Search dblp for Publications

export results for "toc:db/journals/iacr/iacr2000.bht:"

 download as .bib file

@article{DBLP:journals/iacr/AbdallaMN00,
  author       = {Michel Abdalla and
                  Sara K. Miner and
                  Chanathip Namprempre},
  title        = {Forward Security in Threshold Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {31},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/031},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaMN00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaR00,
  author       = {Michel Abdalla and
                  Leonid Reyzin},
  title        = {A New Forward-Secure Digital Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {2},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/002},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Aoki00,
  author       = {Kazumaro Aoki},
  title        = {The Complete Distribution of Linear Probabilities of MARS' s-box},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {33},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/033},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Aoki00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareB00,
  author       = {Mihir Bellare and
                  Alexandra Boldyreva},
  title        = {The Security of Chaffing and Winnowing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {10},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/010},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareB00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareFGM00,
  author       = {Mihir Bellare and
                  Marc Fischlin and
                  Shafi Goldwasser and
                  Silvio Micali},
  title        = {Identification Protocols Secure Against Reset Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {15},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/015},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareFGM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareN00,
  author       = {Mihir Bellare and
                  Chanathip Namprempre},
  title        = {Authenticated Encryption: Relations among notions and analysis of
                  the generic composition paradigm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {25},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/025},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareN00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellarePR00,
  author       = {Mihir Bellare and
                  David Pointcheval and
                  Phillip Rogaway},
  title        = {Authenticated Key Exchange Secure Against Dictionary Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {14},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/014},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellarePR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlundoMSW00,
  author       = {Carlo Blundo and
                  Barbara Masucci and
                  Douglas R. Stinson and
                  Ruizhong Wei},
  title        = {Constructions and Bounds for Unconditionally Secure Commitment Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {43},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/043},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlundoMSW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoykoMP00,
  author       = {Victor Boyko and
                  Philip D. MacKenzie and
                  Sarvar Patel},
  title        = {Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {44},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/044},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoykoMP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BuldasLL00,
  author       = {Ahto Buldas and
                  Peeter Laud and
                  Helger Lipmaa},
  title        = {Accountable Certificate Management using Undeniable Attestations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {27},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/027},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BuldasLL00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Cachin00,
  author       = {Christian Cachin},
  title        = {An Information-Theoretic Model for Steganography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {28},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/028},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Cachin00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CachinKS00,
  author       = {Christian Cachin and
                  Klaus Kursawe and
                  Victor Shoup},
  title        = {Random Oracles in Constantinople: Practical Asynchronous Byzantine
                  Agreement using Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {34},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/034},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CachinKS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Canetti00,
  author       = {Ran Canetti},
  title        = {Universally Composable Security: {A} New Paradigm for Cryptographic
                  Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {67},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/067},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Canetti00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerDD00,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Stefan Dziembowski},
  title        = {On the Complexity of Verifiable Secret Sharing and Multi-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {38},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/038},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerDD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerDM00,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Ueli Maurer},
  title        = {General Secure Multi-Party Computation from any Linear Secret Sharing
                  Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {37},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/037},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerDM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerDM00a,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Philip D. MacKenzie},
  title        = {Efficient Zero-Knowledge Proofs of Knowledge Without Intractability
                  Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {45},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/045},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerDM00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerDN00,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen},
  title        = {Multiparty Computation from Threshold Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {55},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/055},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerDN00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardJ00,
  author       = {Ivan Damg{\aa}rd and
                  Mads Jurik},
  title        = {Efficient Protocols based on Probabilistic Encryption using Composite
                  Degree Residue Classes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {8},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/008},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardJ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DesaiM00,
  author       = {Anand Desai and
                  Sara K. Miner},
  title        = {Concrete Security Characterizations of PRFs and PRPs: Reductions and
                  Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {29},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/029},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DesaiM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Filiol00,
  author       = {Eric Filiol},
  title        = {Decimation Attack of Stream Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {40},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/040},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Filiol00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FujisakiOPS00,
  author       = {Eiichiro Fujisaki and
                  Tatsuaki Okamoto and
                  David Pointcheval and
                  Jacques Stern},
  title        = {{RSA-OAEP} is Secure under the {RSA} Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {61},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/061},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FujisakiOPS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GennaroT00,
  author       = {Rosario Gennaro and
                  Luca Trevisan},
  title        = {Lower Bounds on the Efficiency of Generic Cryptographic Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {17},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/017},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GennaroT00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Goldreich00,
  author       = {Oded Goldreich},
  title        = {On Security Preserving Reductions - Revised Terminology},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/001},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Goldreich00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Goldreich00a,
  author       = {Oded Goldreich},
  title        = {Candidate One-Way Functions Based on Expander Graphs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {63},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/063},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Goldreich00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldreichL00,
  author       = {Oded Goldreich and
                  Yehuda Lindell},
  title        = {Session-Key Generation using Human Passwords Only},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {57},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/057},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldreichL00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldreichR00,
  author       = {Oded Goldreich and
                  Vered Rosen},
  title        = {On the Security of Modular Exponentiation with Application to the
                  Construction of Pseudorandom Generators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {64},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/064},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldreichR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeviaK00,
  author       = {Alejandro Hevia and
                  Marcos A. Kiwi},
  title        = {Electronic Jury Voting Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {35},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/035},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeviaK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JohanssonP00,
  author       = {Thomas Johansson and
                  Enes Pasalic},
  title        = {A Construction of Resilient Functions with High Nonlinearity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {53},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/053},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JohanssonP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Jutla00,
  author       = {Charanjit S. Jutla},
  title        = {Encryption Modes with Almost Free Message Integrity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {39},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/039},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Jutla00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KilianP00,
  author       = {Joe Kilian and
                  Erez Petrank},
  title        = {Concurrent Zero-Knowledge in Poly-logarithmic Rounds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {13},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/013},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KilianP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kwan00,
  author       = {Matthew Kwan},
  title        = {Reducing the Gate Count of Bitslice {DES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {51},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/051},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kwan00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kwon00,
  author       = {Taekyoung Kwon},
  title        = {Authentication and Key Agreement via Memorable Password},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {26},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/026},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kwon00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Law00,
  author       = {Tak{-}Ming Law},
  title        = {An Encryption Algorithm and Key-stream Generator for Chinese Text
                  Messages by Character Internal Code Structure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {6},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/006},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Law00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Law00a,
  author       = {Tak{-}Ming Law},
  title        = {Public Electronic Contract Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {7},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/007},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Law00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Law00b,
  author       = {Tak{-}Ming Law},
  title        = {A Content Certified E-mail Protocol with a Public Mailbox},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {68},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/068},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Law00b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lucks00,
  author       = {Stefan Lucks},
  title        = {The Saturation Attack - a Bait for Twofish},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {46},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/046},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lucks00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lysyanskaya00,
  author       = {Anna Lysyanskaya},
  title        = {Threshold Cryptography Secure Against the Adaptive Adversary, Concurrently},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {19},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/019},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lysyanskaya00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Maitra00,
  author       = {Subhamoy Maitra},
  title        = {Highly Nonlinear Balanced Boolean Functions with very good Autocorrelation
                  Property},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {47},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/047},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Maitra00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Maitra00a,
  author       = {Subhamoy Maitra},
  title        = {Correlation Immune Boolean Functions with Very High Nonlinearity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {54},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/054},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Maitra00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MinerS00,
  author       = {Sara K. Miner and
                  Jessica Staddon},
  title        = {Graph-Based Authentication of Digital Streams},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {58},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/058},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MinerS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Mishra00,
  author       = {Sanjeev Kumar Mishra},
  title        = {On Symmetrically Private Information Retrieval},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {41},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/041},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Mishra00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MitomoK00,
  author       = {Masashi Mitomo and
                  Kaoru Kurosawa},
  title        = {How to Encrypt Long Messages without Large Size Symmetric/Asymmetric
                  Encryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {65},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/065},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MitomoK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorR00,
  author       = {Moni Naor and
                  Omer Reingold},
  title        = {Constructing Pseudo-Random Permutations with a Prescribed Structure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {42},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/042},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaorR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PasalicJMS00,
  author       = {Enes Pasalic and
                  Thomas Johansson and
                  Subhamoy Maitra and
                  Palash Sarkar},
  title        = {New Constructions of Resilent and Correlation Immune Boolean Functions
                  achieving Upper Bounds on Nonlinearity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {48},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/048},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PasalicJMS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PetrovicF00,
  author       = {Slobodan Petrovic and
                  Amparo F{\'{u}}ster{-}Sabater},
  title        = {{CRYPTANALYSIS} {OF} {THE} {A5/2} {ALGORITHM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {52},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/052},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PetrovicF00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PfitzmannS00,
  author       = {Birgit Pfitzmann and
                  Ahmad{-}Reza Sadeghi},
  title        = {Anonymous Fingerprinting with Direct Non-Repudiation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {32},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/032},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PfitzmannS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PfitzmannW00,
  author       = {Birgit Pfitzmann and
                  Michael Waidner},
  title        = {A Model for Asynchronous Reactive Systems and its Application to Secure
                  Message Transmission},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {66},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/066},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PfitzmannW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Saeednia00,
  author       = {Shahrokh Saeednia},
  title        = {An Efficient Identification Scheme Based on Permuted Patterns},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {21},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/021},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Saeednia00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SahaiV00,
  author       = {Amit Sahai and
                  Salil P. Vadhan},
  title        = {A Complete Problem for Statistical Zero Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {56},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/056},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SahaiV00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Samid00,
  author       = {Gideon Samid},
  title        = {Tailored Key Encryption (TaKE) Tailoring a key for a given pair of
                  plaintext/ciphertext},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {11},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/011},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Samid00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Samid00a,
  author       = {Gideon Samid},
  title        = {Essential Shannon Security with Keys Smaller Than the Encrypted Message},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {59},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/059},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Samid00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Sarkar00,
  author       = {Palash Sarkar},
  title        = {Spectral Domain Analysis of Correlation Immune and Resilient Boolean
                  Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {49},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/049},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Sarkar00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SarkarM00,
  author       = {Palash Sarkar and
                  Subhamoy Maitra},
  title        = {New Directions in Design of Resilient Boolean Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {9},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/009},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SarkarM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SchweinbergerS00,
  author       = {Thomas Schweinberger and
                  Victor Shoup},
  title        = {{ACE:} The Advanced Cryptographic Engine},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {22},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/022},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SchweinbergerS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Seifert00,
  author       = {Jean{-}Pierre Seifert},
  title        = {Using fewer Qubits in Shor's Factorization Algorithm via Simultaneous
                  Diophantine Approximation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {36},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/036},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Seifert00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Shoup00,
  author       = {Victor Shoup},
  title        = {{OAEP} Reconsidered},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {60},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/060},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Shoup00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Shparlinski00,
  author       = {Igor E. Shparlinski},
  title        = {Security of Polynomial Transformations of the Diffie-Hellman Key},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {23},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/023},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Shparlinski00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StaddonSW00,
  author       = {Jessica Staddon and
                  Douglas R. Stinson and
                  Ruizhong Wei},
  title        = {Combinatorial Properties of Frameproof and Traceability Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {4},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/004},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StaddonSW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Tarannikov00,
  author       = {Yuriy V. Tarannikov},
  title        = {On Resilient Boolean Functions with Maximal Possible Nonlinearity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {5},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/005},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Tarannikov00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Tarannikov00a,
  author       = {Yuriy V. Tarannikov},
  title        = {New constructions of resilient Boolean functions with maximal nonlinearity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {69},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/069},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Tarannikov00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TarannikovK00,
  author       = {Yuriy V. Tarannikov and
                  Denis Kirienko},
  title        = {Spectral Analysis of High Order Correlation Immune Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {50},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/050},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TarannikovK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/VascoS00,
  author       = {Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and
                  Igor E. Shparlinski},
  title        = {On the Security of Diffie-Hellman Bits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {20},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/020},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/VascoS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/VascoS00a,
  author       = {Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and
                  Igor E. Shparlinski},
  title        = {Security of the Most Significant Bits of the Shamir Message Passing
                  Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {24},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/024},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/VascoS00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FeigenbaumFSW00,
  title        = {Secure Multiparty Computation of Approximations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {30},
  year         = {2000},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2000/030},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FeigenbaumFSW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Fischlin00,
  title        = {Implications of the Nontriviality of Entropy Approximation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {3},
  year         = {2000},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2000/003},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Fischlin00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NyangS00,
  title        = {Chosen Message Attack Against Goldreich-Goldwasser-Halevi's Signature
                  Scheme from Crypto'97},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {12},
  year         = {2000},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2000/012},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NyangS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Samid00b,
  title        = {Non-Deforming Digital Watermarks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {62},
  year         = {2000},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2000/062},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Samid00b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Weger00,
  title        = {Cryptanalysis of {RSA} with small prime difference},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {16},
  year         = {2000},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2000/016},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Weger00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics