = {Christopher Wolf and
                  Enrico Thomae},
  title        = {Small Linearization: Memory Friendly Solving of Non-Linear Equations
                  over Finite Fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {669},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/669},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WolfT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Wu011,
  author       = {Wenling Wu and
                  Lei Zhang},
  title        = {LBlock: {A} Lightweight Block Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {345},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/345},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Wu011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuW11,
  author       = {Shengbao Wu and
                  Mingsheng Wang},
  title        = {Security Evaluation against Differential Cryptanalysis for Block Cipher
                  Structures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {551},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/551},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WuW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuZ11,
  author       = {Hongfeng Wu and
                  Changan Zhao},
  title        = {Faster Scalar Multiplication on Ordinary Weierstrass Elliptic Curves
                  over Fields of Characteristic Three},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {468},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/468},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WuZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Xiao11,
  author       = {David Xiao},
  title        = {Is privacy compatible with truthfulness?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {5},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/005},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Xiao11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Xu11,
  author       = {Jia Xu},
  title        = {Auditing the Auditor: Secure Delegation of Auditing Operation over
                  Cloud Storage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {304},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/304},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Xu11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Xu11a,
  author       = {Jia Xu},
  title        = {Practically Efficient Verifiable Delegation of Polynomial and its
                  Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {473},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/473},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Xu11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Xu11b,
  author       = {Jia Xu},
  title        = {Secure Cloud Storage with Encrypted Data using File-Based Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {538},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/538},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Xu11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XuC11,
  author       = {Jia Xu and
                  Ee{-}Chien Chang},
  title        = {Practically Efficient Proof of Retrievability in Cloud Storage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {362},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/362},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XuC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XuC11a,
  author       = {Jia Xu and
                  Ee{-}Chien Chang},
  title        = {Towards Efficient Provable Data Possession},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {574},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/574},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XuC11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XuJ11,
  author       = {Peng Xu and
                  Hai Jin},
  title        = {{SHS:} Secure Hybrid Search by Combining Dynamic and Static Indexes
                  in {PEKS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {190},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/190},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XuJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XuLZ11,
  author       = {Lei Xu and
                  Dongdai Lin and
                  Jing Zou},
  title        = {{ECDLP} on {GPU}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {146},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/146},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XuLZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XuX11,
  author       = {ZiJie Xu and
                  Ke Xu},
  title        = {Ways to restrict the differential path},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {307},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/307},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XuX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XuX11a,
  author       = {ZiJie Xu and
                  Ke Xu},
  title        = {Use Data-depend Function Build Message Expansion Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {656},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/656},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XuX11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangD11,
  author       = {Qiushi Yang and
                  Yvo Desmedt},
  title        = {Efficient 2-Round General Perfectly Secure Message Transmission: {A}
                  Minor Correction to Yang and Desmedt's Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {265},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/265},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangDWTW11,
  author       = {Guomin Yang and
                  Shanshan Duan and
                  Duncan S. Wong and
                  Chik How Tan and
                  Huaxiong Wang},
  title        = {Authenticated Key Exchange under Bad Randomness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {688},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/688},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangDWTW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangTY11,
  author       = {Guangdong Yang and
                  Shaohua Tang and
                  Li Yang},
  title        = {A Novel Group Signature Scheme Based on {MPKC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {100},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/100},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangTY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YaoFCV11,
  author       = {Gavin Xiaoxu Yao and
                  Junfeng Fan and
                  Ray C. C. Cheung and
                  Ingrid Verbauwhede},
  title        = {A High Speed Pairing Coprocessor Using {RNS} and Lazy Reduction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {258},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/258},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YaoFCV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YaoZ11,
  author       = {Andrew C. Yao and
                  Yunlei Zhao},
  title        = {A New Family of Practical Non-Malleable Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {35},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/035},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YaoZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Yu11,
  author       = {Ching{-}Hua Yu},
  title        = {Sign Modules in Secure Arithmetic Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {539},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/539},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Yu11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YuCJW11,
  author       = {Hongbo Yu and
                  Jiazhe Chen and
                  Keting Jia and
                  Xiaoyun Wang},
  title        = {Near-Collision Attack on the Step-Reduced Compression Function of
                  Skein-256},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {148},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/148},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YuCJW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YuWL11,
  author       = {Yuyin Yu and
                  Mingsheng Wang and
                  Yongqiang Li},
  title        = {Constructing differential 4-uniform permutations from know ones},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {47},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/047},
  timestamp    = {Mon, 31 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YuWL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YuY11,
  author       = {Ching{-}Hua Yu and
                  Bo{-}Yin Yang},
  title        = {Randomized Secure Two-Party Computation for Modular Conversion, Zero
                  Test, Comparison, {MOD} and Exponentiation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {560},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/560},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YuY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZengCT11,
  author       = {Bing Zeng and
                  Liang Chen and
                  Xueming Tang},
  title        = {A Perfectly Binding Commitment Scheme Against Quantum Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {223},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/223},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZengCT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZengTXJ11,
  author       = {Bing Zeng and
                  Xueming Tang and
                  Peng Xu and
                  Jiandu Jing},
  title        = {Practical Frameworks For h-Out-Of-n Oblivious Transfer With Security
                  Against Covert and Malicious Adversaries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/001},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZengTXJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Zhang11,
  author       = {Fangguo Zhang},
  title        = {The Computational Square-Root Exponent Problem- Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {263},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/263},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Zhang11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Zhang11a,
  author       = {Can Zhang},
  title        = {Comparing Different Definitions of Secure Session},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {278},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/278},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Zhang11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangTW11,
  author       = {Yun Zhang and
                  Christophe Tartary and
                  Huaxiong Wang},
  title        = {An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder
                  Theorem (Revised Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {392},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/392},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangTW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangW11,
  author       = {Fangguo Zhang and
                  Ping Wang},
  title        = {Speeding Up Elliptic Curve Discrete Logarithm Computations with Point
                  Halving},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {461},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/461},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangXWMY11,
  author       = {Ye Zhang and
                  Chun Jason Xue and
                  Duncan S. Wong and
                  Nikos Mamoulis and
                  Siu{-}Ming Yiu},
  title        = {Acceleration of Composite Order Bilinear Pairing on Graphics Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {196},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/196},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangXWMY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangZC11,
  author       = {Huajun Zhang and
                  Zongyang Zhang and
                  Zhenfu Cao},
  title        = {Position-Verification in Multi-Channel Models},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {714},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/714},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangZC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangZL11,
  author       = {Zijian Zhang and
                  Liehuang Zhu and
                  Lejian Liao},
  title        = {Computationally Sound Symbolic Security Reduction Analysis of Group
                  Key Exchange Protocol using Bilinear Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {460},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/460},
  timestamp    = {Wed, 19 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangZL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoWG11,
  author       = {Xin{-}jie Zhao and
                  Tao Wang and
                  Shize Guo},
  title        = {Fault-propagation Pattern Based {DFA} on {SPN} Structure Block Ciphers
                  using Bitwise Permutation, with Application to {PRESENT} and PRINTcipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {86},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/086},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoWG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoWG11a,
  author       = {Xin{-}jie Zhao and
                  Tao Wang and
                  Shize Guo},
  title        = {Improved Side Channel Cube Attacks on {PRESENT}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {165},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/165},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoWG11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoZ11,
  author       = {Xingwen Zhao and
                  Fangguo Zhang},
  title        = {Traitor Tracing against Public Collaboration (Full Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {84},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/084},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhengX11,
  author       = {Qingji Zheng and
                  Shouhuai Xu},
  title        = {Secure and Efficient Proof of Storage with Deduplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {529},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/529},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhengX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Zhou11,
  author       = {Caixue Zhou},
  title        = {A Multi-Receiver ID-Based Generalized Signcryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {601},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/601},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Zhou11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhouH11,
  author       = {Zhibin Zhou and
                  Dijiang Huang},
  title        = {Efficient and Secure Data Storage Operations for Mobile Cloud Computing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {185},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/185},
  timestamp    = {Thu, 05 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhouH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhuG11,
  author       = {Bo Zhu and
                  Guang Gong},
  title        = {Guess-then-Meet-in-the-Middle Attacks on the {KTANTAN} Family of Block
                  Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {619},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/619},
  timestamp    = {Thu, 15 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhuG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AriffinA11,
  title        = {Linear Diophantine Equation Discrete Log Problem, Matrix Decomposition
                  Problem and the AA-beta-cryptosystem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {145},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/145},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AriffinA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Aumasson11,
  title        = {Exponential attacks on 6-round Luby-Rackoff and on 5-round Lai-Massey},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {15},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/015},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Aumasson11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoiKSYZ11,
  title        = {(Efficient) Universally Composable Two-Party Computation Using a Minimal
                  Number of Stateless Tokens},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {689},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/689},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoiKSYZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoudhuryKP11a,
  title        = {Non-Applicability of Pseudobasis for Designing Perfectly Secure Message
                  Transmission Protocols Against Non-Threshold Adversary},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {54},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/054},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoudhuryKP11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoudhuryKP11b,
  title        = {Does Pseudo-basis Extend to General Adversary?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {82},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/082},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoudhuryKP11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chunsheng11,
  title        = {Fully Homomorphic Encryption over the Binary Polynomials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {110},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/110},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chunsheng11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoiselM11,
  title        = {Untangling {RFID} Privacy Models},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {636},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/636},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoiselM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardHP11,
  title        = {Leakage Resilient Secure Two-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {256},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/256},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardHP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DavidN11,
  title        = {Deniable Encryption from the McEliece Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {144},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/144},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DavidN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DeySG11,
  title        = {R-hash : Hash Function Using Random Quadratic Polynomials Over {GF(2)}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {450},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/450},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DeySG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DingF11,
  title        = {Efficient Password-Based Authenticated Key Exchange from Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {599},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/599},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DingF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DongWWZ11,
  title        = {Advanced Zero-Sum Distinguishers for the Permutations of the {PHOTON}
                  Family},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {603},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/603},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DongWWZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ghadafi11,
  title        = {Dynamic Group Blind Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {363},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/363},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ghadafi11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gu11a,
  title        = {Multiplicative Learning with Errors and Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {119},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/119},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gu11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HabibiA11,
  title        = {Two {RFID} Privacy Models in Front of a Court},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {625},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/625},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HabibiA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HajiabadiK11,
  title        = {Co-induction and Computational Semantics for Public-key Encryption
                  with Key Cycles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {85},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/085},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HajiabadiK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Han11,
  title        = {Breaking a certificateless key agreement protocol withour bilinear
                  pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {249},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/249},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Han11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Han11a,
  title        = {Weakness of a Secured Authentication Protocol for Wireless Sensor
                  Networks Using Elliptic Curves Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {293},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/293},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Han11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/He11b,
  title        = {Weakness in an ECC-based {AKA} Protocol for Wireless Mobile Communications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {336},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/336},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/He11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/He11c,
  title        = {An efficient certificateless authenticated key agreement protocol
                  without bilinear pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {347},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/347},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/He11c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeC11,
  title        = {An efficient certificateless short signature scheme from pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {173},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/173},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeC11a,
  title        = {An ID-based three-party authenticated key exchange protocol using
                  elliptic curve cryptography for mobile-commerce environments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {195},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/195},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeC11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JiangMLL11,
  title        = {Cryptanalysis of a Privacy-Preserving Communication Architecture for
                  {V2G} Networks in Smart Grid},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {491},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/491},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JiangMLL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KardasACL11,
  title        = {An Efficient and Private {RFID} Authentication Protocol Supporting
                  Ownership Transfer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {667},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/667},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KardasACL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KardasKBD11,
  title        = {A Novel {RFID} Distance Bounding Protocol Based on Physically Unclonable
                  Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {75},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/075},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KardasKBD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhovratovichR11,
  title        = {A Splice-and-Cut Cryptanalysis of the {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {274},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/274},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KhovratovichR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KirazKBB11,
  title        = {An Improved Internet Voting Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {341},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/341},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KirazKBB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiLW11,
  title        = {Analysis and Improvement of Thing's Time-Memory Trade-Off Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {393},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/393},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiLW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiWZZ11,
  title        = {Improved Integral Attacks on Reduced Round Camellia},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {163},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/163},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiWZZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinCXFC11,
  title        = {Privacy-Preserving Friend Search over Online Social Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {445},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/445},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinCXFC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinFC11,
  title        = {Private Information Extraction over Online Social Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {446},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/446},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinFC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lipmaa11b,
  title        = {Efficient Multi-Query {CPIR} from Ring-LWE},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {595},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/595},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lipmaa11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuFC11,
  title        = {On the Security of PPPoE Network},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {284},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/284},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuFC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Makwakwa11,
  title        = {The Ligo Block Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {128},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/128},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Makwakwa11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Makwakwa11a,
  title        = {The Block Cipher Vuna},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {154},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/154},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Makwakwa11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Makwakwa11b,
  title        = {The Block Cipher Thuca},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {159},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/159},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Makwakwa11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MohamedDB11,
  title        = {The Complexity Analysis of the MutantXL Family},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {36},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/036},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MohamedDB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PanD11,
  title        = {Cryptanalysis of the AA\({}_{\mbox{beta}}\) Cryptosystem based on
                  Linear Diophantine Equation Discrete Log Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {351},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/351},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PanD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PurohitR11a,
  title        = {Elliptic Curve Point Multiplication Using {MBNR} and Point Halving},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {183},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/183},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PurohitR11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SinghG11,
  title        = {Lower Bound on Covering Radius of Reed-Muller Codes in Set of Balanced
                  Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {571},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/571},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SinghG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TangYCCD11,
  title        = {High-speed Hardware Implementation of Rainbow Signatures on FPGAs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {155},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/155},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TangYCCD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TianHY11,
  title        = {On the security of a certificateless short signature scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {419},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/419},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TianHY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TianHY11a,
  title        = {Security analysis of a fuzzy identity-based encryption scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {523},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/523},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TianHY11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TianYH11,
  title        = {Cryptanalysis and improvement of a certificateless multi-proxy signature
                  scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {379},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/379},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TianYH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TooraniS11,
  title        = {Security Weaknesses of password-only authenticated key establishment
                  protocol without public key cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {527},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/527},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TooraniS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/UmadeviP11,
  title        = {Some aspects of multi-variable secret sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {186},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/186},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/UmadeviP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XiongF11,
  title        = {GF(2\({}^{\mbox{n}}\)) Subquadratic Polynomial Basis Multipliers for
                  Some Irreducible Trinomials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {606},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/606},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XiongF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XuJWZ11,
  title        = {Public-Key Encryption with Cluster-Chain-based Keyword Search},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {699},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/699},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XuJWZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Yang11,
  title        = {Authenticated Key Exchange with Synchronized States},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {50},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/050},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Yang11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Yang11a,
  title        = {Towards Strong Adaptive Corruption Security of Authenticated Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {51},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/051},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Yang11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangCW11,
  title        = {Efficient Predicate Encryption Supporting Construction of Fine-Grained
                  Searchable Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {409},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/409},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangCW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangZZ11,
  title        = {An Improved Certificateless Authenticated Key Agreement Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {653},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/653},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangZZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YiTCC11,
  title        = {A Parallel Hardware Architecture for the Solution of Linear Equation
                  Systems Implemented over GF(2\({}^{\mbox{n}}\))},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {142},
  year         = {2011},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2011/142},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YiTCC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics