Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/iacr/iacr2001.bht:"
@article{DBLP:journals/iacr/AgasheLV01, author = {Amod Agashe and Kristin E. Lauter and Ramarathnam Venkatesan}, title = {Constructing elliptic curves with a given number of points over a finite field}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {96}, year = {2001}, url = {http://eprint.iacr.org/2001/096}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgasheLV01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/An01, author = {Jee Hea An}, title = {Authenticated Encryption in the Public-Key Setting: Security Notions and Analyses}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {79}, year = {2001}, url = {http://eprint.iacr.org/2001/079}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/An01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseST01, author = {Giuseppe Ateniese and Dawn Song and Gene Tsudik}, title = {Quasi-Efficient Revocation of Group Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {101}, year = {2001}, url = {http://eprint.iacr.org/2001/101}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseST01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Babbage01, author = {Steve Babbage}, title = {The {COS} Stream Ciphers are Extremely Weak}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {78}, year = {2001}, url = {http://eprint.iacr.org/2001/078}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Babbage01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Babbage01a, author = {Steve Babbage}, title = {Cryptanalysis of the {COS} (2, 128) Stream Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {106}, year = {2001}, url = {http://eprint.iacr.org/2001/106}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Babbage01a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarakG01, author = {Boaz Barak and Oded Goldreich}, title = {Universal Arguments and their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {105}, year = {2001}, url = {http://eprint.iacr.org/2001/105}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarakG01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarakGGL01, author = {Boaz Barak and Oded Goldreich and Shafi Goldwasser and Yehuda Lindell}, title = {Resettably-Sound Zero-Knowledge and its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {63}, year = {2001}, url = {http://eprint.iacr.org/2001/063}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarakGGL01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarakGIRSVY01, author = {Boaz Barak and Oded Goldreich and Russell Impagliazzo and Steven Rudich and Amit Sahai and Salil P. Vadhan and Ke Yang}, title = {On the (Im)possibility of Obfuscating Programs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {69}, year = {2001}, url = {http://eprint.iacr.org/2001/069}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarakGIRSVY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarretoK01, author = {Paulo S. L. M. Barreto and Hae Yong Kim}, title = {Fast hashing onto elliptic curves over fields of characteristic 3}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {98}, year = {2001}, url = {http://eprint.iacr.org/2001/098}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarretoK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Baum-Waidner01, author = {Birgit Baum{-}Waidner}, title = {Optimistic Asynchronous Multi-Party Contract Signing with Reduced Number of Rounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {44}, year = {2001}, url = {http://eprint.iacr.org/2001/044}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Baum-Waidner01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeimelI01, author = {Amos Beimel and Yuval Ishai}, title = {On the Power of Nonlinear Secret-Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {30}, year = {2001}, url = {http://eprint.iacr.org/2001/030}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeimelI01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareNPS01, author = {Mihir Bellare and Chanathip Namprempre and David Pointcheval and Michael Semanko}, title = {The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {2}, year = {2001}, url = {http://eprint.iacr.org/2001/002}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareNPS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareS01, author = {Mihir Bellare and Ravi S. Sandhu}, title = {The Security of Practical Two-Party {RSA} Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {60}, year = {2001}, url = {http://eprint.iacr.org/2001/060}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareY01, author = {Mihir Bellare and Bennet S. Yee}, title = {Forward-Security in Private-Key Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {35}, year = {2001}, url = {http://eprint.iacr.org/2001/035}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bellezza01, author = {Antonio Bellezza}, title = {Countermeasures against Side-Channel Attacks for Elliptic Curve Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {103}, year = {2001}, url = {http://eprint.iacr.org/2001/103}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bellezza01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BihamDK01, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, title = {The Rectangle Attack - Rectangling the Serpent}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {21}, year = {2001}, url = {http://eprint.iacr.org/2001/021}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BihamDK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlackR01, author = {John Black and Phillip Rogaway}, title = {Ciphers with Arbitrary Finite Domains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {12}, year = {2001}, url = {http://eprint.iacr.org/2001/012}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlackR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlackR01a, author = {John Black and Phillip Rogaway}, title = {A Block-Cipher Mode of Operation for Parallelizable Message Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {27}, year = {2001}, url = {http://eprint.iacr.org/2001/027}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlackR01a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlundoMMP01, author = {Carlo Blundo and Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and Barbara Masucci and Carles Padr{\'{o}}}, title = {A Linear Algebraic Approach to Metering Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {87}, year = {2001}, url = {http://eprint.iacr.org/2001/087}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlundoMMP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehF01, author = {Dan Boneh and Matthew K. Franklin}, title = {Identity Based Encryption From the Weil Pairing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {90}, year = {2001}, url = {http://eprint.iacr.org/2001/090}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehF01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CachinKPS01, author = {Christian Cachin and Klaus Kursawe and Frank Petzold and Victor Shoup}, title = {Secure and Efficient Asynchronous Broadcast Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {6}, year = {2001}, url = {http://eprint.iacr.org/2001/006}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CachinKPS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CamenischL01, author = {Jan Camenisch and Anna Lysyanskaya}, title = {An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {19}, year = {2001}, url = {http://eprint.iacr.org/2001/019}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CamenischL01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CamenischL01a, author = {Jan Camenisch and Anna Lysyanskaya}, title = {Efficient Revocation of Anonymous Group Membership}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {113}, year = {2001}, url = {http://eprint.iacr.org/2001/113}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CamenischL01a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiDDIM01, author = {Ran Canetti and Ivan Damg{\aa}rd and Stefan Dziembowski and Yuval Ishai and Tal Malkin}, title = {On adaptive vs. non-adaptive security of multiparty protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {17}, year = {2001}, url = {http://eprint.iacr.org/2001/017}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiDDIM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiF01, author = {Ran Canetti and Marc Fischlin}, title = {Universally Composable Commitments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {55}, year = {2001}, url = {http://eprint.iacr.org/2001/055}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiF01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiK01, author = {Ran Canetti and Hugo Krawczyk}, title = {Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {40}, year = {2001}, url = {http://eprint.iacr.org/2001/040}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiKPR01, author = {Ran Canetti and Joe Kilian and Erez Petrank and Alon Rosen}, title = {Black-Box Concurrent Zero-Knowledge Requires Omega(log n) Rounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {51}, year = {2001}, url = {http://eprint.iacr.org/2001/051}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiKPR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChateauneufLS01, author = {M. A. Chateauneuf and Alan C. H. Ling and Douglas R. Stinson}, title = {Slope packings and coverings, and generic algorithms for the discrete logarithm problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {94}, year = {2001}, url = {http://eprint.iacr.org/2001/094}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChateauneufLS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Coron01, author = {Jean{-}S{\'{e}}bastien Coron}, title = {Optimal security proofs for {PSS} and other signature schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {62}, year = {2001}, url = {http://eprint.iacr.org/2001/062}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Coron01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Courtois01a, author = {Nicolas T. Courtois}, title = {On multivariate signature-only public key cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {29}, year = {2001}, url = {http://eprint.iacr.org/2001/029}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Courtois01a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Courtois01b, author = {Nicolas T. Courtois}, title = {Efficient Zero-knowledge Authentication Based on a Linear Algebra Problem MinRank}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {58}, year = {2001}, url = {http://eprint.iacr.org/2001/058}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Courtois01b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CourtoisFS01, author = {Nicolas T. Courtois and Matthieu Finiasz and Nicolas Sendrier}, title = {How to achieve a McEliece-based Digital Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {10}, year = {2001}, url = {http://eprint.iacr.org/2001/010}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CourtoisFS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerS01, author = {Ronald Cramer and Victor Shoup}, title = {Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {85}, year = {2001}, url = {http://eprint.iacr.org/2001/085}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerS01a, author = {Ronald Cramer and Victor Shoup}, title = {Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {108}, year = {2001}, url = {http://eprint.iacr.org/2001/108}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerS01a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CrescenzoKOS01, author = {Giovanni Di Crescenzo and Jonathan Katz and Rafail Ostrovsky and Adam D. Smith}, title = {Efficient and Non-Interactive Non-Malleable Commitment}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {32}, year = {2001}, url = {http://eprint.iacr.org/2001/032}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CrescenzoKOS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgadF01, author = {Ivan Damg{\aa}rd and Gudmund Skovbjerg Frandsen}, title = {An Extended Quadratic Frobenius Primality Test with Average Case Error Estimates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {102}, year = {2001}, url = {http://eprint.iacr.org/2001/102}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgadF01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardF01, author = {Ivan Damg{\aa}rd and Eiichiro Fujisaki}, title = {An Integer Commitment Scheme based on Groups with Hidden Order}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {64}, year = {2001}, url = {http://eprint.iacr.org/2001/064}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardF01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardN01, author = {Ivan Damg{\aa}rd and Jesper Buus Nielsen}, title = {Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {91}, year = {2001}, url = {http://eprint.iacr.org/2001/091}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardN01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FedorovaT01, author = {Maria Fedorova and Yuriy V. Tarannikov}, title = {On the Constructing of Highly Nonlinear Resilient Boolean Functions by Means of Special Matrices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {83}, year = {2001}, url = {http://eprint.iacr.org/2001/083}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FedorovaT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FeigenbaumIMNSW01, author = {Joan Feigenbaum and Yuval Ishai and Tal Malkin and Kobbi Nissim and Martin Strauss and Rebecca N. Wright}, title = {Secure Multiparty Computation of Approximations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {24}, year = {2001}, url = {http://eprint.iacr.org/2001/024}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FeigenbaumIMNSW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FiliolF01, author = {Eric Filiol and Caroline Fontaine}, title = {{COS} Ciphers are not "extremely weak"! - The Design Rationale of {COS} Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {80}, year = {2001}, url = {http://eprint.iacr.org/2001/080}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FiliolF01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FouqueS01, author = {Pierre{-}Alain Fouque and Jacques Stern}, title = {Fully Distributed Threshold {RSA} under Standard Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {8}, year = {2001}, url = {http://eprint.iacr.org/2001/008}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FouqueS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Galbraith01a, author = {Steven D. Galbraith}, title = {Elliptic curve Paillier schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {50}, year = {2001}, url = {http://eprint.iacr.org/2001/050}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Galbraith01a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithHS01, author = {Steven D. Galbraith and Florian Hess and Nigel P. Smart}, title = {Extending the {GHS} Weil Descent Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {54}, year = {2001}, url = {http://eprint.iacr.org/2001/054}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithHS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GemmellJ01, author = {Peter Gemmell and Anna M. Johnston}, title = {Analysis of a Subset Sum Randomizer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {18}, year = {2001}, url = {http://eprint.iacr.org/2001/018}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GemmellJ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GlennGLS01, author = {Ariel Glenn and Ian Goldberg and Fr{\'{e}}d{\'{e}}ric L{\'{e}}gar{\'{e}} and Anton Stiglic}, title = {A Description of Protocols for Private Credentials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {82}, year = {2001}, url = {http://eprint.iacr.org/2001/082}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GlennGLS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Goldreich01, author = {Oded Goldreich}, title = {Concurrent Zero-Knowledge With Timing, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {104}, year = {2001}, url = {http://eprint.iacr.org/2001/104}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Goldreich01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GraciaMP01, author = {Ignacio Gracia and Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and Carles Padr{\'{o}}}, title = {Improving the trade-off between storage and communication in broadcast encryption schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {88}, year = {2001}, url = {http://eprint.iacr.org/2001/088}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GraciaMP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Granboulan01, author = {Louis Granboulan}, title = {Flaws in differential cryptanalysis of Skipjack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {38}, year = {2001}, url = {http://eprint.iacr.org/2001/038}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Granboulan01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Granboulan01a, author = {Louis Granboulan}, title = {{RSA} hybrid encryption schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {110}, year = {2001}, url = {http://eprint.iacr.org/2001/110}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Granboulan01a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Halevi01, author = {Shai Halevi}, title = {An observation regarding Jutla's modes of operation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {15}, year = {2001}, url = {http://eprint.iacr.org/2001/015}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Halevi01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HirtM01, author = {Martin Hirt and Ueli Maurer}, title = {Robustness for Free in Unconditional Multi-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {23}, year = {2001}, url = {http://eprint.iacr.org/2001/023}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HirtM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ItkisR01, author = {Gene Itkis and Leonid Reyzin}, title = {Forward-Secure Signatures with Optimal Signing and Verifying}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {48}, year = {2001}, url = {http://eprint.iacr.org/2001/048}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ItkisR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JacobsonMS01, author = {Michael J. Jacobson Jr. and Alfred Menezes and Andreas Stein}, title = {Solving Elliptic Curve Discrete Logarithm Problems Using Weil Descent}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {41}, year = {2001}, url = {http://eprint.iacr.org/2001/041}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JacobsonMS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JaulmesJV01, author = {{\'{E}}liane Jaulmes and Antoine Joux and Fr{\'{e}}d{\'{e}}ric Valette}, title = {On the Security of Randomized {CBC-MAC} Beyond the Birthday Paradox Limit - {A} New Construction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {74}, year = {2001}, url = {http://eprint.iacr.org/2001/074}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JaulmesJV01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Johnston01, author = {Anna M. Johnston}, title = {Digitally Watermarking {RSA} Moduli}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {13}, year = {2001}, url = {http://eprint.iacr.org/2001/013}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Johnston01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Jonsson01, author = {Jakob Jonsson}, title = {Security Proofs for the {RSA-PSS} Signature Scheme and Its Variants}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {53}, year = {2001}, url = {http://eprint.iacr.org/2001/053}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Jonsson01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JouxN01, author = {Antoine Joux and Kim Nguyen}, title = {Separating Decision Diffie-Hellman from Diffie-Hellman in cryptographic groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {3}, year = {2001}, url = {http://eprint.iacr.org/2001/003}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JouxN01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Junod01, author = {Pascal Junod}, title = {On the Complexity of Matsui's Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {56}, year = {2001}, url = {http://eprint.iacr.org/2001/056}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Junod01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KatzOY01, author = {Jonathan Katz and Rafail Ostrovsky and Moti Yung}, title = {Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {31}, year = {2001}, url = {http://eprint.iacr.org/2001/031}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KatzOY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KatzY01, author = {Jonathan Katz and Moti Yung}, title = {Threshold Cryptosystems Based on Factoring}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {93}, year = {2001}, url = {http://eprint.iacr.org/2001/093}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KatzY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KeliherMT01, author = {Liam Keliher and Henk Meijer and Stafford E. Tavares}, title = {Dual of New Method for Upper Bounding the Maximum Average Linear Hull Probability for SPNs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {33}, year = {2001}, url = {http://eprint.iacr.org/2001/033}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KeliherMT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kholosha01, author = {Alexander Kholosha}, title = {Clock-Controlled Shift Registers for Key-Stream Generation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {61}, year = {2001}, url = {http://eprint.iacr.org/2001/061}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kholosha01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Krause01, author = {Matthias Krause}, title = {BDD-based Cryptanalysis of Keystream Generators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {92}, year = {2001}, url = {http://eprint.iacr.org/2001/092}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Krause01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Krawczyk01, author = {Hugo Krawczyk}, title = {Simple Forward-Secure Signatures From Any Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {42}, year = {2001}, url = {http://eprint.iacr.org/2001/042}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Krawczyk01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Krawczyk01a, author = {Hugo Krawczyk}, title = {The order of encryption and authentication for protecting communications (Or: how secure is SSL?)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {45}, year = {2001}, url = {http://eprint.iacr.org/2001/045}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Krawczyk01a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kurosawa01, author = {Kaoru Kurosawa}, title = {Multi-Recipient Public-Key Encryption with Shortened Ciphertext}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {71}, year = {2001}, url = {http://eprint.iacr.org/2001/071}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kurosawa01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KurosawaY01, author = {Kaoru Kurosawa and Takuya Yoshida}, title = {Linear Code Implies Public-Key Traitor Tracing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {99}, year = {2001}, url = {http://eprint.iacr.org/2001/099}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KurosawaY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KursaweS01, author = {Klaus Kursawe and Victor Shoup}, title = {Optimistic Asynchronous Atomic Broadcast}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {22}, year = {2001}, url = {http://eprint.iacr.org/2001/022}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KursaweS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kwon01, author = {Taekyoung Kwon}, title = {Robust Software Tokens: Towards Securing a Digital Identity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {39}, year = {2001}, url = {http://eprint.iacr.org/2001/039}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kwon01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lindell01, author = {Yehuda Lindell}, title = {Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {107}, year = {2001}, url = {http://eprint.iacr.org/2001/107}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lindell01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lipmaa01, author = {Helger Lipmaa}, title = {Statistical Zero-Knowledge Proofs from Diophantine Equations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {86}, year = {2001}, url = {http://eprint.iacr.org/2001/086}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lipmaa01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LipmaaAN01, author = {Helger Lipmaa and N. Asokan and Valtteri Niemi}, title = {Secure Vickrey Auctions without Threshold Trust}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {95}, year = {2001}, url = {http://eprint.iacr.org/2001/095}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LipmaaAN01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LipmaaM01, author = {Helger Lipmaa and Shiho Moriai}, title = {Efficient Algorithms for Computing Differential Properties of Addition}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1}, year = {2001}, url = {http://eprint.iacr.org/2001/001}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LipmaaM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MacKenzie01, author = {Philip MacKenzie}, title = {On the Security of the {SPEKE} Password-Authenticated Key Exchange Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {57}, year = {2001}, url = {http://eprint.iacr.org/2001/057}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MacKenzie01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Machado01, author = {Alexis Warner Machado}, title = {Differential Probability of Modular Addition with a Constant Operand}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {52}, year = {2001}, url = {http://eprint.iacr.org/2001/052}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Machado01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MalkinMM01, author = {Tal Malkin and Daniele Micciancio and Sara Miner More}, title = {Composition and Efficiency Tradeoffs for Forward-Secure Digital Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {34}, year = {2001}, url = {http://eprint.iacr.org/2001/034}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MalkinMM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Mao01, author = {Wenbo Mao}, title = {New Zero-knowledge Undeniable Signatures - Forgery of Signature Equivalent to Factorisation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {11}, year = {2001}, url = {http://eprint.iacr.org/2001/011}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Mao01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Mao01a, author = {Wenbo Mao}, title = {Timed-Release Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {14}, year = {2001}, url = {http://eprint.iacr.org/2001/014}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Mao01a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaurerMT01, author = {Markus Maurer and Alfred Menezes and Edlyn Teske}, title = {Analysis of the {GHS} Weil Descent Attack on the {ECDLP} over Characteristic Two Finite Fields of Composite Degree}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {84}, year = {2001}, url = {http://eprint.iacr.org/2001/084}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaurerMT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Mironov01, author = {Ilya Mironov}, title = {A Note on Cryptanalysis of the Preliminary Version of the {NTRU} Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {5}, year = {2001}, url = {http://eprint.iacr.org/2001/005}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Mironov01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Moh01, author = {Tzuong{-}Tsieng Moh}, title = {On the method of "XL" and its inefficiency to {TTM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {47}, year = {2001}, url = {http://eprint.iacr.org/2001/047}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Moh01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MohC01, author = {Tzuong{-}Tsieng Moh and Jiun{-}Ming Chen}, title = {On the Goubin-Courtois Attack on {TTM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {72}, year = {2001}, url = {http://eprint.iacr.org/2001/072}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/MohC01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Mori01, author = {Masao Mori}, title = {A Sufficient Condition for Secure Ping-Pong Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {81}, year = {2001}, url = {http://eprint.iacr.org/2001/081}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Mori01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NakaharaBPVK01, author = {Jorge Nakahara Jr. and Paulo S. L. M. Barreto and Bart Preneel and Joos Vandewalle and Hae Y. Kim}, title = {{SQUARE} Attacks on Reduced-Round {PES} and {IDEA} Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {68}, year = {2001}, url = {http://eprint.iacr.org/2001/068}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/NakaharaBPVK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaorN01, author = {Moni Naor and Kobbi Nissim}, title = {Communication Complexity and Secure Function Evaluation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {76}, year = {2001}, url = {http://eprint.iacr.org/2001/076}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaorN01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaorNB01, author = {Dalit Naor and Moni Naor and Jeffrey B. Lotspiech}, title = {Revocation and Tracing Schemes for Stateless Receivers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {59}, year = {2001}, url = {http://eprint.iacr.org/2001/059}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaorNB01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaorRR01, author = {Moni Naor and Omer Reingold and Alon Rosen}, title = {Pseudo-Random Functions and Factoring}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {75}, year = {2001}, url = {http://eprint.iacr.org/2001/075}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaorRR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaorT01, author = {Moni Naor and Vanessa Teague}, title = {Anti-persistence: History Independent Data Structures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {36}, year = {2001}, url = {http://eprint.iacr.org/2001/036}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaorT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OhkumaSSK01, author = {Kenji Ohkuma and Hideo Shimizu and Fumihiko Sano and Shin{-}ichi Kawamura}, title = {Security Assessment of Hierocrypt and Rijndael against the Differential and Linear Cryptanalysis (Extended Abstract)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {70}, year = {2001}, url = {http://eprint.iacr.org/2001/070}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OhkumaSSK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PadroGMM01, author = {Carles Padr{\'{o}} and Ignacio Gracia and Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and Paz Morillo}, title = {Linear broadcast encryption schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {89}, year = {2001}, url = {http://eprint.iacr.org/2001/089}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PadroGMM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PaengKHK01, author = {Seong{-}Hun Paeng and Daesung Kwon and Kil{-}Chan Ha and Jae Heon Kim}, title = {Improved Public Key Cryptosystem using Finite non Abelian Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {66}, year = {2001}, url = {http://eprint.iacr.org/2001/066}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PaengKHK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Patel01, author = {Sarvar Patel}, title = {An Efficient {MAC} for Short Messages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {97}, year = {2001}, url = {http://eprint.iacr.org/2001/097}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Patel01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Pudovkina01, author = {Marina Pudovkina}, title = {Cryptanalysis of the Vesta-2M Stream Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {43}, year = {2001}, url = {http://eprint.iacr.org/2001/043}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Pudovkina01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Pudovkina01a, author = {Marina Pudovkina}, title = {A known plaintext attack on the {ISAAC} keystream generator}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {49}, year = {2001}, url = {http://eprint.iacr.org/2001/049}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Pudovkina01a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Pudovkina01b, author = {Marina Pudovkina}, title = {Analysis of chosen plaintext attacks on the {WAKE} Stream Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {65}, year = {2001}, url = {http://eprint.iacr.org/2001/065}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Pudovkina01b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RaoR01, author = {Josyula R. Rao and Pankaj Rohatgi}, title = {EMpowering Side-Channel Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {37}, year = {2001}, url = {http://eprint.iacr.org/2001/037}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RaoR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RivestS01, author = {Ronald L. Rivest and Robert Silverman}, title = {Are 'Strong' Primes Needed for {RSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {7}, year = {2001}, url = {http://eprint.iacr.org/2001/007}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RivestS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RogawayBBK01, author = {Phillip Rogaway and Mihir Bellare and John Black and Ted Krovetz}, title = {{OCB} Mode}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {26}, year = {2001}, url = {http://eprint.iacr.org/2001/026}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RogawayBBK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RussellW01, author = {Alexander Russell and Hong Wang}, title = {Efficient Encryption for Rich Message Spaces Under General Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {28}, year = {2001}, url = {http://eprint.iacr.org/2001/028}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RussellW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ryabko01, author = {Boris Ryabko}, title = {The simple ideal cipher system}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {46}, year = {2001}, url = {http://eprint.iacr.org/2001/046}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ryabko01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Saarinen01, author = {Markku{-}Juhani Olavi Saarinen}, title = {A Time-Memory Tradeoff Attack Against {LILI-128}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {77}, year = {2001}, url = {http://eprint.iacr.org/2001/077}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Saarinen01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Saeednia01, author = {Shahrokh Saeednia}, title = {A Note on Girault's Self-Certified Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {100}, year = {2001}, url = {http://eprint.iacr.org/2001/100}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Saeednia01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Shoup01, author = {Victor Shoup}, title = {A Proposal for an {ISO} Standard for Public Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {112}, year = {2001}, url = {http://eprint.iacr.org/2001/112}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Shoup01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SilverbergSW01, author = {Alice Silverberg and Jessica Staddon and Judy L. Walker}, title = {Efficient Traitor Tracing Algorithms using List Decoding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {16}, year = {2001}, url = {http://eprint.iacr.org/2001/016}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SilverbergSW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Smart01, author = {Nigel P. Smart}, title = {An Identity Based Authenticated Key Agreement Protocol Based on the Weil Pairing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {111}, year = {2001}, url = {http://eprint.iacr.org/2001/111}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Smart01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Stinson01, author = {Douglas R. Stinson}, title = {Some observations on the theory of cryptographic hash functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {20}, year = {2001}, url = {http://eprint.iacr.org/2001/020}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Stinson01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Tzeng01, author = {Wen{-}Guey Tzeng}, title = {Efficient oblivious transfer schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {73}, year = {2001}, url = {http://eprint.iacr.org/2001/073}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Tzeng01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TzengT01, author = {Wen{-}Guey Tzeng and Zhi{-}Jia Tzeng}, title = {Robust key-evolving public key encryption schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {9}, year = {2001}, url = {http://eprint.iacr.org/2001/009}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TzengT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YanW01, author = {Jeff Jianxin Yan and Yongdong Wu}, title = {An Attack on {A} Traitor Tracing Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {67}, year = {2001}, url = {http://eprint.iacr.org/2001/067}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YanW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Zhao01, author = {Yunlei Zhao}, title = {New Notions of Soundness and Simultaneous Resettability in the Public-Key Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {109}, year = {2001}, url = {http://eprint.iacr.org/2001/109}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Zhao01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Courtois01, title = {MinRank problem and Zero-knowledge authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {4}, year = {2001}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2001/004}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Courtois01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Galbraith01, title = {Cryptanalysis of some elliptic curve based cryptosystems of Paillier}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {25}, year = {2001}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2001/025}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Galbraith01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.