Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/iacr/iacr2003.bht:"
@article{DBLP:journals/iacr/0002HSI03, author = {Rui Zhang and Goichiro Hanaoka and Junji Shikata and Hideki Imai}, title = {On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {181}, year = {2003}, url = {http://eprint.iacr.org/2003/181}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0002HSI03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AhnH03, author = {Luis von Ahn and Nicholas J. Hopper}, title = {Public Key Steganography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {233}, year = {2003}, url = {http://eprint.iacr.org/2003/233}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AhnH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Al-RiyamiP03, author = {Sattam S. Al{-}Riyami and Kenneth G. Paterson}, title = {Certificateless Public Key Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {126}, year = {2003}, url = {http://eprint.iacr.org/2003/126}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Al-RiyamiP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AmbainisJL03, author = {Andris Ambainis and Markus Jakobsson and Helger Lipmaa}, title = {Cryptographic Randomized Response Techniques}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {27}, year = {2003}, url = {http://eprint.iacr.org/2003/027}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AmbainisJL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseM03, author = {Giuseppe Ateniese and Breno de Medeiros}, title = {Identity-based Chameleon Hash and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {167}, year = {2003}, url = {http://eprint.iacr.org/2003/167}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AugotFL03, author = {Daniel Augot and Matthieu Finiasz and Pierre Loidreau}, title = {Using the Trace Operator to repair the Polynomial Reconstruction based Cryptosystem presented at Eurocrypt 2003}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {209}, year = {2003}, url = {http://eprint.iacr.org/2003/209}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AugotFL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AugotFS03, author = {Daniel Augot and Matthieu Finiasz and Nicolas Sendrier}, title = {A Fast Provably Secure Cryptographic Hash Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {230}, year = {2003}, url = {http://eprint.iacr.org/2003/230}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AugotFS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Avanzi03, author = {Roberto Maria Avanzi}, title = {Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {253}, year = {2003}, url = {http://eprint.iacr.org/2003/253}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Avanzi03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AwasthiL03, author = {Amit K. Awasthi and Sunder Lal}, title = {Proxy Blind Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {72}, year = {2003}, url = {http://eprint.iacr.org/2003/072}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AwasthiL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Backes03, author = {Michael Backes}, title = {Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {114}, year = {2003}, url = {http://eprint.iacr.org/2003/114}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Backes03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesC03, author = {Michael Backes and Christian Cachin}, title = {Public-Key Steganography with Active Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {231}, year = {2003}, url = {http://eprint.iacr.org/2003/231}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesH03, author = {Michael Backes and Dennis Hofheinz}, title = {How to Break and Repair a Universally Composable Signature Functionality}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {240}, year = {2003}, url = {http://eprint.iacr.org/2003/240}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesP03, author = {Michael Backes and Birgit Pfitzmann}, title = {A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {121}, year = {2003}, url = {http://eprint.iacr.org/2003/121}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesPW03, author = {Michael Backes and Birgit Pfitzmann and Michael Waidner}, title = {A Universally Composable Cryptographic Library}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {15}, year = {2003}, url = {http://eprint.iacr.org/2003/015}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesPW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesPW03a, author = {Michael Backes and Birgit Pfitzmann and Michael Waidner}, title = {Symmetric Authentication Within a Simulatable Cryptographic Library}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {145}, year = {2003}, url = {http://eprint.iacr.org/2003/145}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesPW03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaekZ03, author = {Joonsang Baek and Yuliang Zheng}, title = {Identity-Based Threshold Decryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {164}, year = {2003}, url = {http://eprint.iacr.org/2003/164}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BaekZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaiX03, author = {Enjian Bai and Guozhen Xiao}, title = {On the Randomness of the Editing Generator}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {139}, year = {2003}, url = {http://eprint.iacr.org/2003/139}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaiX03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarretoLS03, author = {Paulo S. L. M. Barreto and Ben Lynn and Michael Scott}, title = {On the Selection of Pairing-Friendly Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {86}, year = {2003}, url = {http://eprint.iacr.org/2003/086}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarretoLS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaruaDS03, author = {Rana Barua and Ratna Dutta and Palash Sarkar}, title = {Extending Joux's Protocol to Multi Party Key Agreement}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {62}, year = {2003}, url = {http://eprint.iacr.org/2003/062}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaruaDS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeaverDST03, author = {Cheryl L. Beaver and Timothy Draelos and Richard Schroeppel and Mark Torgerson}, title = {ManTiCore: Encryption with Joint Cipher-State Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {154}, year = {2003}, url = {http://eprint.iacr.org/2003/154}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeaverDST03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareBP03, author = {Mihir Bellare and Alexandra Boldyreva and Adriana Palacio}, title = {An Uninstantiable Random-Oracle-Model Scheme for a Hybrid Encryption Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {77}, year = {2003}, url = {http://eprint.iacr.org/2003/077}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareBP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareK03, author = {Mihir Bellare and Tadayoshi Kohno}, title = {Hash Function Balance and its Impact on Birthday Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {65}, year = {2003}, url = {http://eprint.iacr.org/2003/065}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareRW03, author = {Mihir Bellare and Phillip Rogaway and David A. Wagner}, title = {{EAX:} {A} Conventional Authenticated-Encryption Mode}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {69}, year = {2003}, url = {http://eprint.iacr.org/2003/069}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareRW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BirgetHM03, author = {Jean{-}Camille Birget and Dawei Hong and Nasir D. Memon}, title = {Robust discretization, with an application to graphical passwords}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {168}, year = {2003}, url = {http://eprint.iacr.org/2003/168}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BirgetHM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BiryukovCD03, author = {Alex Biryukov and Christophe De Canni{\`{e}}re and Gustaf Dellkrantz}, title = {Crytanalysis of {SAFER++}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {109}, year = {2003}, url = {http://eprint.iacr.org/2003/109}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BiryukovCD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BiryukovLP03, author = {Alex Biryukov and Joseph Lano and Bart Preneel}, title = {Cryptanalysis of the Alleged SecurID Hash Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {162}, year = {2003}, url = {http://eprint.iacr.org/2003/162}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BiryukovLP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Blackburn03, author = {Simon R. Blackburn}, title = {Perfect Hash Families with Few Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {17}, year = {2003}, url = {http://eprint.iacr.org/2003/017}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Blackburn03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlackburnCG03, author = {Simon R. Blackburn and Carlos Cid and Steven D. Galbraith}, title = {Cryptanalysis of a Cryptosystem based on Drinfeld modules}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {223}, year = {2003}, url = {http://eprint.iacr.org/2003/223}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlackburnCG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlackburnP03, author = {Simon R. Blackburn and Kenneth G. Paterson}, title = {Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {199}, year = {2003}, url = {http://eprint.iacr.org/2003/199}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlackburnP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoldyrevaPW03, author = {Alexandra Boldyreva and Adriana Palacio and Bogdan Warinschi}, title = {Secure Proxy Signature Schemes for Delegation of Signing Rights}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {96}, year = {2003}, url = {http://eprint.iacr.org/2003/096}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoldyrevaPW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehCOP03, author = {Dan Boneh and Giovanni Di Crescenzo and Rafail Ostrovsky and Giuseppe Persiano}, title = {Public Key Encryption with keyword Search}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {195}, year = {2003}, url = {http://eprint.iacr.org/2003/195}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehCOP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BorenB03, author = {Stephen Boren and Andre Brisson}, title = {Software Specifications For Tinnitus Utilizing Whitenoise(Revised Feb 2004)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {249}, year = {2003}, url = {http://eprint.iacr.org/2003/249}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BorenB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Boyen03, author = {Xavier Boyen}, title = {Multipurpose Identity-Based Signcryption : {A} Swiss Army Knife for Identity-Based Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {163}, year = {2003}, url = {http://eprint.iacr.org/2003/163}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Boyen03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrezingW03, author = {Friederike Brezing and Annegret Weng}, title = {Elliptic curves suitable for pairing based cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {143}, year = {2003}, url = {http://eprint.iacr.org/2003/143}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrezingW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrierCO03, author = {Eric Brier and Christophe Clavier and Francis Olivier}, title = {Optimal Statistical Power Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {152}, year = {2003}, url = {http://eprint.iacr.org/2003/152}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrierCO03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrierNP03, author = {Eric Brier and David Naccache and Pascal Paillier}, title = {Chemical Combinatorial Attacks on Keyboards}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {217}, year = {2003}, url = {http://eprint.iacr.org/2003/217}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrierNP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Campagna03, author = {Matthew J. Campagna}, title = {Algorithms in Braid Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {99}, year = {2003}, url = {http://eprint.iacr.org/2003/099}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Campagna03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Canetti03, author = {Ran Canetti}, title = {Universally Composable Signatures, Certification and Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {239}, year = {2003}, url = {http://eprint.iacr.org/2003/239}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Canetti03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiGH03, author = {Ran Canetti and Oded Goldreich and Shai Halevi}, title = {On the random-oracle methodology as applied to length-restricted signature schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {150}, year = {2003}, url = {http://eprint.iacr.org/2003/150}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiGH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiHK03, author = {Ran Canetti and Shai Halevi and Jonathan Katz}, title = {A Forward-Secure Public-Key Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {83}, year = {2003}, url = {http://eprint.iacr.org/2003/083}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiHK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiHK03a, author = {Ran Canetti and Shai Halevi and Jonathan Katz}, title = {Chosen-Ciphertext Security from Identity-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {182}, year = {2003}, url = {http://eprint.iacr.org/2003/182}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiHK03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiKN03, author = {Ran Canetti and Hugo Krawczyk and Jesper Buus Nielsen}, title = {Relaxing Chosen-Ciphertext Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {174}, year = {2003}, url = {http://eprint.iacr.org/2003/174}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiKN03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chen03, author = {Zhongliang Chen}, title = {Security analysis on Nalla-Reddy's ID-based tripartite authenticated key agreement protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {103}, year = {2003}, url = {http://eprint.iacr.org/2003/103}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Chen03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenY03, author = {Jiun{-}Ming Chen and Bo{-}Yin Yang}, title = {A More Secure and Efficacious {TTS} Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {160}, year = {2003}, url = {http://eprint.iacr.org/2003/160}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenZK03, author = {Xiaofeng Chen and Fangguo Zhang and Kwangjo Kim}, title = {A New ID-based Group Signature Scheme from Bilinear Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {116}, year = {2003}, url = {http://eprint.iacr.org/2003/116}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenZK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenZW03, author = {Xiaofeng Chen and Fangguo Zhang and Yumin Wang}, title = {A New Approach to Prevent Blackmailing in E-Cash}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {55}, year = {2003}, url = {http://eprint.iacr.org/2003/055}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenZW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CheonJ03, author = {Jung Hee Cheon and Byungheup Jun}, title = {A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {19}, year = {2003}, url = {http://eprint.iacr.org/2003/019}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CheonJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CheonN03, author = {Jung Hee Cheon and Hyun Soo Nam}, title = {A Cryptanalysis of the Original Domingo-Ferrer's Algebraic Privacy Homomophism}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {221}, year = {2003}, url = {http://eprint.iacr.org/2003/221}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CheonN03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chevallier-MamesCJ03, author = {Beno{\^{\i}}t Chevallier{-}Mames and Mathieu Ciet and Marc Joye}, title = {Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {237}, year = {2003}, url = {http://eprint.iacr.org/2003/237}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Chevallier-MamesCJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoieJ03, author = {YoungJu Choie and Eunkyung Jeong}, title = {Isomorphism Classes of Hyperelliptic Curves of Genus 2 over {\(\mathbb{F}\)}\({}_{\mbox{2\({}^{\mbox{n}}\)}}\)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {213}, year = {2003}, url = {http://eprint.iacr.org/2003/213}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoieJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChowHYC03, author = {Sherman S. M. Chow and Lucas Chi Kwong Hui and Siu{-}Ming Yiu and Kam{-}Pui Chow}, title = {A Secure Modified ID-Based Undeniable Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {262}, year = {2003}, url = {http://eprint.iacr.org/2003/262}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChowHYC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChuLT03, author = {Cheng{-}Kang Chu and Li{-}Shan Liu and Wen{-}Guey Tzeng}, title = {A Threshold {GQ} Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {16}, year = {2003}, url = {http://eprint.iacr.org/2003/016}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChuLT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CietJ03, author = {Mathieu Ciet and Marc Joye}, title = {Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {28}, year = {2003}, url = {http://eprint.iacr.org/2003/028}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CietJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CietJLM03, author = {Mathieu Ciet and Marc Joye and Kristin E. Lauter and Peter L. Montgomery}, title = {Trading Inversions for Multiplications in Elliptic Curve Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {257}, year = {2003}, url = {http://eprint.iacr.org/2003/257}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CietJLM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ContiniY03, author = {Scott Contini and Yiqun Lisa Yin}, title = {Improved Cryptanalysis of SecurID}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {205}, year = {2003}, url = {http://eprint.iacr.org/2003/205}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ContiniY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Coron03, author = {Jean{-}S{\'{e}}bastien Coron}, title = {Cryptanalysis of a public-key encryption scheme based on the polynomial reconstruction problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {36}, year = {2003}, url = {http://eprint.iacr.org/2003/036}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Coron03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Coron03a, author = {Jean{-}S{\'{e}}bastien Coron}, title = {Cryptanalysis of the Repaired Public-key Encryption Scheme Based on the Polynomial Reconstruction Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {219}, year = {2003}, url = {http://eprint.iacr.org/2003/219}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Coron03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Courtois03, author = {Nicolas T. Courtois}, title = {Algebraic Attacks on Combiners with Memory and Several Outputs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {125}, year = {2003}, url = {http://eprint.iacr.org/2003/125}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Courtois03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CourtoisCG03, author = {Nicolas T. Courtois and Guilhem Castagnos and Louis Goubin}, title = {What do {DES} S-boxes Say to Each Other ?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {184}, year = {2003}, url = {http://eprint.iacr.org/2003/184}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CourtoisCG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CourtoisGP03, author = {Nicolas T. Courtois and Louis Goubin and Jacques Patarin}, title = {SFLASHv3, a fast asymmetric signature scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {211}, year = {2003}, url = {http://eprint.iacr.org/2003/211}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CourtoisGP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CourtoisJJPS03, author = {Nicolas T. Courtois and Robert T. Johnson and Pascal Junod and Thomas Pornin and Michael Scott}, title = {Did Filiol Break {AES} ?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {22}, year = {2003}, url = {http://eprint.iacr.org/2003/022}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CourtoisJJPS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerFIK03, author = {Ronald Cramer and Serge Fehr and Yuval Ishai and Eyal Kushilevitz}, title = {Efficient Multi-Party Computation over Rings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {30}, year = {2003}, url = {http://eprint.iacr.org/2003/030}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerFIK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardG03, author = {Ivan Damg{\aa}rd and Jens Groth}, title = {Non-interactive and Reusable Non-malleable Commitment Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {80}, year = {2003}, url = {http://eprint.iacr.org/2003/080}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DasSG03, author = {Manik Lal Das and Ashutosh Saxena and Ved Prakash Gulati}, title = {Security Analysis of Lal and Awasthi's Proxy Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {263}, year = {2003}, url = {http://eprint.iacr.org/2003/263}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DasSG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dichtl03, author = {Markus Dichtl}, title = {How to Predict the Output of a Hardware Random Number Generator}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {51}, year = {2003}, url = {http://eprint.iacr.org/2003/051}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dichtl03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DingH03, author = {Jintai Ding and Timonthy Hodges}, title = {Cryptanalysis of an implementation scheme of the Tamed Transformation Method cryptosystem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {84}, year = {2003}, url = {http://eprint.iacr.org/2003/084}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DingH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DingS03, author = {Jintai Ding and Dieter Schmidt}, title = {A defect of the implementation schemes of the {TTM} cryptosystem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {85}, year = {2003}, url = {http://eprint.iacr.org/2003/085}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DingS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisA03, author = {Yevgeniy Dodis and Jee Hea An}, title = {Concealment and its Applications to Authenticated Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {50}, year = {2003}, url = {http://eprint.iacr.org/2003/050}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisA03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisF03, author = {Yevgeniy Dodis and Nelly Fazio}, title = {Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {95}, year = {2003}, url = {http://eprint.iacr.org/2003/095}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisF03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisORS03, author = {Yevgeniy Dodis and Rafail Ostrovsky and Leonid Reyzin and Adam D. Smith}, title = {Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {235}, year = {2003}, url = {http://eprint.iacr.org/2003/235}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisORS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisR03, author = {Yevgeniy Dodis and Leonid Reyzin}, title = {Breaking and Repairing Optimistic Fair Exchange from {PODC} 2003}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {146}, year = {2003}, url = {http://eprint.iacr.org/2003/146}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DongC03, author = {Zheng Dong and Kefei Chen}, title = {an attack on a multisignature scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {201}, year = {2003}, url = {http://eprint.iacr.org/2003/201}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DongC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DongLC03, author = {Zheng Dong and Shengli Liu and Kefei Chen}, title = {Cryptanalysis of B.Lee-S.Kim-K.Kim Proxy Signature}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {200}, year = {2003}, url = {http://eprint.iacr.org/2003/200}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DongLC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuWGW03, author = {Xinjun Du and Ying Wang and Jianhua Ge and Yumin Wang}, title = {Chameleon Signature from Bilinear Pairing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {238}, year = {2003}, url = {http://eprint.iacr.org/2003/238}, timestamp = {Mon, 25 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DuWGW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuWGW03a, author = {Xinjun Du and Ying Wang and Jianhua Ge and Yumin Wang}, title = {ID-based Authenticated Two Round Multi-Party Key Agreement}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {247}, year = {2003}, url = {http://eprint.iacr.org/2003/247}, timestamp = {Mon, 25 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DuWGW03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuWGW03b, author = {Xinjun Du and Ying Wang and Jianhua Ge and Yumin Wang}, title = {An Improved ID-based Authenticated Group Key Agreement Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {260}, year = {2003}, url = {http://eprint.iacr.org/2003/260}, timestamp = {Mon, 25 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DuWGW03b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DusartLV03, author = {Pierre Dusart and Gilles Letourneux and Olivier Vivolo}, title = {Differential Fault Analysis on {A.E.S}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {10}, year = {2003}, url = {http://eprint.iacr.org/2003/010}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DusartLV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuursmaL03, author = {Iwan M. Duursma and Hyang{-}Sook Lee}, title = {Tate-pairing implementations for tripartite key agreement}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {53}, year = {2003}, url = {http://eprint.iacr.org/2003/053}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuursmaL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EisentragerLM03, author = {Kirsten Eisentr{\"{a}}ger and Kristin E. Lauter and Peter L. Montgomery}, title = {Improved Weil and Tate pairings for elliptic and hyperelliptic curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {242}, year = {2003}, url = {http://eprint.iacr.org/2003/242}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EisentragerLM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ElkindL03, author = {Edith Elkind and Helger Lipmaa}, title = {Interleaving Cryptography and Mechanism Design: The Case of Online Auctions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {21}, year = {2003}, url = {http://eprint.iacr.org/2003/021}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ElkindL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EncinasMD03, author = {Luis Hern{\'{a}}ndez Encinas and Jaime Mu{\~{n}}oz Masqu{\'{e}} and A. Queiruga Dios}, title = {An algorithm to obtain an {RSA} modulus with a large private key}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {45}, year = {2003}, url = {http://eprint.iacr.org/2003/045}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EncinasMD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Fairbrother03, author = {Peter Fairbrother}, title = {Improved Constructions for Universal Re-encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {255}, year = {2003}, url = {http://eprint.iacr.org/2003/255}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Fairbrother03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Filiol03, author = {Eric Filiol}, title = {Plaintext-dependant Repetition Codes Cryptanalysis of Block Ciphers - The {AES} Case}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {3}, year = {2003}, url = {http://eprint.iacr.org/2003/003}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Filiol03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FlonO03, author = {St{\'{e}}phane Flon and Roger Oyono}, title = {Fast arithmetic on Jacobians of Picard curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {79}, year = {2003}, url = {http://eprint.iacr.org/2003/079}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FlonO03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalindoMMV03, author = {David Galindo and Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and Paz Morillo and Jorge L. Villar}, title = {Fujisaki-Okamoto {IND-CCA} hybrid encryption revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {107}, year = {2003}, url = {http://eprint.iacr.org/2003/107}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalindoMMV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GangopadhyayKM03, author = {Sugata Gangopadhyay and Pradipkumar H. Keskar and Subhamoy Maitra}, title = {Patterson-Wiedemann Construction Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {176}, year = {2003}, url = {http://eprint.iacr.org/2003/176}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GangopadhyayKM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarayMY03, author = {Juan A. Garay and Philip D. MacKenzie and Ke Yang}, title = {Strengthening Zero-Knowledge Protocols using Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {37}, year = {2003}, url = {http://eprint.iacr.org/2003/037}, timestamp = {Fri, 05 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GarayMY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarayP03, author = {Juan A. Garay and Carl Pomerance}, title = {Timed Fair Exchange of Standard Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {42}, year = {2003}, url = {http://eprint.iacr.org/2003/042}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarayP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GeiselmannS03, author = {Willi Geiselmann and Rainer Steinwandt}, title = {Yet Another Sieving Device}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {202}, year = {2003}, url = {http://eprint.iacr.org/2003/202}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GeiselmannS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GeiselmannS03a, author = {Willi Geiselmann and Rainer Steinwandt}, title = {A short comment on the affine parts of SFLASH\({}^{\mbox{v3}}\)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {220}, year = {2003}, url = {http://eprint.iacr.org/2003/220}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GeiselmannS03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GeiselmannS03b, author = {Willi Geiselmann and Rainer Steinwandt}, title = {Attacks on a Secure Group Communication Scheme With Hierarchical Access Control}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {227}, year = {2003}, url = {http://eprint.iacr.org/2003/227}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GeiselmannS03b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GeiselmannS03c, author = {Willi Geiselmann and Rainer Steinwandt}, title = {A Key Substitution Attack on SFLASH\({}^{\mbox{v3}}\)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {245}, year = {2003}, url = {http://eprint.iacr.org/2003/245}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GeiselmannS03c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gennaro03, author = {Rosario Gennaro}, title = {Multi-Trapdoor Commitments and their Applications to Non-Malleable Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {214}, year = {2003}, url = {http://eprint.iacr.org/2003/214}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gennaro03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GennaroL03, author = {Rosario Gennaro and Yehuda Lindell}, title = {A Framework for Password-Based Authenticated Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {32}, year = {2003}, url = {http://eprint.iacr.org/2003/032}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GennaroL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gentry03, author = {Craig Gentry}, title = {Certificate-Based Encryption and the Certificate Revocation Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {183}, year = {2003}, url = {http://eprint.iacr.org/2003/183}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gentry03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GertnerH03, author = {Yitchak Gertner and Amir Herzberg}, title = {Committing Encryption and Publicly-Verifiable SignCryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {254}, year = {2003}, url = {http://eprint.iacr.org/2003/254}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GertnerH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Giraud03, author = {Christophe Giraud}, title = {{DFA} on {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {8}, year = {2003}, url = {http://eprint.iacr.org/2003/008}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Giraud03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gjsteen03, author = {Kristian Gj{\o}steen}, title = {Homomorphic public-key systems based on subgroup membership problems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {131}, year = {2003}, url = {http://eprint.iacr.org/2003/131}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gjsteen03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Goh03, author = {Eu{-}Jin Goh}, title = {Secure Indexes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {216}, year = {2003}, url = {http://eprint.iacr.org/2003/216}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Goh03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldwasserT03, author = {Shafi Goldwasser and Yael Tauman}, title = {On the (In)security of the Fiat-Shamir Paradigm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {34}, year = {2003}, url = {http://eprint.iacr.org/2003/034}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoldwasserT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GolicM03, author = {Jovan Dj. Golic and Renato Menicocci}, title = {A new statistical distinguisher for the shrinking generator}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {41}, year = {2003}, url = {http://eprint.iacr.org/2003/041}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GolicM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuptaS03, author = {Kishan Chand Gupta and Palash Sarkar}, title = {Computing Partial Walsh Transform from the Algebraic Normal Form of a Boolean Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {40}, year = {2003}, url = {http://eprint.iacr.org/2003/040}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuptaS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuptaS03a, author = {Kishan Chand Gupta and Palash Sarkar}, title = {A General Correlation Theorem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {124}, year = {2003}, url = {http://eprint.iacr.org/2003/124}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuptaS03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuptaS03b, author = {Kishan Chand Gupta and Palash Sarkar}, title = {Construction of Perfect Nonlinear and Maximally Nonlinear Multi-Output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {198}, year = {2003}, url = {http://eprint.iacr.org/2003/198}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuptaS03b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleviR03, author = {Shai Halevi and Phillip Rogaway}, title = {A Parallelizable Enciphering Mode}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {147}, year = {2003}, url = {http://eprint.iacr.org/2003/147}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleviR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleviR03a, author = {Shai Halevi and Phillip Rogaway}, title = {A Tweakable Enciphering Mode}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {148}, year = {2003}, url = {http://eprint.iacr.org/2003/148}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleviR03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HawkesR03, author = {Philip Hawkes and Gregory G. Rose}, title = {A Mode of Operation with Partial Encryption and Message Integrity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1}, year = {2003}, url = {http://eprint.iacr.org/2003/001}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HawkesR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HawkesR03a, author = {Philip Hawkes and Gregory G. Rose}, title = {Primitive Specification for {SOBER-128}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {81}, year = {2003}, url = {http://eprint.iacr.org/2003/081}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HawkesR03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HerranzS03, author = {Javier Herranz and Germ{\'{a}}n S{\'{a}}ez}, title = {Forking Lemmas in the Ring Signatures' Scenario}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {67}, year = {2003}, url = {http://eprint.iacr.org/2003/067}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HerranzS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HerranzS03a, author = {Javier Herranz and Germ{\'{a}}n S{\'{a}}ez}, title = {Revisiting fully distributed proxy signature schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {197}, year = {2003}, url = {http://eprint.iacr.org/2003/197}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HerranzS03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HerranzS03b, author = {Javier Herranz and Germ{\'{a}}n S{\'{a}}ez}, title = {A provably secure ID-based ring signature scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {261}, year = {2003}, url = {http://eprint.iacr.org/2003/261}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HerranzS03b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HofheinzMS03, author = {Dennis Hofheinz and J{\"{o}}rn M{\"{u}}ller{-}Quade and Rainer Steinwandt}, title = {On Modeling {IND-CCA} Security in Cryptographic Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {24}, year = {2003}, url = {http://eprint.iacr.org/2003/024}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HofheinzMS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HofheinzMS03a, author = {Dennis Hofheinz and J{\"{o}}rn M{\"{u}}ller{-}Quade and Rainer Steinwandt}, title = {Initiator-Resilient Universally Composable Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {63}, year = {2003}, url = {http://eprint.iacr.org/2003/063}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HofheinzMS03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Howgrave-GrahamSSW03, author = {Nick Howgrave{-}Graham and Joseph H. Silverman and Ari Singer and William Whyte}, title = {{NAEP:} Provable Security in the Presence of Decryption Failures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {172}, year = {2003}, url = {http://eprint.iacr.org/2003/172}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Howgrave-GrahamSSW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuWI03, author = {Fei Hu and Chwan{-}Hwa John Wu and J. David Irwin}, title = {A New Forward Secure Signature Scheme using Bilinear Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {188}, year = {2003}, url = {http://eprint.iacr.org/2003/188}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuWI03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HughesT03, author = {Jim Hughes and Allen R. Tannenbaum}, title = {Length-Based Attacks for Certain Group Based Encryption Rewriting Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {102}, year = {2003}, url = {http://eprint.iacr.org/2003/102}, timestamp = {Thu, 19 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HughesT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HypponenNTT03, author = {Konstantin Hypp{\"{o}}nen and David Naccache and Elena Trichina and Alexei Tchoulkine}, title = {Trading-Off Type-Inference Memory Complexity Against Communication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {140}, year = {2003}, url = {http://eprint.iacr.org/2003/140}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HypponenNTT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshidaMO03, author = {Natsuki Ishida and Shin'ichiro Matsuo and Wakaha Ogata}, title = {Divisible Voting Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {74}, year = {2003}, url = {http://eprint.iacr.org/2003/074}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshidaMO03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ItakuraT03, author = {Yukio Itakura and Shigeo Tsujii}, title = {Proposal on Personal Authentication System in which Biological Information is embedded in Cryptosystem Key}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {110}, year = {2003}, url = {http://eprint.iacr.org/2003/110}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ItakuraT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Itkis03, author = {Gene Itkis}, title = {Cryptographic Tamper Evidence}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {31}, year = {2003}, url = {http://eprint.iacr.org/2003/031}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Itkis03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ItkisX03, author = {Gene Itkis and Peng Xie}, title = {Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {234}, year = {2003}, url = {http://eprint.iacr.org/2003/234}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ItkisX03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IwataK03, author = {Tetsu Iwata and Kaoru Kurosawa}, title = {Stronger Security Bounds for OMAC, {TMAC} and {XCBC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {82}, year = {2003}, url = {http://eprint.iacr.org/2003/082}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IwataK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IwataYK03, author = {Tetsu Iwata and Tohru Yagi and Kaoru Kurosawa}, title = {On the Pseudorandomness of {KASUMI} Type Permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {130}, year = {2003}, url = {http://eprint.iacr.org/2003/130}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IwataYK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JakobssonLA03, author = {Markus Jakobsson and John Linn and Joy Algesheimer}, title = {How to Protect Against a Militant Spammer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {71}, year = {2003}, url = {http://eprint.iacr.org/2003/071}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JakobssonLA03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Jeong03, author = {Eunkyung Jeong}, title = {Isomorphism Classes of Hyperelliptic Curves of genus 3 over finite fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {251}, year = {2003}, url = {http://eprint.iacr.org/2003/251}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Jeong03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JiangG03, author = {Shaoquan Jiang and Guang Gong}, title = {Hybrid Broadcast Encryption and Security Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {241}, year = {2003}, url = {http://eprint.iacr.org/2003/241}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JiangG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Junod03, author = {Pascal Junod}, title = {On the Optimality of Linear, Differential and Sequential Distinguishers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {64}, year = {2003}, url = {http://eprint.iacr.org/2003/064}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Junod03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KasaharaS03, author = {Masao Kasahara and Ryuichi Sakai}, title = {A Construction of 100 bit Public-Key Cryptosystem and Digital Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {47}, year = {2003}, url = {http://eprint.iacr.org/2003/047}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KasaharaS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KatagiKAT03, author = {Masanobu Katagi and Izuru Kitamura and Toru Akishita and Tsuyoshi Takagi}, title = {Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems using Degenerate Divisors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {203}, year = {2003}, url = {http://eprint.iacr.org/2003/203}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KatagiKAT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KatzY03, author = {Jonathan Katz and Moti Yung}, title = {Scalable Protocols for Authenticated Group Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {171}, year = {2003}, url = {http://eprint.iacr.org/2003/171}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KatzY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KitamuraK03, author = {Izuru Kitamura and Masanobu Katagi}, title = {Efficient Implementation of Genus Three Hyperelliptic Curve Cryptography over GF(2\({}^{\mbox{n}}\))}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {248}, year = {2003}, url = {http://eprint.iacr.org/2003/248}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KitamuraK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KlimaPR03, author = {Vlastimil Kl{\'{\i}}ma and Ondrej Pokorn{\'{y}} and Tom{\'{a}}s Rosa}, title = {Attacking RSA-based Sessions in {SSL/TLS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {52}, year = {2003}, url = {http://eprint.iacr.org/2003/052}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KlimaPR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KlimaR03, author = {Vlastimil Kl{\'{\i}}ma and Tom{\'{a}}s Rosa}, title = {Side Channel Attacks on {CBC} Encrypted Messages in the PKCS{\#}7 Format}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {98}, year = {2003}, url = {http://eprint.iacr.org/2003/098}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KlimaR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KobaraI03, author = {Kazukuni Kobara and Hideki Imai}, title = {Pretty-Simple Password-Authenticated Key-Exchange Under Standard Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {38}, year = {2003}, url = {http://eprint.iacr.org/2003/038}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KobaraI03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KohnoPB03, author = {Tadayoshi Kohno and Adriana Palacio and John Black}, title = {Building Secure Cryptographic Transforms, or How to Encrypt and {MAC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {177}, year = {2003}, url = {http://eprint.iacr.org/2003/177}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KohnoPB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KohnoVW03, author = {Tadayoshi Kohno and John Viega and Doug Whiting}, title = {{CWC:} {A} high-performance conventional authenticated encryption mode}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {106}, year = {2003}, url = {http://eprint.iacr.org/2003/106}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KohnoVW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KuleszaKP03, author = {Kamil Kulesza and Zbigniew Kotulski and Josef Pieprzyk}, title = {On alternative approach for verifiable secret sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {35}, year = {2003}, url = {http://eprint.iacr.org/2003/035}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KuleszaKP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kurosawa03, author = {Kaoru Kurosawa}, title = {Almost Security of Cryptographic Boolean Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {75}, year = {2003}, url = {http://eprint.iacr.org/2003/075}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kurosawa03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KurosawaT03, author = {Kaoru Kurosawa and Tsuyoshi Takagi}, title = {Some RSA-based Encryption Schemes with Tight Security Reduction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {157}, year = {2003}, url = {http://eprint.iacr.org/2003/157}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KurosawaT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LalA03, author = {Sunder Lal and Amit K. Awasthi}, title = {A Scheme for obtaining a Warrant Message from the Digital Proxy Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {73}, year = {2003}, url = {http://eprint.iacr.org/2003/073}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LalA03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lange03, author = {Tanja Lange}, title = {Trace Zero Subvariety for Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {94}, year = {2003}, url = {http://eprint.iacr.org/2003/094}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lange03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Le03, author = {Tri Van Le}, title = {Novel Cyclic and Algebraic Properties of {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {108}, year = {2003}, url = {http://eprint.iacr.org/2003/108}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Le03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Le03a, author = {Tri Van Le}, title = {Efficient Provably Secure Public Key Steganography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {156}, year = {2003}, url = {http://eprint.iacr.org/2003/156}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Le03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeK03, author = {Tri Van Le and Kaoru Kurosawa}, title = {Efficient Public Key Steganography Secure Against Adaptively Chosen Stegotext Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {244}, year = {2003}, url = {http://eprint.iacr.org/2003/244}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lee03, author = {Jong Won Lee}, title = {Isomorphism Classes of Picard Curves over Finite Fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {60}, year = {2003}, url = {http://eprint.iacr.org/2003/060}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lee03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeKHHM03, author = {Dong Hoon Lee and Jaeheon Kim and Jin Hong and Jae Woo Han and Dukjae Moon}, title = {Algebraic Attacks on Summation Generators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {229}, year = {2003}, url = {http://eprint.iacr.org/2003/229}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeKHHM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeLL03, author = {Ho{-}Kyu Lee and Hyang{-}Sook Lee and Young{-}Ran Lee}, title = {An Authenticated Group Key Agreement Protocol on Braid groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {18}, year = {2003}, url = {http://eprint.iacr.org/2003/018}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeLL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertQ03, author = {Beno{\^{\i}}t Libert and Jean{-}Jacques Quisquater}, title = {New identity based signcryption schemes from pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {23}, year = {2003}, url = {http://eprint.iacr.org/2003/023}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LibertQ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertQ03a, author = {Beno{\^{\i}}t Libert and Jean{-}Jacques Quisquater}, title = {Identity Based Undeniable Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {206}, year = {2003}, url = {http://eprint.iacr.org/2003/206}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LibertQ03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinW03, author = {Chih{-}Yin Lin and Tzong{-}Chen Wu}, title = {An identity-based ring signature scheme from bilinear pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {117}, year = {2003}, url = {http://eprint.iacr.org/2003/117}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinWZ03, author = {Chih{-}Yin Lin and Tzong{-}Chen Wu and Fangguo Zhang}, title = {A Structured Multisignature Scheme from the Gap Diffie-Hellman Group}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {90}, year = {2003}, url = {http://eprint.iacr.org/2003/090}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinWZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lindell03, author = {Yehuda Lindell}, title = {Protocols for Bounded-Concurrent Secure Two-Party Computation in the Plain Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {100}, year = {2003}, url = {http://eprint.iacr.org/2003/100}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lindell03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lindell03a, author = {Yehuda Lindell}, title = {General Composition and Universal Composability in Secure Multiparty Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {141}, year = {2003}, url = {http://eprint.iacr.org/2003/141}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lindell03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lipmaa03, author = {Helger Lipmaa}, title = {On Diophantine Complexity and Statistical Zero-Knowledge Arguments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {105}, year = {2003}, url = {http://eprint.iacr.org/2003/105}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lipmaa03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lohlein03, author = {Bernhard L{\"{o}}hlein}, title = {Attacks based on Conditional Correlations against the Nonlinear Filter Generator}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {20}, year = {2003}, url = {http://eprint.iacr.org/2003/020}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lohlein03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuF03, author = {Xin L{\"{u}} and Dengguo Feng}, title = {Quantum Digital Signature Based on Quantum One-way Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {246}, year = {2003}, url = {http://eprint.iacr.org/2003/246}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuF03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LysyanskayaMRS03, author = {Anna Lysyanskaya and Silvio Micali and Leonid Reyzin and Hovav Shacham}, title = {Sequential Aggregate Signatures from Trapdoor Permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {91}, year = {2003}, url = {http://eprint.iacr.org/2003/091}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LysyanskayaMRS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MacKenzieY03, author = {Philip D. MacKenzie and Ke Yang}, title = {On Simulation-Sound Trapdoor Commitments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {252}, year = {2003}, url = {http://eprint.iacr.org/2003/252}, timestamp = {Fri, 05 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/MacKenzieY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaityM03, author = {Soumen Maity and Subhamoy Maitra}, title = {Minimum Distance between Bent and 1-resilient Boolean Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {133}, year = {2003}, url = {http://eprint.iacr.org/2003/133}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaityM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Marti-FarreP03, author = {Jaume Mart{\'{\i}}{-}Farr{\'{e}} and Carles Padr{\'{o}}}, title = {Secret sharing schemes on sparse homogeneous access structures with rank three}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {151}, year = {2003}, url = {http://eprint.iacr.org/2003/151}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Marti-FarreP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MartinSWW03, author = {Keith M. Martin and Reihaneh Safavi{-}Naini and Huaxiong Wang and Peter R. Wild}, title = {Distributing the Encryption and Decryption of a Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {5}, year = {2003}, url = {http://eprint.iacr.org/2003/005}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MartinSWW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Martinez-MoroMM03, author = {Edgar Mart{\'{\i}}nez{-}Moro and Jorge Mozo{-}Fern{\'{a}}ndez and Carlos Munuera}, title = {Compounding Secret Sharing Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {48}, year = {2003}, url = {http://eprint.iacr.org/2003/048}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Martinez-MoroMM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaurerRH03, author = {Ueli Maurer and Renato Renner and Clemens Holenstein}, title = {Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {161}, year = {2003}, url = {http://eprint.iacr.org/2003/161}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaurerRH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MenezesTW03, author = {Alfred Menezes and Edlyn Teske and Annegret Weng}, title = {Weak Fields for {ECC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {128}, year = {2003}, url = {http://eprint.iacr.org/2003/128}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MenezesTW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MicaliR03, author = {Silvio Micali and Leonid Reyzin}, title = {Physically Observable Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {120}, year = {2003}, url = {http://eprint.iacr.org/2003/120}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MicaliR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MishraS03, author = {Pradeep Kumar Mishra and Palash Sarkar}, title = {Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {180}, year = {2003}, url = {http://eprint.iacr.org/2003/180}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MishraS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MishraS03a, author = {Pradeep Kumar Mishra and Palash Sarkar}, title = {Inversion of Several Field Elements: {A} New Parallel Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {264}, year = {2003}, url = {http://eprint.iacr.org/2003/264}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MishraS03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Naccache03, author = {David Naccache}, title = {Double-Speed Safe Prime Generation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {175}, year = {2003}, url = {http://eprint.iacr.org/2003/175}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Naccache03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaccacheSS03, author = {David Naccache and Nigel P. Smart and Jacques Stern}, title = {Projective Coordinates Leak}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {191}, year = {2003}, url = {http://eprint.iacr.org/2003/191}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaccacheSS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nalla03, author = {Divya Nalla}, title = {ID-based tripartite key agreement with signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {144}, year = {2003}, url = {http://eprint.iacr.org/2003/144}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nalla03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NallaR03, author = {Divya Nalla and K. C. Reddy}, title = {ID-based tripartite Authenticated Key Agreement Protocols from pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {4}, year = {2003}, url = {http://eprint.iacr.org/2003/004}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NallaR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NallaR03b, author = {Divya Nalla and K. C. Reddy}, title = {Signcryption scheme for Identity-based Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {66}, year = {2003}, url = {http://eprint.iacr.org/2003/066}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NallaR03b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nandi03, author = {Mridul Nandi}, title = {A New Tree based Domain Extension of {UOWHF}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {142}, year = {2003}, url = {http://eprint.iacr.org/2003/142}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nandi03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nandi03a, author = {Mridul Nandi}, title = {A Sufficient Condition and Optimal Domain Extension of {UOWHF}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {158}, year = {2003}, url = {http://eprint.iacr.org/2003/158}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nandi03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NikovN03, author = {Ventzislav Nikov and Svetla Nikova}, title = {On a Relation Between Verifiable Secret Sharing Schemes and a Class of Error-Correcting Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {210}, year = {2003}, url = {http://eprint.iacr.org/2003/210}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NikovN03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NikovNP03, author = {Ventzislav Nikov and Svetla Nikova and Bart Preneel}, title = {Multi-Party Computation from any Linear Secret Sharing Scheme Secure against Adaptive Adversary: The Zero-Error Case}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {6}, year = {2003}, url = {http://eprint.iacr.org/2003/006}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NikovNP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OkamotoK03, author = {Tatsuaki Okamoto and Ryo Kashima}, title = {Resource Bounded Unprovability of Computational Lower Bounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {187}, year = {2003}, url = {http://eprint.iacr.org/2003/187}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OkamotoK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Paixao03, author = {Cesar Alison Monteiro Paix{\~{a}}o}, title = {An efficient variant of the {RSA} cryptosystem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {159}, year = {2003}, url = {http://eprint.iacr.org/2003/159}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Paixao03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PelzlWGP03, author = {Jan Pelzl and Thomas J. Wollinger and Jorge Guajardo and Christof Paar}, title = {Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves (Update)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {26}, year = {2003}, url = {http://eprint.iacr.org/2003/026}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PelzlWGP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PelzlWP03, author = {Jan Pelzl and Thomas J. Wollinger and Christof Paar}, title = {Low Cost Security: Explicit Formulae for Genus 4 Hyperelliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {97}, year = {2003}, url = {http://eprint.iacr.org/2003/097}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PelzlWP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PelzlWP03a, author = {Jan Pelzl and Thomas J. Wollinger and Christof Paar}, title = {High Performance Arithmetic for Hyperelliptic Curve Cryptosystems of Genus Two}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {212}, year = {2003}, url = {http://eprint.iacr.org/2003/212}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PelzlWP03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PiretQ03, author = {Gilles Piret and Jean{-}Jacques Quisquater}, title = {Integral Cryptanalysis on reduced-round Safer++}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {33}, year = {2003}, url = {http://eprint.iacr.org/2003/033}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PiretQ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PogorelovP03, author = {Boris Pogorelov and Marina Pudovkina}, title = {Properties of the Transformation Semigroup of the Solitaire Stream Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {169}, year = {2003}, url = {http://eprint.iacr.org/2003/169}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PogorelovP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ponomarenko03, author = {Dima Grigoriev and Ilia Ponomarenko}, title = {Homomorphic public-key cryptosystems and encrypting boolean circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {25}, year = {2003}, url = {http://eprint.iacr.org/2003/025}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ponomarenko03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Proos03, author = {John Proos}, title = {Imperfect Decryption and an Attack on the {NTRU} Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {2}, year = {2003}, url = {http://eprint.iacr.org/2003/002}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Proos03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Pudovkina03, author = {Marina Pudovkina}, title = {The number of initial states of the {RC4} cipher with the same cycle structure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {12}, year = {2003}, url = {http://eprint.iacr.org/2003/012}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Pudovkina03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RaimondoG03, author = {Mario Di Raimondo and Rosario Gennaro}, title = {Secure Multiplication of Shared Secrets in the Exponent}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {57}, year = {2003}, url = {http://eprint.iacr.org/2003/057}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RaimondoG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RamkumarM03, author = {Mahalingam Ramkumar and Nasir D. Memon}, title = {{HARPS:} HAshed Random Preloaded Subset Key Distribution}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {170}, year = {2003}, url = {http://eprint.iacr.org/2003/170}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RamkumarM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ReyzinR03, author = {Leonid Reyzin and Scott Russell}, title = {Simple Stateless Steganography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {93}, year = {2003}, url = {http://eprint.iacr.org/2003/093}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ReyzinR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RogawayW03, author = {Phillip Rogaway and David A. Wagner}, title = {A Critique of {CCM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {70}, year = {2003}, url = {http://eprint.iacr.org/2003/070}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RogawayW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Rogawski03, author = {Marcin Rogawski}, title = {Analysis of Implementation Hierocrypt-3 algorithm (and its comparison to Camellia algorithm) using {ALTERA} devices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {258}, year = {2003}, url = {http://eprint.iacr.org/2003/258}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Rogawski03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RostovtsevM03, author = {Alexander Rostovtsev and Elena Makhovenko}, title = {Elliptic Curve Point Multiplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {88}, year = {2003}, url = {http://eprint.iacr.org/2003/088}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RostovtsevM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RubinS03, author = {Karl Rubin and Alice Silverberg}, title = {Torus-based cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {39}, year = {2003}, url = {http://eprint.iacr.org/2003/039}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RubinS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RyabkoM03, author = {B. Ya. Ryabko and V. A. Monarev}, title = {Using Information Theory Approach to Randomness Testing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {127}, year = {2003}, url = {http://eprint.iacr.org/2003/127}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RyabkoM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SakaiK03, author = {Ryuichi Sakai and Masao Kasahara}, title = {{ID} based Cryptosystems with Pairing on Elliptic Curve}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {54}, year = {2003}, url = {http://eprint.iacr.org/2003/054}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SakaiK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Sarkar03, author = {Palash Sarkar}, title = {Domain Extenders for {UOWHF:} {A} Finite Binary Tree Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {9}, year = {2003}, url = {http://eprint.iacr.org/2003/009}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Sarkar03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Sarkar03a, author = {Palash Sarkar}, title = {Hiji-bij-bij: {A} New Stream Cipher with a Self-Synchronizing Mode of Operation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {14}, year = {2003}, url = {http://eprint.iacr.org/2003/014}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Sarkar03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Sarkar03b, author = {Palash Sarkar}, title = {Domain Extender for Collision Resistant Hash Functions: Improving Upon Merkle-Damgaard Iteration}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {173}, year = {2003}, url = {http://eprint.iacr.org/2003/173}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Sarkar03b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Sarkar03c, author = {Palash Sarkar}, title = {Masking Based Domain Extenders for UOWHFs: Bounds and Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {225}, year = {2003}, url = {http://eprint.iacr.org/2003/225}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Sarkar03c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Semaev03, author = {Igor A. Semaev}, title = {A reduction of the space for the parallelized Pollard lambda search on elliptic curves over prime finite fields and on anomalous binary elliptic curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {166}, year = {2003}, url = {http://eprint.iacr.org/2003/166}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Semaev03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShamirT03, author = {Adi Shamir and Boaz Tsaban}, title = {Guaranteeing the diversity of number generators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {132}, year = {2003}, url = {http://eprint.iacr.org/2003/132}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShamirT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Shao03, author = {Zuhua Shao}, title = {Cryptanalysis of publicly verifiable authenticated encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {189}, year = {2003}, url = {http://eprint.iacr.org/2003/189}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Shao03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Shim03, author = {Kyungah Shim}, title = {Cryptanalysis of ID-based Tripartite Authenticated Key Agreement Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {115}, year = {2003}, url = {http://eprint.iacr.org/2003/115}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Shim03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Shim03a, author = {Kyungah Shim}, title = {Cryptanalysis of Al-Riyami-Paterson's Authenticated Three Party Key Agreement Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {122}, year = {2003}, url = {http://eprint.iacr.org/2003/122}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Shim03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShparlinskiW03, author = {Igor E. Shparlinski and Arne Winterhof}, title = {Hidden Number Problem in Small Subgroups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {49}, year = {2003}, url = {http://eprint.iacr.org/2003/049}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShparlinskiW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Shpilrain03, author = {Vladimir Shpilrain}, title = {Assessing security of some group based cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {123}, year = {2003}, url = {http://eprint.iacr.org/2003/123}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Shpilrain03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SteinfeldBWP03, author = {Ron Steinfeld and Laurence Bull and Huaxiong Wang and Josef Pieprzyk}, title = {Universal Designated-Verifier Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {192}, year = {2003}, url = {http://eprint.iacr.org/2003/192}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SteinfeldBWP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SteinfeldWP03, author = {Ron Steinfeld and Huaxiong Wang and Josef Pieprzyk}, title = {Efficient Extension of Standard Schnorr/RSA signatures into Universal Designated-Verifier Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {193}, year = {2003}, url = {http://eprint.iacr.org/2003/193}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SteinfeldWP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SunH03, author = {Hung{-}Min Sun and Bin{-}Tsan Hsieh}, title = {On the Security of Some Proxy Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {68}, year = {2003}, url = {http://eprint.iacr.org/2003/068}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SunH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SunH03a, author = {Hung{-}Min Sun and Bin{-}Tsan Hsieh}, title = {Security Analysis of Shim's Authenticated Key Agreement Protocols from Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {113}, year = {2003}, url = {http://eprint.iacr.org/2003/113}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SunH03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TangLL03, author = {Chunming Tang and Zhuojun Liu and Jinwang Liu}, title = {The Statistical Zero-knowledge Proof for Blum Integer Based on Discrete Logarithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {232}, year = {2003}, url = {http://eprint.iacr.org/2003/232}, timestamp = {Fri, 22 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/TangLL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TangLW03, author = {Chunming Tang and Zhuojun Liu and Mingsheng Wang}, title = {A Verifiable Secret Sharing Scheme with Statistical zero-knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {222}, year = {2003}, url = {http://eprint.iacr.org/2003/222}, timestamp = {Fri, 22 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/TangLW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Teske03, author = {Edlyn Teske}, title = {An Elliptic Curve Trapdoor System}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {58}, year = {2003}, url = {http://eprint.iacr.org/2003/058}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Teske03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Toli03, author = {Ilia Toli}, title = {Hidden Polynomial Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {61}, year = {2003}, url = {http://eprint.iacr.org/2003/061}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Toli03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Trichina03, author = {Elena Trichina}, title = {Combinational Logic Design for {AES} SubByte Transformation on Masked Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {236}, year = {2003}, url = {http://eprint.iacr.org/2003/236}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Trichina03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Tsaban03, author = {Boaz Tsaban}, title = {Bernoulli numbers and the probability of a birthday surprise}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {137}, year = {2003}, url = {http://eprint.iacr.org/2003/137}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Tsaban03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Tsaban03a, author = {Boaz Tsaban}, title = {Permutation graphs, fast forward permutations, and}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {138}, year = {2003}, url = {http://eprint.iacr.org/2003/138}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Tsaban03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TsabanV03, author = {Boaz Tsaban and Uzi Vishne}, title = {Efficient linear feedback shift registers with maximal period}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {136}, year = {2003}, url = {http://eprint.iacr.org/2003/136}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TsabanV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TsudikX03, author = {Gene Tsudik and Shouhuai Xu}, title = {Accumulating Composites and Improved Group Signing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {112}, year = {2003}, url = {http://eprint.iacr.org/2003/112}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TsudikX03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TuylsKSSD03, author = {Pim Tuyls and Tom A. M. Kevenaar and Geert Jan Schrijen and Toine Staring and Marten van Dijk}, title = {Visual Crypto Displays Enabling Secure Communications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {118}, year = {2003}, url = {http://eprint.iacr.org/2003/118}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TuylsKSSD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/VijayaranganAK03, author = {N. Vijayarangan and Nitin Agarwal and S. Kasilingam}, title = {Goldbach's Conjecture on {ECDSA} Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {76}, year = {2003}, url = {http://eprint.iacr.org/2003/076}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/VijayaranganAK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Wagner03, author = {David A. Wagner}, title = {A Security Evaluation of Whitenoise}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {218}, year = {2003}, url = {http://eprint.iacr.org/2003/218}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Wagner03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Walter03, author = {Colin D. Walter}, title = {Security Constraints on the Oswald-Aigner Exponentiation Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {13}, year = {2003}, url = {http://eprint.iacr.org/2003/013}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Walter03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Wang03, author = {Guilin Wang}, title = {Security Analysis of Several Group Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {194}, year = {2003}, url = {http://eprint.iacr.org/2003/194}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Wang03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Wang03a, author = {Guilin Wang}, title = {On the Security of a Group Signature Scheme with Forward Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {226}, year = {2003}, url = {http://eprint.iacr.org/2003/226}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Wang03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Wang03b, author = {Guilin Wang}, title = {An Attack on Not-interactive Designated Verifier Proofs for Undeniable Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {243}, year = {2003}, url = {http://eprint.iacr.org/2003/243}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Wang03b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangBZD03, author = {Guilin Wang and Feng Bao and Jianying Zhou and Robert H. Deng}, title = {Security Analysis of Some Proxy Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {196}, year = {2003}, url = {http://eprint.iacr.org/2003/196}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangBZD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangQ03, author = {Guilin Wang and Sihan Qing}, title = {Security Flaws in Several Group Signatures Proposed by Popescu}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {207}, year = {2003}, url = {http://eprint.iacr.org/2003/207}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangQ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangZ03, author = {Guilin Wang and Bo Zhu}, title = {Remarks on Saeednia's Identity-based Society Oriented Signature Scheme with Anonymous Signers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {46}, year = {2003}, url = {http://eprint.iacr.org/2003/046}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WatanabeS03, author = {Yodai Watanabe and Junji Shikata}, title = {Relation among simulator-based and comparison-based definitions of semantic security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {78}, year = {2003}, url = {http://eprint.iacr.org/2003/078}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WatanabeS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Wiener03, author = {Michael J. Wiener}, title = {Safe Prime Generation with a Combined Sieve}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {186}, year = {2003}, url = {http://eprint.iacr.org/2003/186}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Wiener03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WinterNI03, author = {Andreas J. Winter and Anderson C. A. Nascimento and Hideki Imai}, title = {Commitment Capacity of Discrete Memoryless Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {165}, year = {2003}, url = {http://eprint.iacr.org/2003/165}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WinterNI03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Wolf03, author = {Christopher Wolf}, title = {Efficient Public Key Generation for Multivariate Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {89}, year = {2003}, url = {http://eprint.iacr.org/2003/089}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Wolf03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WollingerP03, author = {Thomas J. Wollinger and Christof Paar}, title = {How Secure Are FPGAs in Cryptographic Applications?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {119}, year = {2003}, url = {http://eprint.iacr.org/2003/119}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WollingerP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Wu03, author = {Hongjun Wu}, title = {Breaking the Stream Cipher Whitenoise}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {250}, year = {2003}, url = {http://eprint.iacr.org/2003/250}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Wu03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WuF03, author = {Wenling Wu and Dengguo Feng}, title = {Collision Attack on Reduced-Round Camellia}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {135}, year = {2003}, url = {http://eprint.iacr.org/2003/135}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WuF03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangKM03, author = {Bo Yang and Ramesh Karri and David A. McGrew}, title = {Divide and Concatenate: {A} Scalable Hardware Architecture for Universal {MAC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {215}, year = {2003}, url = {http://eprint.iacr.org/2003/215}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/YangKM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZengH03, author = {Xiangyong Zeng and Lei Hu}, title = {A Composition Construction of Bent-Like Boolean Functions from Quadratic Polynomials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {204}, year = {2003}, url = {http://eprint.iacr.org/2003/204}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZengH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Zhang03, author = {Muxiang Zhang}, title = {Provably-Secure Enhancement on 3GPP Authentication and Key Agreement Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {92}, year = {2003}, url = {http://eprint.iacr.org/2003/092}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Zhang03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangC03, author = {Fangguo Zhang and Xiaofeng Chen}, title = {Attack on Two ID-based Authenticated Group Key Agreement Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {259}, year = {2003}, url = {http://eprint.iacr.org/2003/259}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangK03, author = {Fangguo Zhang and Kwangjo Kim}, title = {Cryptanalysis of Lee-Hwang-Li's Key Authentication Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {11}, year = {2003}, url = {http://eprint.iacr.org/2003/011}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangSL03, author = {Fangguo Zhang and Reihaneh Safavi{-}Naini and Chih{-}Yin Lin}, title = {New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {104}, year = {2003}, url = {http://eprint.iacr.org/2003/104}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangSL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangSS03, author = {Fangguo Zhang and Reihaneh Safavi{-}Naini and Willy Susilo}, title = {Attack on Han et al.'s ID-based Confirmer (Undeniable) Signature at ACM-EC'03}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {129}, year = {2003}, url = {http://eprint.iacr.org/2003/129}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangSS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangSS03a, author = {Fangguo Zhang and Reihaneh Safavi{-}Naini and Willy Susilo}, title = {ID-Based Chameleon Hashes from Bilinear Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {208}, year = {2003}, url = {http://eprint.iacr.org/2003/208}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangSS03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangXF03, author = {Zhenfeng Zhang and Jing Xu and Dengguo Feng}, title = {Attack on an Identification Scheme Based on Gap Diffie-Hellman Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {153}, year = {2003}, url = {http://eprint.iacr.org/2003/153}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangXF03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Zhao03, author = {Yunlei Zhao}, title = {Concurrent/Resettable Zero-Knowledge With Concurrent Soundness in the Bare Public-Key Model and Its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {265}, year = {2003}, url = {http://eprint.iacr.org/2003/265}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Zhao03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Zhu03a, author = {Huafei Zhu}, title = {A Practical Elliptic Curve Public Key Encryption Scheme Provably Secure Against Adaptive Chosen-message Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {87}, year = {2003}, url = {http://eprint.iacr.org/2003/087}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Zhu03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Zhu03b, author = {Huafei Zhu}, title = {A Formal Proof of Zhu's Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {155}, year = {2003}, url = {http://eprint.iacr.org/2003/155}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Zhu03b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Zhu03c, author = {Huafei Zhu}, title = {Constructing Optimistic Fair Exchange Protocols from Committed Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {178}, year = {2003}, url = {http://eprint.iacr.org/2003/178}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Zhu03c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Zhu03d, author = {Huafei Zhu}, title = {Verifiably Committed Signatures Provably Secure in The Standard Complexity Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {228}, year = {2003}, url = {http://eprint.iacr.org/2003/228}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Zhu03d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhuBD03, author = {Huafei Zhu and Feng Bao and Robert H. Deng}, title = {Computing of Trust in Distributed Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {56}, year = {2003}, url = {http://eprint.iacr.org/2003/056}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhuBD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Zoltak03, author = {Bartosz Zoltak}, title = {{VMPC} One-Way Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {179}, year = {2003}, url = {http://eprint.iacr.org/2003/179}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Zoltak03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Zoltak03a, author = {Bartosz Zoltak}, title = {{VMPC} Stream Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {185}, year = {2003}, url = {http://eprint.iacr.org/2003/185}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Zoltak03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaruaDS03a, title = {Extending Joux's Protocol to Multi Party Key Agreement}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {190}, year = {2003}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2003/190}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaruaDS03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisFW03, title = {Parallel Signcryption with OAEP, PSS-R, and other Feistel Paddings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {43}, year = {2003}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2003/043}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisFW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GangopadhyayM03, title = {Direct Sum of Non Normal and Normal Bent Functions Always Produces Non Normal Bent Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {134}, year = {2003}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2003/134}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GangopadhyayM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LvLW03, title = {Further Cryptanalysis of some Proxy Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {111}, year = {2003}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2003/111}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LvLW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaoM03, title = {Universal Padding Schemes for {RSA} with Optimal Bandwidth of Message Recovery}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {29}, year = {2003}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2003/029}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaoM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NallaR03a, title = {Signcryption scheme for Identity-based Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {44}, year = {2003}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2003/044}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NallaR03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Toli03a, title = {Cryptanalysis of {HFE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {101}, year = {2003}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2003/101}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Toli03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YaoL03, title = {Forward-Secure Hierarchical ID-Based Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {149}, year = {2003}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2003/149}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YaoL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Zhou03, title = {On the Security of a Multi-Party Certified Email Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {256}, year = {2003}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2003/256}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Zhou03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Zhu03, title = {A Price Negotiable Transaction System}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {7}, year = {2003}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2003/007}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Zhu03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhuFD03, title = {A Transitive Signature Scheme Provably Secure Against Adaptive Chosen-message Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {59}, year = {2003}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2003/059}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhuFD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.