Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/iacr/iacr2000.bht:"
@article{DBLP:journals/iacr/AbdallaMN00, author = {Michel Abdalla and Sara K. Miner and Chanathip Namprempre}, title = {Forward Security in Threshold Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {31}, year = {2000}, url = {http://eprint.iacr.org/2000/031}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaMN00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaR00, author = {Michel Abdalla and Leonid Reyzin}, title = {A New Forward-Secure Digital Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {2}, year = {2000}, url = {http://eprint.iacr.org/2000/002}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Aoki00, author = {Kazumaro Aoki}, title = {The Complete Distribution of Linear Probabilities of MARS' s-box}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {33}, year = {2000}, url = {http://eprint.iacr.org/2000/033}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Aoki00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareB00, author = {Mihir Bellare and Alexandra Boldyreva}, title = {The Security of Chaffing and Winnowing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {10}, year = {2000}, url = {http://eprint.iacr.org/2000/010}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareB00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareFGM00, author = {Mihir Bellare and Marc Fischlin and Shafi Goldwasser and Silvio Micali}, title = {Identification Protocols Secure Against Reset Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {15}, year = {2000}, url = {http://eprint.iacr.org/2000/015}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareFGM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareN00, author = {Mihir Bellare and Chanathip Namprempre}, title = {Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {25}, year = {2000}, url = {http://eprint.iacr.org/2000/025}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareN00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellarePR00, author = {Mihir Bellare and David Pointcheval and Phillip Rogaway}, title = {Authenticated Key Exchange Secure Against Dictionary Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {14}, year = {2000}, url = {http://eprint.iacr.org/2000/014}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellarePR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlundoMSW00, author = {Carlo Blundo and Barbara Masucci and Douglas R. Stinson and Ruizhong Wei}, title = {Constructions and Bounds for Unconditionally Secure Commitment Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {43}, year = {2000}, url = {http://eprint.iacr.org/2000/043}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlundoMSW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoykoMP00, author = {Victor Boyko and Philip D. MacKenzie and Sarvar Patel}, title = {Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {44}, year = {2000}, url = {http://eprint.iacr.org/2000/044}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoykoMP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BuldasLL00, author = {Ahto Buldas and Peeter Laud and Helger Lipmaa}, title = {Accountable Certificate Management using Undeniable Attestations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {27}, year = {2000}, url = {http://eprint.iacr.org/2000/027}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BuldasLL00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Cachin00, author = {Christian Cachin}, title = {An Information-Theoretic Model for Steganography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {28}, year = {2000}, url = {http://eprint.iacr.org/2000/028}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Cachin00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CachinKS00, author = {Christian Cachin and Klaus Kursawe and Victor Shoup}, title = {Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement using Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {34}, year = {2000}, url = {http://eprint.iacr.org/2000/034}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CachinKS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Canetti00, author = {Ran Canetti}, title = {Universally Composable Security: {A} New Paradigm for Cryptographic Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {67}, year = {2000}, url = {http://eprint.iacr.org/2000/067}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Canetti00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerDD00, author = {Ronald Cramer and Ivan Damg{\aa}rd and Stefan Dziembowski}, title = {On the Complexity of Verifiable Secret Sharing and Multi-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {38}, year = {2000}, url = {http://eprint.iacr.org/2000/038}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerDD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerDM00, author = {Ronald Cramer and Ivan Damg{\aa}rd and Ueli Maurer}, title = {General Secure Multi-Party Computation from any Linear Secret Sharing Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {37}, year = {2000}, url = {http://eprint.iacr.org/2000/037}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerDM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerDM00a, author = {Ronald Cramer and Ivan Damg{\aa}rd and Philip D. MacKenzie}, title = {Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {45}, year = {2000}, url = {http://eprint.iacr.org/2000/045}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerDM00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerDN00, author = {Ronald Cramer and Ivan Damg{\aa}rd and Jesper Buus Nielsen}, title = {Multiparty Computation from Threshold Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {55}, year = {2000}, url = {http://eprint.iacr.org/2000/055}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerDN00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardJ00, author = {Ivan Damg{\aa}rd and Mads Jurik}, title = {Efficient Protocols based on Probabilistic Encryption using Composite Degree Residue Classes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {8}, year = {2000}, url = {http://eprint.iacr.org/2000/008}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardJ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DesaiM00, author = {Anand Desai and Sara K. Miner}, title = {Concrete Security Characterizations of PRFs and PRPs: Reductions and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {29}, year = {2000}, url = {http://eprint.iacr.org/2000/029}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DesaiM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Filiol00, author = {Eric Filiol}, title = {Decimation Attack of Stream Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {40}, year = {2000}, url = {http://eprint.iacr.org/2000/040}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Filiol00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FujisakiOPS00, author = {Eiichiro Fujisaki and Tatsuaki Okamoto and David Pointcheval and Jacques Stern}, title = {{RSA-OAEP} is Secure under the {RSA} Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {61}, year = {2000}, url = {http://eprint.iacr.org/2000/061}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FujisakiOPS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GennaroT00, author = {Rosario Gennaro and Luca Trevisan}, title = {Lower Bounds on the Efficiency of Generic Cryptographic Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {17}, year = {2000}, url = {http://eprint.iacr.org/2000/017}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GennaroT00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Goldreich00, author = {Oded Goldreich}, title = {On Security Preserving Reductions - Revised Terminology}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1}, year = {2000}, url = {http://eprint.iacr.org/2000/001}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Goldreich00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Goldreich00a, author = {Oded Goldreich}, title = {Candidate One-Way Functions Based on Expander Graphs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {63}, year = {2000}, url = {http://eprint.iacr.org/2000/063}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Goldreich00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldreichL00, author = {Oded Goldreich and Yehuda Lindell}, title = {Session-Key Generation using Human Passwords Only}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {57}, year = {2000}, url = {http://eprint.iacr.org/2000/057}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoldreichL00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldreichR00, author = {Oded Goldreich and Vered Rosen}, title = {On the Security of Modular Exponentiation with Application to the Construction of Pseudorandom Generators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {64}, year = {2000}, url = {http://eprint.iacr.org/2000/064}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoldreichR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeviaK00, author = {Alejandro Hevia and Marcos A. Kiwi}, title = {Electronic Jury Voting Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {35}, year = {2000}, url = {http://eprint.iacr.org/2000/035}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeviaK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JohanssonP00, author = {Thomas Johansson and Enes Pasalic}, title = {A Construction of Resilient Functions with High Nonlinearity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {53}, year = {2000}, url = {http://eprint.iacr.org/2000/053}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JohanssonP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Jutla00, author = {Charanjit S. Jutla}, title = {Encryption Modes with Almost Free Message Integrity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {39}, year = {2000}, url = {http://eprint.iacr.org/2000/039}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Jutla00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KilianP00, author = {Joe Kilian and Erez Petrank}, title = {Concurrent Zero-Knowledge in Poly-logarithmic Rounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {13}, year = {2000}, url = {http://eprint.iacr.org/2000/013}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KilianP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kwan00, author = {Matthew Kwan}, title = {Reducing the Gate Count of Bitslice {DES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {51}, year = {2000}, url = {http://eprint.iacr.org/2000/051}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kwan00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kwon00, author = {Taekyoung Kwon}, title = {Authentication and Key Agreement via Memorable Password}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {26}, year = {2000}, url = {http://eprint.iacr.org/2000/026}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kwon00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Law00, author = {Tak{-}Ming Law}, title = {An Encryption Algorithm and Key-stream Generator for Chinese Text Messages by Character Internal Code Structure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {6}, year = {2000}, url = {http://eprint.iacr.org/2000/006}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Law00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Law00a, author = {Tak{-}Ming Law}, title = {Public Electronic Contract Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {7}, year = {2000}, url = {http://eprint.iacr.org/2000/007}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Law00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Law00b, author = {Tak{-}Ming Law}, title = {A Content Certified E-mail Protocol with a Public Mailbox}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {68}, year = {2000}, url = {http://eprint.iacr.org/2000/068}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Law00b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lucks00, author = {Stefan Lucks}, title = {The Saturation Attack - a Bait for Twofish}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {46}, year = {2000}, url = {http://eprint.iacr.org/2000/046}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lucks00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lysyanskaya00, author = {Anna Lysyanskaya}, title = {Threshold Cryptography Secure Against the Adaptive Adversary, Concurrently}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {19}, year = {2000}, url = {http://eprint.iacr.org/2000/019}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lysyanskaya00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Maitra00, author = {Subhamoy Maitra}, title = {Highly Nonlinear Balanced Boolean Functions with very good Autocorrelation Property}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {47}, year = {2000}, url = {http://eprint.iacr.org/2000/047}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Maitra00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Maitra00a, author = {Subhamoy Maitra}, title = {Correlation Immune Boolean Functions with Very High Nonlinearity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {54}, year = {2000}, url = {http://eprint.iacr.org/2000/054}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Maitra00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MinerS00, author = {Sara K. Miner and Jessica Staddon}, title = {Graph-Based Authentication of Digital Streams}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {58}, year = {2000}, url = {http://eprint.iacr.org/2000/058}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MinerS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Mishra00, author = {Sanjeev Kumar Mishra}, title = {On Symmetrically Private Information Retrieval}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {41}, year = {2000}, url = {http://eprint.iacr.org/2000/041}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Mishra00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MitomoK00, author = {Masashi Mitomo and Kaoru Kurosawa}, title = {How to Encrypt Long Messages without Large Size Symmetric/Asymmetric Encryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {65}, year = {2000}, url = {http://eprint.iacr.org/2000/065}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MitomoK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaorR00, author = {Moni Naor and Omer Reingold}, title = {Constructing Pseudo-Random Permutations with a Prescribed Structure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {42}, year = {2000}, url = {http://eprint.iacr.org/2000/042}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaorR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PasalicJMS00, author = {Enes Pasalic and Thomas Johansson and Subhamoy Maitra and Palash Sarkar}, title = {New Constructions of Resilent and Correlation Immune Boolean Functions achieving Upper Bounds on Nonlinearity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {48}, year = {2000}, url = {http://eprint.iacr.org/2000/048}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PasalicJMS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PetrovicF00, author = {Slobodan Petrovic and Amparo F{\'{u}}ster{-}Sabater}, title = {{CRYPTANALYSIS} {OF} {THE} {A5/2} {ALGORITHM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {52}, year = {2000}, url = {http://eprint.iacr.org/2000/052}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PetrovicF00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PfitzmannS00, author = {Birgit Pfitzmann and Ahmad{-}Reza Sadeghi}, title = {Anonymous Fingerprinting with Direct Non-Repudiation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {32}, year = {2000}, url = {http://eprint.iacr.org/2000/032}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PfitzmannS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PfitzmannW00, author = {Birgit Pfitzmann and Michael Waidner}, title = {A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {66}, year = {2000}, url = {http://eprint.iacr.org/2000/066}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PfitzmannW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Saeednia00, author = {Shahrokh Saeednia}, title = {An Efficient Identification Scheme Based on Permuted Patterns}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {21}, year = {2000}, url = {http://eprint.iacr.org/2000/021}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Saeednia00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SahaiV00, author = {Amit Sahai and Salil P. Vadhan}, title = {A Complete Problem for Statistical Zero Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {56}, year = {2000}, url = {http://eprint.iacr.org/2000/056}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SahaiV00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Samid00, author = {Gideon Samid}, title = {Tailored Key Encryption (TaKE) Tailoring a key for a given pair of plaintext/ciphertext}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {11}, year = {2000}, url = {http://eprint.iacr.org/2000/011}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Samid00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Samid00a, author = {Gideon Samid}, title = {Essential Shannon Security with Keys Smaller Than the Encrypted Message}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {59}, year = {2000}, url = {http://eprint.iacr.org/2000/059}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Samid00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Sarkar00, author = {Palash Sarkar}, title = {Spectral Domain Analysis of Correlation Immune and Resilient Boolean Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {49}, year = {2000}, url = {http://eprint.iacr.org/2000/049}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Sarkar00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SarkarM00, author = {Palash Sarkar and Subhamoy Maitra}, title = {New Directions in Design of Resilient Boolean Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {9}, year = {2000}, url = {http://eprint.iacr.org/2000/009}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SarkarM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SchweinbergerS00, author = {Thomas Schweinberger and Victor Shoup}, title = {{ACE:} The Advanced Cryptographic Engine}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {22}, year = {2000}, url = {http://eprint.iacr.org/2000/022}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SchweinbergerS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Seifert00, author = {Jean{-}Pierre Seifert}, title = {Using fewer Qubits in Shor's Factorization Algorithm via Simultaneous Diophantine Approximation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {36}, year = {2000}, url = {http://eprint.iacr.org/2000/036}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Seifert00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Shoup00, author = {Victor Shoup}, title = {{OAEP} Reconsidered}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {60}, year = {2000}, url = {http://eprint.iacr.org/2000/060}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Shoup00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Shparlinski00, author = {Igor E. Shparlinski}, title = {Security of Polynomial Transformations of the Diffie-Hellman Key}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {23}, year = {2000}, url = {http://eprint.iacr.org/2000/023}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Shparlinski00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StaddonSW00, author = {Jessica Staddon and Douglas R. Stinson and Ruizhong Wei}, title = {Combinatorial Properties of Frameproof and Traceability Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {4}, year = {2000}, url = {http://eprint.iacr.org/2000/004}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StaddonSW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Tarannikov00, author = {Yuriy V. Tarannikov}, title = {On Resilient Boolean Functions with Maximal Possible Nonlinearity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {5}, year = {2000}, url = {http://eprint.iacr.org/2000/005}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Tarannikov00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Tarannikov00a, author = {Yuriy V. Tarannikov}, title = {New constructions of resilient Boolean functions with maximal nonlinearity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {69}, year = {2000}, url = {http://eprint.iacr.org/2000/069}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Tarannikov00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TarannikovK00, author = {Yuriy V. Tarannikov and Denis Kirienko}, title = {Spectral Analysis of High Order Correlation Immune Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {50}, year = {2000}, url = {http://eprint.iacr.org/2000/050}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TarannikovK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/VascoS00, author = {Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and Igor E. Shparlinski}, title = {On the Security of Diffie-Hellman Bits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {20}, year = {2000}, url = {http://eprint.iacr.org/2000/020}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/VascoS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/VascoS00a, author = {Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and Igor E. Shparlinski}, title = {Security of the Most Significant Bits of the Shamir Message Passing Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {24}, year = {2000}, url = {http://eprint.iacr.org/2000/024}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/VascoS00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FeigenbaumFSW00, title = {Secure Multiparty Computation of Approximations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {30}, year = {2000}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2000/030}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FeigenbaumFSW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Fischlin00, title = {Implications of the Nontriviality of Entropy Approximation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {3}, year = {2000}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2000/003}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Fischlin00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NyangS00, title = {Chosen Message Attack Against Goldreich-Goldwasser-Halevi's Signature Scheme from Crypto'97}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {12}, year = {2000}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2000/012}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NyangS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Samid00b, title = {Non-Deforming Digital Watermarks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {62}, year = {2000}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2000/062}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Samid00b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Weger00, title = {Cryptanalysis of {RSA} with small prime difference}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {16}, year = {2000}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2000/016}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Weger00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.