Search dblp for Publications

export results for "toc:db/journals/iacr/iacr2001.bht:"

 download as .bib file

@article{DBLP:journals/iacr/AgasheLV01,
  author       = {Amod Agashe and
                  Kristin E. Lauter and
                  Ramarathnam Venkatesan},
  title        = {Constructing elliptic curves with a given number of points over a
                  finite field},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {96},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/096},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgasheLV01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/An01,
  author       = {Jee Hea An},
  title        = {Authenticated Encryption in the Public-Key Setting: Security Notions
                  and Analyses},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {79},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/079},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/An01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseST01,
  author       = {Giuseppe Ateniese and
                  Dawn Song and
                  Gene Tsudik},
  title        = {Quasi-Efficient Revocation of Group Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {101},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/101},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseST01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Babbage01,
  author       = {Steve Babbage},
  title        = {The {COS} Stream Ciphers are Extremely Weak},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {78},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/078},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Babbage01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Babbage01a,
  author       = {Steve Babbage},
  title        = {Cryptanalysis of the {COS} (2, 128) Stream Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {106},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/106},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Babbage01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarakG01,
  author       = {Boaz Barak and
                  Oded Goldreich},
  title        = {Universal Arguments and their Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {105},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/105},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarakG01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarakGGL01,
  author       = {Boaz Barak and
                  Oded Goldreich and
                  Shafi Goldwasser and
                  Yehuda Lindell},
  title        = {Resettably-Sound Zero-Knowledge and its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {63},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/063},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarakGGL01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarakGIRSVY01,
  author       = {Boaz Barak and
                  Oded Goldreich and
                  Russell Impagliazzo and
                  Steven Rudich and
                  Amit Sahai and
                  Salil P. Vadhan and
                  Ke Yang},
  title        = {On the (Im)possibility of Obfuscating Programs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {69},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/069},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarakGIRSVY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarretoK01,
  author       = {Paulo S. L. M. Barreto and
                  Hae Yong Kim},
  title        = {Fast hashing onto elliptic curves over fields of characteristic 3},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {98},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/098},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarretoK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Baum-Waidner01,
  author       = {Birgit Baum{-}Waidner},
  title        = {Optimistic Asynchronous Multi-Party Contract Signing with Reduced
                  Number of Rounds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {44},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/044},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Baum-Waidner01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeimelI01,
  author       = {Amos Beimel and
                  Yuval Ishai},
  title        = {On the Power of Nonlinear Secret-Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {30},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/030},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeimelI01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareNPS01,
  author       = {Mihir Bellare and
                  Chanathip Namprempre and
                  David Pointcheval and
                  Michael Semanko},
  title        = {The One-More-RSA-Inversion Problems and the Security of Chaum's Blind
                  Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {2},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/002},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareNPS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareS01,
  author       = {Mihir Bellare and
                  Ravi S. Sandhu},
  title        = {The Security of Practical Two-Party {RSA} Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {60},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/060},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareY01,
  author       = {Mihir Bellare and
                  Bennet S. Yee},
  title        = {Forward-Security in Private-Key Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {35},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/035},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bellezza01,
  author       = {Antonio Bellezza},
  title        = {Countermeasures against Side-Channel Attacks for Elliptic Curve Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {103},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/103},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bellezza01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BihamDK01,
  author       = {Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  title        = {The Rectangle Attack - Rectangling the Serpent},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {21},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/021},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BihamDK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlackR01,
  author       = {John Black and
                  Phillip Rogaway},
  title        = {Ciphers with Arbitrary Finite Domains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {12},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/012},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlackR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlackR01a,
  author       = {John Black and
                  Phillip Rogaway},
  title        = {A Block-Cipher Mode of Operation for Parallelizable Message Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {27},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/027},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlackR01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlundoMMP01,
  author       = {Carlo Blundo and
                  Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and
                  Barbara Masucci and
                  Carles Padr{\'{o}}},
  title        = {A Linear Algebraic Approach to Metering Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {87},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/087},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlundoMMP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehF01,
  author       = {Dan Boneh and
                  Matthew K. Franklin},
  title        = {Identity Based Encryption From the Weil Pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {90},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/090},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehF01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CachinKPS01,
  author       = {Christian Cachin and
                  Klaus Kursawe and
                  Frank Petzold and
                  Victor Shoup},
  title        = {Secure and Efficient Asynchronous Broadcast Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {6},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/006},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CachinKPS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischL01,
  author       = {Jan Camenisch and
                  Anna Lysyanskaya},
  title        = {An Efficient System for Non-transferable Anonymous Credentials with
                  Optional Anonymity Revocation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {19},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/019},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischL01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischL01a,
  author       = {Jan Camenisch and
                  Anna Lysyanskaya},
  title        = {Efficient Revocation of Anonymous Group Membership},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {113},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/113},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischL01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiDDIM01,
  author       = {Ran Canetti and
                  Ivan Damg{\aa}rd and
                  Stefan Dziembowski and
                  Yuval Ishai and
                  Tal Malkin},
  title        = {On adaptive vs. non-adaptive security of multiparty protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {17},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/017},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiDDIM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiF01,
  author       = {Ran Canetti and
                  Marc Fischlin},
  title        = {Universally Composable Commitments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {55},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/055},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiF01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiK01,
  author       = {Ran Canetti and
                  Hugo Krawczyk},
  title        = {Analysis of Key-Exchange Protocols and Their Use for Building Secure
                  Channels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {40},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/040},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiKPR01,
  author       = {Ran Canetti and
                  Joe Kilian and
                  Erez Petrank and
                  Alon Rosen},
  title        = {Black-Box Concurrent Zero-Knowledge Requires Omega(log n) Rounds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {51},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/051},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiKPR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChateauneufLS01,
  author       = {M. A. Chateauneuf and
                  Alan C. H. Ling and
                  Douglas R. Stinson},
  title        = {Slope packings and coverings, and generic algorithms for the discrete
                  logarithm problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {94},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/094},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChateauneufLS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Coron01,
  author       = {Jean{-}S{\'{e}}bastien Coron},
  title        = {Optimal security proofs for {PSS} and other signature schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {62},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/062},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Coron01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Courtois01a,
  author       = {Nicolas T. Courtois},
  title        = {On multivariate signature-only public key cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {29},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/029},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Courtois01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Courtois01b,
  author       = {Nicolas T. Courtois},
  title        = {Efficient Zero-knowledge Authentication Based on a Linear Algebra
                  Problem MinRank},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {58},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/058},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Courtois01b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CourtoisFS01,
  author       = {Nicolas T. Courtois and
                  Matthieu Finiasz and
                  Nicolas Sendrier},
  title        = {How to achieve a McEliece-based Digital Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {10},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/010},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CourtoisFS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerS01,
  author       = {Ronald Cramer and
                  Victor Shoup},
  title        = {Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext
                  Secure Public-Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {85},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/085},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerS01a,
  author       = {Ronald Cramer and
                  Victor Shoup},
  title        = {Design and Analysis of Practical Public-Key Encryption Schemes Secure
                  against Adaptive Chosen Ciphertext Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {108},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/108},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerS01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CrescenzoKOS01,
  author       = {Giovanni Di Crescenzo and
                  Jonathan Katz and
                  Rafail Ostrovsky and
                  Adam D. Smith},
  title        = {Efficient and Non-Interactive Non-Malleable Commitment},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {32},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/032},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CrescenzoKOS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgadF01,
  author       = {Ivan Damg{\aa}rd and
                  Gudmund Skovbjerg Frandsen},
  title        = {An Extended Quadratic Frobenius Primality Test with Average Case Error
                  Estimates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {102},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/102},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgadF01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardF01,
  author       = {Ivan Damg{\aa}rd and
                  Eiichiro Fujisaki},
  title        = {An Integer Commitment Scheme based on Groups with Hidden Order},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {64},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/064},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardF01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardN01,
  author       = {Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen},
  title        = {Perfect Hiding and Perfect Binding Universally Composable Commitment
                  Schemes with Constant Expansion Factor},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {91},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/091},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardN01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FedorovaT01,
  author       = {Maria Fedorova and
                  Yuriy V. Tarannikov},
  title        = {On the Constructing of Highly Nonlinear Resilient Boolean Functions
                  by Means of Special Matrices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {83},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/083},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FedorovaT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FeigenbaumIMNSW01,
  author       = {Joan Feigenbaum and
                  Yuval Ishai and
                  Tal Malkin and
                  Kobbi Nissim and
                  Martin Strauss and
                  Rebecca N. Wright},
  title        = {Secure Multiparty Computation of Approximations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {24},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/024},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FeigenbaumIMNSW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FiliolF01,
  author       = {Eric Filiol and
                  Caroline Fontaine},
  title        = {{COS} Ciphers are not "extremely weak"! - The Design Rationale of
                  {COS} Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {80},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/080},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FiliolF01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FouqueS01,
  author       = {Pierre{-}Alain Fouque and
                  Jacques Stern},
  title        = {Fully Distributed Threshold {RSA} under Standard Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {8},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/008},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FouqueS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Galbraith01a,
  author       = {Steven D. Galbraith},
  title        = {Elliptic curve Paillier schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {50},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/050},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Galbraith01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithHS01,
  author       = {Steven D. Galbraith and
                  Florian Hess and
                  Nigel P. Smart},
  title        = {Extending the {GHS} Weil Descent Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {54},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/054},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithHS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GemmellJ01,
  author       = {Peter Gemmell and
                  Anna M. Johnston},
  title        = {Analysis of a Subset Sum Randomizer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {18},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/018},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GemmellJ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GlennGLS01,
  author       = {Ariel Glenn and
                  Ian Goldberg and
                  Fr{\'{e}}d{\'{e}}ric L{\'{e}}gar{\'{e}} and
                  Anton Stiglic},
  title        = {A Description of Protocols for Private Credentials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {82},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/082},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GlennGLS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Goldreich01,
  author       = {Oded Goldreich},
  title        = {Concurrent Zero-Knowledge With Timing, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {104},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/104},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Goldreich01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GraciaMP01,
  author       = {Ignacio Gracia and
                  Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and
                  Carles Padr{\'{o}}},
  title        = {Improving the trade-off between storage and communication in broadcast
                  encryption schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {88},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/088},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GraciaMP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Granboulan01,
  author       = {Louis Granboulan},
  title        = {Flaws in differential cryptanalysis of Skipjack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {38},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/038},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Granboulan01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Granboulan01a,
  author       = {Louis Granboulan},
  title        = {{RSA} hybrid encryption schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {110},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/110},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Granboulan01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Halevi01,
  author       = {Shai Halevi},
  title        = {An observation regarding Jutla's modes of operation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {15},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/015},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Halevi01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HirtM01,
  author       = {Martin Hirt and
                  Ueli Maurer},
  title        = {Robustness for Free in Unconditional Multi-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {23},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/023},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HirtM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ItkisR01,
  author       = {Gene Itkis and
                  Leonid Reyzin},
  title        = {Forward-Secure Signatures with Optimal Signing and Verifying},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {48},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/048},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ItkisR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JacobsonMS01,
  author       = {Michael J. Jacobson Jr. and
                  Alfred Menezes and
                  Andreas Stein},
  title        = {Solving Elliptic Curve Discrete Logarithm Problems Using Weil Descent},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {41},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/041},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JacobsonMS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JaulmesJV01,
  author       = {{\'{E}}liane Jaulmes and
                  Antoine Joux and
                  Fr{\'{e}}d{\'{e}}ric Valette},
  title        = {On the Security of Randomized {CBC-MAC} Beyond the Birthday Paradox
                  Limit - {A} New Construction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {74},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/074},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JaulmesJV01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Johnston01,
  author       = {Anna M. Johnston},
  title        = {Digitally Watermarking {RSA} Moduli},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {13},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/013},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Johnston01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Jonsson01,
  author       = {Jakob Jonsson},
  title        = {Security Proofs for the {RSA-PSS} Signature Scheme and Its Variants},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {53},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/053},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Jonsson01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JouxN01,
  author       = {Antoine Joux and
                  Kim Nguyen},
  title        = {Separating Decision Diffie-Hellman from Diffie-Hellman in cryptographic
                  groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {3},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/003},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JouxN01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Junod01,
  author       = {Pascal Junod},
  title        = {On the Complexity of Matsui's Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {56},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/056},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Junod01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KatzOY01,
  author       = {Jonathan Katz and
                  Rafail Ostrovsky and
                  Moti Yung},
  title        = {Efficient Password-Authenticated Key Exchange Using Human-Memorable
                  Passwords},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {31},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/031},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KatzOY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KatzY01,
  author       = {Jonathan Katz and
                  Moti Yung},
  title        = {Threshold Cryptosystems Based on Factoring},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {93},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/093},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KatzY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KeliherMT01,
  author       = {Liam Keliher and
                  Henk Meijer and
                  Stafford E. Tavares},
  title        = {Dual of New Method for Upper Bounding the Maximum Average Linear Hull
                  Probability for SPNs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {33},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/033},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KeliherMT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kholosha01,
  author       = {Alexander Kholosha},
  title        = {Clock-Controlled Shift Registers for Key-Stream Generation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {61},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/061},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kholosha01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Krause01,
  author       = {Matthias Krause},
  title        = {BDD-based Cryptanalysis of Keystream Generators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {92},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/092},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Krause01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Krawczyk01,
  author       = {Hugo Krawczyk},
  title        = {Simple Forward-Secure Signatures From Any Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {42},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/042},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Krawczyk01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Krawczyk01a,
  author       = {Hugo Krawczyk},
  title        = {The order of encryption and authentication for protecting communications
                  (Or: how secure is SSL?)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {45},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/045},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Krawczyk01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kurosawa01,
  author       = {Kaoru Kurosawa},
  title        = {Multi-Recipient Public-Key Encryption with Shortened Ciphertext},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {71},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/071},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kurosawa01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KurosawaY01,
  author       = {Kaoru Kurosawa and
                  Takuya Yoshida},
  title        = {Linear Code Implies Public-Key Traitor Tracing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {99},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/099},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KurosawaY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KursaweS01,
  author       = {Klaus Kursawe and
                  Victor Shoup},
  title        = {Optimistic Asynchronous Atomic Broadcast},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {22},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/022},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KursaweS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kwon01,
  author       = {Taekyoung Kwon},
  title        = {Robust Software Tokens: Towards Securing a Digital Identity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {39},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/039},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kwon01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lindell01,
  author       = {Yehuda Lindell},
  title        = {Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {107},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/107},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lindell01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lipmaa01,
  author       = {Helger Lipmaa},
  title        = {Statistical Zero-Knowledge Proofs from Diophantine Equations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {86},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/086},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lipmaa01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LipmaaAN01,
  author       = {Helger Lipmaa and
                  N. Asokan and
                  Valtteri Niemi},
  title        = {Secure Vickrey Auctions without Threshold Trust},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {95},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/095},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LipmaaAN01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LipmaaM01,
  author       = {Helger Lipmaa and
                  Shiho Moriai},
  title        = {Efficient Algorithms for Computing Differential Properties of Addition},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/001},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LipmaaM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MacKenzie01,
  author       = {Philip MacKenzie},
  title        = {On the Security of the {SPEKE} Password-Authenticated Key Exchange
                  Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {57},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/057},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MacKenzie01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Machado01,
  author       = {Alexis Warner Machado},
  title        = {Differential Probability of Modular Addition with a Constant Operand},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {52},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/052},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Machado01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MalkinMM01,
  author       = {Tal Malkin and
                  Daniele Micciancio and
                  Sara Miner More},
  title        = {Composition and Efficiency Tradeoffs for Forward-Secure Digital Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {34},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/034},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MalkinMM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Mao01,
  author       = {Wenbo Mao},
  title        = {New Zero-knowledge Undeniable Signatures - Forgery of Signature Equivalent
                  to Factorisation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {11},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/011},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Mao01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Mao01a,
  author       = {Wenbo Mao},
  title        = {Timed-Release Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {14},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/014},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Mao01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaurerMT01,
  author       = {Markus Maurer and
                  Alfred Menezes and
                  Edlyn Teske},
  title        = {Analysis of the {GHS} Weil Descent Attack on the {ECDLP} over Characteristic
                  Two Finite Fields of Composite Degree},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {84},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/084},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaurerMT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Mironov01,
  author       = {Ilya Mironov},
  title        = {A Note on Cryptanalysis of the Preliminary Version of the {NTRU} Signature
                  Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {5},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/005},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Mironov01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Moh01,
  author       = {Tzuong{-}Tsieng Moh},
  title        = {On the method of "XL" and its inefficiency to {TTM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {47},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/047},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Moh01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MohC01,
  author       = {Tzuong{-}Tsieng Moh and
                  Jiun{-}Ming Chen},
  title        = {On the Goubin-Courtois Attack on {TTM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {72},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/072},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/MohC01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Mori01,
  author       = {Masao Mori},
  title        = {A Sufficient Condition for Secure Ping-Pong Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {81},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/081},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Mori01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NakaharaBPVK01,
  author       = {Jorge Nakahara Jr. and
                  Paulo S. L. M. Barreto and
                  Bart Preneel and
                  Joos Vandewalle and
                  Hae Y. Kim},
  title        = {{SQUARE} Attacks on Reduced-Round {PES} and {IDEA} Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {68},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/068},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/NakaharaBPVK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorN01,
  author       = {Moni Naor and
                  Kobbi Nissim},
  title        = {Communication Complexity and Secure Function Evaluation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {76},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/076},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaorN01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorNB01,
  author       = {Dalit Naor and
                  Moni Naor and
                  Jeffrey B. Lotspiech},
  title        = {Revocation and Tracing Schemes for Stateless Receivers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {59},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/059},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaorNB01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorRR01,
  author       = {Moni Naor and
                  Omer Reingold and
                  Alon Rosen},
  title        = {Pseudo-Random Functions and Factoring},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {75},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/075},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaorRR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorT01,
  author       = {Moni Naor and
                  Vanessa Teague},
  title        = {Anti-persistence: History Independent Data Structures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {36},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/036},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaorT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OhkumaSSK01,
  author       = {Kenji Ohkuma and
                  Hideo Shimizu and
                  Fumihiko Sano and
                  Shin{-}ichi Kawamura},
  title        = {Security Assessment of Hierocrypt and Rijndael against the Differential
                  and Linear Cryptanalysis (Extended Abstract)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {70},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/070},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OhkumaSSK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PadroGMM01,
  author       = {Carles Padr{\'{o}} and
                  Ignacio Gracia and
                  Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and
                  Paz Morillo},
  title        = {Linear broadcast encryption schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {89},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/089},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PadroGMM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PaengKHK01,
  author       = {Seong{-}Hun Paeng and
                  Daesung Kwon and
                  Kil{-}Chan Ha and
                  Jae Heon Kim},
  title        = {Improved Public Key Cryptosystem using Finite non Abelian Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {66},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/066},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PaengKHK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Patel01,
  author       = {Sarvar Patel},
  title        = {An Efficient {MAC} for Short Messages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {97},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/097},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Patel01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Pudovkina01,
  author       = {Marina Pudovkina},
  title        = {Cryptanalysis of the Vesta-2M Stream Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {43},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/043},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Pudovkina01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Pudovkina01a,
  author       = {Marina Pudovkina},
  title        = {A known plaintext attack on the {ISAAC} keystream generator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {49},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/049},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Pudovkina01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Pudovkina01b,
  author       = {Marina Pudovkina},
  title        = {Analysis of chosen plaintext attacks on the {WAKE} Stream Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {65},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/065},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Pudovkina01b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RaoR01,
  author       = {Josyula R. Rao and
                  Pankaj Rohatgi},
  title        = {EMpowering Side-Channel Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {37},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/037},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RaoR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RivestS01,
  author       = {Ronald L. Rivest and
                  Robert Silverman},
  title        = {Are 'Strong' Primes Needed for {RSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {7},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/007},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RivestS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RogawayBBK01,
  author       = {Phillip Rogaway and
                  Mihir Bellare and
                  John Black and
                  Ted Krovetz},
  title        = {{OCB} Mode},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {26},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/026},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RogawayBBK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RussellW01,
  author       = {Alexander Russell and
                  Hong Wang},
  title        = {Efficient Encryption for Rich Message Spaces Under General Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {28},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/028},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RussellW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ryabko01,
  author       = {Boris Ryabko},
  title        = {The simple ideal cipher system},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {46},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/046},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ryabko01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Saarinen01,
  author       = {Markku{-}Juhani Olavi Saarinen},
  title        = {A Time-Memory Tradeoff Attack Against {LILI-128}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {77},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/077},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Saarinen01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Saeednia01,
  author       = {Shahrokh Saeednia},
  title        = {A Note on Girault's Self-Certified Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {100},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/100},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Saeednia01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Shoup01,
  author       = {Victor Shoup},
  title        = {A Proposal for an {ISO} Standard for Public Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {112},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/112},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Shoup01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SilverbergSW01,
  author       = {Alice Silverberg and
                  Jessica Staddon and
                  Judy L. Walker},
  title        = {Efficient Traitor Tracing Algorithms using List Decoding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {16},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/016},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SilverbergSW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Smart01,
  author       = {Nigel P. Smart},
  title        = {An Identity Based Authenticated Key Agreement Protocol Based on the
                  Weil Pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {111},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/111},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Smart01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Stinson01,
  author       = {Douglas R. Stinson},
  title        = {Some observations on the theory of cryptographic hash functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {20},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/020},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Stinson01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Tzeng01,
  author       = {Wen{-}Guey Tzeng},
  title        = {Efficient oblivious transfer schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {73},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/073},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Tzeng01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TzengT01,
  author       = {Wen{-}Guey Tzeng and
                  Zhi{-}Jia Tzeng},
  title        = {Robust key-evolving public key encryption schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {9},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/009},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TzengT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YanW01,
  author       = {Jeff Jianxin Yan and
                  Yongdong Wu},
  title        = {An Attack on {A} Traitor Tracing Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {67},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/067},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YanW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Zhao01,
  author       = {Yunlei Zhao},
  title        = {New Notions of Soundness and Simultaneous Resettability in the Public-Key
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {109},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/109},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Zhao01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Courtois01,
  title        = {MinRank problem and Zero-knowledge authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {4},
  year         = {2001},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2001/004},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Courtois01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Galbraith01,
  title        = {Cryptanalysis of some elliptic curve based cryptosystems of Paillier},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {25},
  year         = {2001},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2001/025},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Galbraith01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics