Search dblp for Publications

export results for "toc:db/journals/iacr/iacr2003.bht:"

 download as .bib file

@article{DBLP:journals/iacr/0002HSI03,
  author       = {Rui Zhang and
                  Goichiro Hanaoka and
                  Junji Shikata and
                  Hideki Imai},
  title        = {On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {181},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/181},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0002HSI03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AhnH03,
  author       = {Luis von Ahn and
                  Nicholas J. Hopper},
  title        = {Public Key Steganography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {233},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/233},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AhnH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Al-RiyamiP03,
  author       = {Sattam S. Al{-}Riyami and
                  Kenneth G. Paterson},
  title        = {Certificateless Public Key Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {126},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/126},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Al-RiyamiP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AmbainisJL03,
  author       = {Andris Ambainis and
                  Markus Jakobsson and
                  Helger Lipmaa},
  title        = {Cryptographic Randomized Response Techniques},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {27},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/027},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AmbainisJL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseM03,
  author       = {Giuseppe Ateniese and
                  Breno de Medeiros},
  title        = {Identity-based Chameleon Hash and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {167},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/167},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AugotFL03,
  author       = {Daniel Augot and
                  Matthieu Finiasz and
                  Pierre Loidreau},
  title        = {Using the Trace Operator to repair the Polynomial Reconstruction based
                  Cryptosystem presented at Eurocrypt 2003},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {209},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/209},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AugotFL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AugotFS03,
  author       = {Daniel Augot and
                  Matthieu Finiasz and
                  Nicolas Sendrier},
  title        = {A Fast Provably Secure Cryptographic Hash Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {230},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/230},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AugotFS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Avanzi03,
  author       = {Roberto Maria Avanzi},
  title        = {Aspects of Hyperelliptic Curves over Large Prime Fields in Software
                  Implementations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {253},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/253},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Avanzi03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AwasthiL03,
  author       = {Amit K. Awasthi and
                  Sunder Lal},
  title        = {Proxy Blind Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {72},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/072},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AwasthiL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Backes03,
  author       = {Michael Backes},
  title        = {Unifying Simulatability Definitions in Cryptographic Systems under
                  Different Timing Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {114},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/114},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Backes03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesC03,
  author       = {Michael Backes and
                  Christian Cachin},
  title        = {Public-Key Steganography with Active Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {231},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/231},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesH03,
  author       = {Michael Backes and
                  Dennis Hofheinz},
  title        = {How to Break and Repair a Universally Composable Signature Functionality},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {240},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/240},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesP03,
  author       = {Michael Backes and
                  Birgit Pfitzmann},
  title        = {A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe
                  Public-Key Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {121},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/121},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesPW03,
  author       = {Michael Backes and
                  Birgit Pfitzmann and
                  Michael Waidner},
  title        = {A Universally Composable Cryptographic Library},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {15},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/015},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesPW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesPW03a,
  author       = {Michael Backes and
                  Birgit Pfitzmann and
                  Michael Waidner},
  title        = {Symmetric Authentication Within a Simulatable Cryptographic Library},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {145},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/145},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesPW03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaekZ03,
  author       = {Joonsang Baek and
                  Yuliang Zheng},
  title        = {Identity-Based Threshold Decryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {164},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/164},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BaekZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaiX03,
  author       = {Enjian Bai and
                  Guozhen Xiao},
  title        = {On the Randomness of the Editing Generator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {139},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/139},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaiX03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarretoLS03,
  author       = {Paulo S. L. M. Barreto and
                  Ben Lynn and
                  Michael Scott},
  title        = {On the Selection of Pairing-Friendly Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {86},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/086},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarretoLS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaruaDS03,
  author       = {Rana Barua and
                  Ratna Dutta and
                  Palash Sarkar},
  title        = {Extending Joux's Protocol to Multi Party Key Agreement},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {62},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/062},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaruaDS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeaverDST03,
  author       = {Cheryl L. Beaver and
                  Timothy Draelos and
                  Richard Schroeppel and
                  Mark Torgerson},
  title        = {ManTiCore: Encryption with Joint Cipher-State Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {154},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/154},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeaverDST03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareBP03,
  author       = {Mihir Bellare and
                  Alexandra Boldyreva and
                  Adriana Palacio},
  title        = {An Uninstantiable Random-Oracle-Model Scheme for a Hybrid Encryption
                  Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {77},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/077},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareBP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareK03,
  author       = {Mihir Bellare and
                  Tadayoshi Kohno},
  title        = {Hash Function Balance and its Impact on Birthday Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {65},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/065},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareRW03,
  author       = {Mihir Bellare and
                  Phillip Rogaway and
                  David A. Wagner},
  title        = {{EAX:} {A} Conventional Authenticated-Encryption Mode},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {69},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/069},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareRW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BirgetHM03,
  author       = {Jean{-}Camille Birget and
                  Dawei Hong and
                  Nasir D. Memon},
  title        = {Robust discretization, with an application to graphical passwords},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {168},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/168},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BirgetHM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BiryukovCD03,
  author       = {Alex Biryukov and
                  Christophe De Canni{\`{e}}re and
                  Gustaf Dellkrantz},
  title        = {Crytanalysis of {SAFER++}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {109},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/109},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BiryukovCD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BiryukovLP03,
  author       = {Alex Biryukov and
                  Joseph Lano and
                  Bart Preneel},
  title        = {Cryptanalysis of the Alleged SecurID Hash Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {162},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/162},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BiryukovLP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Blackburn03,
  author       = {Simon R. Blackburn},
  title        = {Perfect Hash Families with Few Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {17},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/017},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Blackburn03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlackburnCG03,
  author       = {Simon R. Blackburn and
                  Carlos Cid and
                  Steven D. Galbraith},
  title        = {Cryptanalysis of a Cryptosystem based on Drinfeld modules},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {223},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/223},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlackburnCG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlackburnP03,
  author       = {Simon R. Blackburn and
                  Kenneth G. Paterson},
  title        = {Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {199},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/199},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlackburnP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoldyrevaPW03,
  author       = {Alexandra Boldyreva and
                  Adriana Palacio and
                  Bogdan Warinschi},
  title        = {Secure Proxy Signature Schemes for Delegation of Signing Rights},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {96},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/096},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoldyrevaPW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehCOP03,
  author       = {Dan Boneh and
                  Giovanni Di Crescenzo and
                  Rafail Ostrovsky and
                  Giuseppe Persiano},
  title        = {Public Key Encryption with keyword Search},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {195},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/195},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehCOP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BorenB03,
  author       = {Stephen Boren and
                  Andre Brisson},
  title        = {Software Specifications For Tinnitus Utilizing Whitenoise(Revised
                  Feb 2004)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {249},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/249},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BorenB03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Boyen03,
  author       = {Xavier Boyen},
  title        = {Multipurpose Identity-Based Signcryption : {A} Swiss Army Knife for
                  Identity-Based Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {163},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/163},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Boyen03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrezingW03,
  author       = {Friederike Brezing and
                  Annegret Weng},
  title        = {Elliptic curves suitable for pairing based cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {143},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/143},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrezingW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrierCO03,
  author       = {Eric Brier and
                  Christophe Clavier and
                  Francis Olivier},
  title        = {Optimal Statistical Power Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {152},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/152},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrierCO03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrierNP03,
  author       = {Eric Brier and
                  David Naccache and
                  Pascal Paillier},
  title        = {Chemical Combinatorial Attacks on Keyboards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {217},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/217},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrierNP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Campagna03,
  author       = {Matthew J. Campagna},
  title        = {Algorithms in Braid Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {99},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/099},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Campagna03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Canetti03,
  author       = {Ran Canetti},
  title        = {Universally Composable Signatures, Certification and Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {239},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/239},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Canetti03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiGH03,
  author       = {Ran Canetti and
                  Oded Goldreich and
                  Shai Halevi},
  title        = {On the random-oracle methodology as applied to length-restricted signature
                  schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {150},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/150},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiGH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiHK03,
  author       = {Ran Canetti and
                  Shai Halevi and
                  Jonathan Katz},
  title        = {A Forward-Secure Public-Key Encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {83},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/083},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiHK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiHK03a,
  author       = {Ran Canetti and
                  Shai Halevi and
                  Jonathan Katz},
  title        = {Chosen-Ciphertext Security from Identity-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {182},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/182},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiHK03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiKN03,
  author       = {Ran Canetti and
                  Hugo Krawczyk and
                  Jesper Buus Nielsen},
  title        = {Relaxing Chosen-Ciphertext Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {174},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/174},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiKN03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chen03,
  author       = {Zhongliang Chen},
  title        = {Security analysis on Nalla-Reddy's ID-based tripartite authenticated
                  key agreement protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {103},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/103},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chen03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenY03,
  author       = {Jiun{-}Ming Chen and
                  Bo{-}Yin Yang},
  title        = {A More Secure and Efficacious {TTS} Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {160},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/160},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenZK03,
  author       = {Xiaofeng Chen and
                  Fangguo Zhang and
                  Kwangjo Kim},
  title        = {A New ID-based Group Signature Scheme from Bilinear Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {116},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/116},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenZK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenZW03,
  author       = {Xiaofeng Chen and
                  Fangguo Zhang and
                  Yumin Wang},
  title        = {A New Approach to Prevent Blackmailing in E-Cash},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {55},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/055},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenZW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CheonJ03,
  author       = {Jung Hee Cheon and
                  Byungheup Jun},
  title        = {A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy
                  Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {19},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/019},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CheonJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CheonN03,
  author       = {Jung Hee Cheon and
                  Hyun Soo Nam},
  title        = {A Cryptanalysis of the Original Domingo-Ferrer's Algebraic Privacy
                  Homomophism},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {221},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/221},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CheonN03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chevallier-MamesCJ03,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames and
                  Mathieu Ciet and
                  Marc Joye},
  title        = {Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel
                  Atomicity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {237},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/237},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chevallier-MamesCJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoieJ03,
  author       = {YoungJu Choie and
                  Eunkyung Jeong},
  title        = {Isomorphism Classes of Hyperelliptic Curves of Genus 2 over {\(\mathbb{F}\)}\({}_{\mbox{2\({}^{\mbox{n}}\)}}\)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {213},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/213},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoieJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChowHYC03,
  author       = {Sherman S. M. Chow and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu and
                  Kam{-}Pui Chow},
  title        = {A Secure Modified ID-Based Undeniable Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {262},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/262},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChowHYC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChuLT03,
  author       = {Cheng{-}Kang Chu and
                  Li{-}Shan Liu and
                  Wen{-}Guey Tzeng},
  title        = {A Threshold {GQ} Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {16},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/016},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChuLT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CietJ03,
  author       = {Mathieu Ciet and
                  Marc Joye},
  title        = {Elliptic Curve Cryptosystems in the Presence of Permanent and Transient
                  Faults},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {28},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/028},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CietJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CietJLM03,
  author       = {Mathieu Ciet and
                  Marc Joye and
                  Kristin E. Lauter and
                  Peter L. Montgomery},
  title        = {Trading Inversions for Multiplications in Elliptic Curve Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {257},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/257},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CietJLM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ContiniY03,
  author       = {Scott Contini and
                  Yiqun Lisa Yin},
  title        = {Improved Cryptanalysis of SecurID},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {205},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/205},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ContiniY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Coron03,
  author       = {Jean{-}S{\'{e}}bastien Coron},
  title        = {Cryptanalysis of a public-key encryption scheme based on the polynomial
                  reconstruction problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {36},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/036},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Coron03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Coron03a,
  author       = {Jean{-}S{\'{e}}bastien Coron},
  title        = {Cryptanalysis of the Repaired Public-key Encryption Scheme Based on
                  the Polynomial Reconstruction Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {219},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/219},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Coron03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Courtois03,
  author       = {Nicolas T. Courtois},
  title        = {Algebraic Attacks on Combiners with Memory and Several Outputs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {125},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/125},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Courtois03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CourtoisCG03,
  author       = {Nicolas T. Courtois and
                  Guilhem Castagnos and
                  Louis Goubin},
  title        = {What do {DES} S-boxes Say to Each Other ?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {184},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/184},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CourtoisCG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CourtoisGP03,
  author       = {Nicolas T. Courtois and
                  Louis Goubin and
                  Jacques Patarin},
  title        = {SFLASHv3, a fast asymmetric signature scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {211},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/211},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CourtoisGP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CourtoisJJPS03,
  author       = {Nicolas T. Courtois and
                  Robert T. Johnson and
                  Pascal Junod and
                  Thomas Pornin and
                  Michael Scott},
  title        = {Did Filiol Break {AES} ?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {22},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/022},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CourtoisJJPS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerFIK03,
  author       = {Ronald Cramer and
                  Serge Fehr and
                  Yuval Ishai and
                  Eyal Kushilevitz},
  title        = {Efficient Multi-Party Computation over Rings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {30},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/030},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerFIK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardG03,
  author       = {Ivan Damg{\aa}rd and
                  Jens Groth},
  title        = {Non-interactive and Reusable Non-malleable Commitment Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {80},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/080},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DasSG03,
  author       = {Manik Lal Das and
                  Ashutosh Saxena and
                  Ved Prakash Gulati},
  title        = {Security Analysis of Lal and Awasthi's Proxy Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {263},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/263},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DasSG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dichtl03,
  author       = {Markus Dichtl},
  title        = {How to Predict the Output of a Hardware Random Number Generator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {51},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/051},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dichtl03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DingH03,
  author       = {Jintai Ding and
                  Timonthy Hodges},
  title        = {Cryptanalysis of an implementation scheme of the Tamed Transformation
                  Method cryptosystem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {84},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/084},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DingH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DingS03,
  author       = {Jintai Ding and
                  Dieter Schmidt},
  title        = {A defect of the implementation schemes of the {TTM} cryptosystem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {85},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/085},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DingS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisA03,
  author       = {Yevgeniy Dodis and
                  Jee Hea An},
  title        = {Concealment and its Applications to Authenticated Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {50},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/050},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisA03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisF03,
  author       = {Yevgeniy Dodis and
                  Nelly Fazio},
  title        = {Public Key Trace and Revoke Scheme Secure against Adaptive Chosen
                  Ciphertext Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {95},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/095},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisF03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisORS03,
  author       = {Yevgeniy Dodis and
                  Rafail Ostrovsky and
                  Leonid Reyzin and
                  Adam D. Smith},
  title        = {Fuzzy Extractors: How to Generate Strong Keys from Biometrics and
                  Other Noisy Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {235},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/235},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisORS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisR03,
  author       = {Yevgeniy Dodis and
                  Leonid Reyzin},
  title        = {Breaking and Repairing Optimistic Fair Exchange from {PODC} 2003},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {146},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/146},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DongC03,
  author       = {Zheng Dong and
                  Kefei Chen},
  title        = {an attack on a multisignature scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {201},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/201},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DongC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DongLC03,
  author       = {Zheng Dong and
                  Shengli Liu and
                  Kefei Chen},
  title        = {Cryptanalysis of B.Lee-S.Kim-K.Kim Proxy Signature},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {200},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/200},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DongLC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuWGW03,
  author       = {Xinjun Du and
                  Ying Wang and
                  Jianhua Ge and
                  Yumin Wang},
  title        = {Chameleon Signature from Bilinear Pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {238},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/238},
  timestamp    = {Mon, 25 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DuWGW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuWGW03a,
  author       = {Xinjun Du and
                  Ying Wang and
                  Jianhua Ge and
                  Yumin Wang},
  title        = {ID-based Authenticated Two Round Multi-Party Key Agreement},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {247},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/247},
  timestamp    = {Mon, 25 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DuWGW03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuWGW03b,
  author       = {Xinjun Du and
                  Ying Wang and
                  Jianhua Ge and
                  Yumin Wang},
  title        = {An Improved ID-based Authenticated Group Key Agreement Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {260},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/260},
  timestamp    = {Mon, 25 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DuWGW03b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DusartLV03,
  author       = {Pierre Dusart and
                  Gilles Letourneux and
                  Olivier Vivolo},
  title        = {Differential Fault Analysis on {A.E.S}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {10},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/010},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DusartLV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuursmaL03,
  author       = {Iwan M. Duursma and
                  Hyang{-}Sook Lee},
  title        = {Tate-pairing implementations for tripartite key agreement},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {53},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/053},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuursmaL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EisentragerLM03,
  author       = {Kirsten Eisentr{\"{a}}ger and
                  Kristin E. Lauter and
                  Peter L. Montgomery},
  title        = {Improved Weil and Tate pairings for elliptic and hyperelliptic curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {242},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/242},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EisentragerLM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ElkindL03,
  author       = {Edith Elkind and
                  Helger Lipmaa},
  title        = {Interleaving Cryptography and Mechanism Design: The Case of Online
                  Auctions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {21},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/021},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ElkindL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EncinasMD03,
  author       = {Luis Hern{\'{a}}ndez Encinas and
                  Jaime Mu{\~{n}}oz Masqu{\'{e}} and
                  A. Queiruga Dios},
  title        = {An algorithm to obtain an {RSA} modulus with a large private key},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {45},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/045},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EncinasMD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Fairbrother03,
  author       = {Peter Fairbrother},
  title        = {Improved Constructions for Universal Re-encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {255},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/255},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Fairbrother03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Filiol03,
  author       = {Eric Filiol},
  title        = {Plaintext-dependant Repetition Codes Cryptanalysis of Block Ciphers
                  - The {AES} Case},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {3},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/003},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Filiol03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FlonO03,
  author       = {St{\'{e}}phane Flon and
                  Roger Oyono},
  title        = {Fast arithmetic on Jacobians of Picard curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {79},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/079},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FlonO03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalindoMMV03,
  author       = {David Galindo and
                  Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and
                  Paz Morillo and
                  Jorge L. Villar},
  title        = {Fujisaki-Okamoto {IND-CCA} hybrid encryption revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {107},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/107},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalindoMMV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GangopadhyayKM03,
  author       = {Sugata Gangopadhyay and
                  Pradipkumar H. Keskar and
                  Subhamoy Maitra},
  title        = {Patterson-Wiedemann Construction Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {176},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/176},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GangopadhyayKM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarayMY03,
  author       = {Juan A. Garay and
                  Philip D. MacKenzie and
                  Ke Yang},
  title        = {Strengthening Zero-Knowledge Protocols using Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {37},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/037},
  timestamp    = {Fri, 05 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GarayMY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarayP03,
  author       = {Juan A. Garay and
                  Carl Pomerance},
  title        = {Timed Fair Exchange of Standard Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {42},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/042},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarayP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GeiselmannS03,
  author       = {Willi Geiselmann and
                  Rainer Steinwandt},
  title        = {Yet Another Sieving Device},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {202},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/202},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GeiselmannS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GeiselmannS03a,
  author       = {Willi Geiselmann and
                  Rainer Steinwandt},
  title        = {A short comment on the affine parts of SFLASH\({}^{\mbox{v3}}\)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {220},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/220},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GeiselmannS03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GeiselmannS03b,
  author       = {Willi Geiselmann and
                  Rainer Steinwandt},
  title        = {Attacks on a Secure Group Communication Scheme With Hierarchical Access
                  Control},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {227},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/227},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GeiselmannS03b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GeiselmannS03c,
  author       = {Willi Geiselmann and
                  Rainer Steinwandt},
  title        = {A Key Substitution Attack on SFLASH\({}^{\mbox{v3}}\)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {245},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/245},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GeiselmannS03c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gennaro03,
  author       = {Rosario Gennaro},
  title        = {Multi-Trapdoor Commitments and their Applications to Non-Malleable
                  Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {214},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/214},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gennaro03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GennaroL03,
  author       = {Rosario Gennaro and
                  Yehuda Lindell},
  title        = {A Framework for Password-Based Authenticated Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {32},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/032},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GennaroL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gentry03,
  author       = {Craig Gentry},
  title        = {Certificate-Based Encryption and the Certificate Revocation Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {183},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/183},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gentry03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GertnerH03,
  author       = {Yitchak Gertner and
                  Amir Herzberg},
  title        = {Committing Encryption and Publicly-Verifiable SignCryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {254},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/254},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GertnerH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Giraud03,
  author       = {Christophe Giraud},
  title        = {{DFA} on {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {8},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/008},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Giraud03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gjsteen03,
  author       = {Kristian Gj{\o}steen},
  title        = {Homomorphic public-key systems based on subgroup membership problems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {131},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/131},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gjsteen03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Goh03,
  author       = {Eu{-}Jin Goh},
  title        = {Secure Indexes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {216},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/216},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Goh03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldwasserT03,
  author       = {Shafi Goldwasser and
                  Yael Tauman},
  title        = {On the (In)security of the Fiat-Shamir Paradigm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {34},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/034},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldwasserT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GolicM03,
  author       = {Jovan Dj. Golic and
                  Renato Menicocci},
  title        = {A new statistical distinguisher for the shrinking generator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {41},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/041},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GolicM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuptaS03,
  author       = {Kishan Chand Gupta and
                  Palash Sarkar},
  title        = {Computing Partial Walsh Transform from the Algebraic Normal Form of
                  a Boolean Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {40},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/040},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuptaS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuptaS03a,
  author       = {Kishan Chand Gupta and
                  Palash Sarkar},
  title        = {A General Correlation Theorem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {124},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/124},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuptaS03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuptaS03b,
  author       = {Kishan Chand Gupta and
                  Palash Sarkar},
  title        = {Construction of Perfect Nonlinear and Maximally Nonlinear Multi-Output
                  Boolean Functions Satisfying Higher Order Strict Avalanche Criteria},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {198},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/198},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuptaS03b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviR03,
  author       = {Shai Halevi and
                  Phillip Rogaway},
  title        = {A Parallelizable Enciphering Mode},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {147},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/147},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviR03a,
  author       = {Shai Halevi and
                  Phillip Rogaway},
  title        = {A Tweakable Enciphering Mode},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {148},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/148},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviR03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HawkesR03,
  author       = {Philip Hawkes and
                  Gregory G. Rose},
  title        = {A Mode of Operation with Partial Encryption and Message Integrity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/001},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HawkesR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HawkesR03a,
  author       = {Philip Hawkes and
                  Gregory G. Rose},
  title        = {Primitive Specification for {SOBER-128}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {81},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/081},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HawkesR03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HerranzS03,
  author       = {Javier Herranz and
                  Germ{\'{a}}n S{\'{a}}ez},
  title        = {Forking Lemmas in the Ring Signatures' Scenario},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {67},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/067},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HerranzS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HerranzS03a,
  author       = {Javier Herranz and
                  Germ{\'{a}}n S{\'{a}}ez},
  title        = {Revisiting fully distributed proxy signature schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {197},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/197},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HerranzS03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HerranzS03b,
  author       = {Javier Herranz and
                  Germ{\'{a}}n S{\'{a}}ez},
  title        = {A provably secure ID-based ring signature scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {261},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/261},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HerranzS03b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HofheinzMS03,
  author       = {Dennis Hofheinz and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Rainer Steinwandt},
  title        = {On Modeling {IND-CCA} Security in Cryptographic Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {24},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/024},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HofheinzMS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HofheinzMS03a,
  author       = {Dennis Hofheinz and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Rainer Steinwandt},
  title        = {Initiator-Resilient Universally Composable Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {63},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/063},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HofheinzMS03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Howgrave-GrahamSSW03,
  author       = {Nick Howgrave{-}Graham and
                  Joseph H. Silverman and
                  Ari Singer and
                  William Whyte},
  title        = {{NAEP:} Provable Security in the Presence of Decryption Failures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {172},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/172},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Howgrave-GrahamSSW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuWI03,
  author       = {Fei Hu and
                  Chwan{-}Hwa John Wu and
                  J. David Irwin},
  title        = {A New Forward Secure Signature Scheme using Bilinear Maps},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {188},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/188},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuWI03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HughesT03,
  author       = {Jim Hughes and
                  Allen R. Tannenbaum},
  title        = {Length-Based Attacks for Certain Group Based Encryption Rewriting
                  Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {102},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/102},
  timestamp    = {Thu, 19 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HughesT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HypponenNTT03,
  author       = {Konstantin Hypp{\"{o}}nen and
                  David Naccache and
                  Elena Trichina and
                  Alexei Tchoulkine},
  title        = {Trading-Off Type-Inference Memory Complexity Against Communication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {140},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/140},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HypponenNTT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshidaMO03,
  author       = {Natsuki Ishida and
                  Shin'ichiro Matsuo and
                  Wakaha Ogata},
  title        = {Divisible Voting Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {74},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/074},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshidaMO03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ItakuraT03,
  author       = {Yukio Itakura and
                  Shigeo Tsujii},
  title        = {Proposal on Personal Authentication System in which Biological Information
                  is embedded in Cryptosystem Key},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {110},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/110},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ItakuraT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Itkis03,
  author       = {Gene Itkis},
  title        = {Cryptographic Tamper Evidence},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {31},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/031},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Itkis03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ItkisX03,
  author       = {Gene Itkis and
                  Peng Xie},
  title        = {Generalized Key-Evolving Signature Schemes or How to Foil an Armed
                  Adversary},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {234},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/234},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ItkisX03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IwataK03,
  author       = {Tetsu Iwata and
                  Kaoru Kurosawa},
  title        = {Stronger Security Bounds for OMAC, {TMAC} and {XCBC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {82},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/082},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IwataK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IwataYK03,
  author       = {Tetsu Iwata and
                  Tohru Yagi and
                  Kaoru Kurosawa},
  title        = {On the Pseudorandomness of {KASUMI} Type Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {130},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/130},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IwataYK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JakobssonLA03,
  author       = {Markus Jakobsson and
                  John Linn and
                  Joy Algesheimer},
  title        = {How to Protect Against a Militant Spammer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {71},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/071},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JakobssonLA03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Jeong03,
  author       = {Eunkyung Jeong},
  title        = {Isomorphism Classes of Hyperelliptic Curves of genus 3 over finite
                  fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {251},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/251},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Jeong03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JiangG03,
  author       = {Shaoquan Jiang and
                  Guang Gong},
  title        = {Hybrid Broadcast Encryption and Security Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {241},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/241},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JiangG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Junod03,
  author       = {Pascal Junod},
  title        = {On the Optimality of Linear, Differential and Sequential Distinguishers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {64},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/064},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Junod03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KasaharaS03,
  author       = {Masao Kasahara and
                  Ryuichi Sakai},
  title        = {A Construction of 100 bit Public-Key Cryptosystem and Digital Signature
                  Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {47},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/047},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KasaharaS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KatagiKAT03,
  author       = {Masanobu Katagi and
                  Izuru Kitamura and
                  Toru Akishita and
                  Tsuyoshi Takagi},
  title        = {Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems
                  using Degenerate Divisors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {203},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/203},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KatagiKAT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KatzY03,
  author       = {Jonathan Katz and
                  Moti Yung},
  title        = {Scalable Protocols for Authenticated Group Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {171},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/171},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KatzY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KitamuraK03,
  author       = {Izuru Kitamura and
                  Masanobu Katagi},
  title        = {Efficient Implementation of Genus Three Hyperelliptic Curve Cryptography
                  over GF(2\({}^{\mbox{n}}\))},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {248},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/248},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KitamuraK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KlimaPR03,
  author       = {Vlastimil Kl{\'{\i}}ma and
                  Ondrej Pokorn{\'{y}} and
                  Tom{\'{a}}s Rosa},
  title        = {Attacking RSA-based Sessions in {SSL/TLS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {52},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/052},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KlimaPR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KlimaR03,
  author       = {Vlastimil Kl{\'{\i}}ma and
                  Tom{\'{a}}s Rosa},
  title        = {Side Channel Attacks on {CBC} Encrypted Messages in the PKCS{\#}7
                  Format},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {98},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/098},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KlimaR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KobaraI03,
  author       = {Kazukuni Kobara and
                  Hideki Imai},
  title        = {Pretty-Simple Password-Authenticated Key-Exchange Under Standard Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {38},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/038},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KobaraI03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KohnoPB03,
  author       = {Tadayoshi Kohno and
                  Adriana Palacio and
                  John Black},
  title        = {Building Secure Cryptographic Transforms, or How to Encrypt and {MAC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {177},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/177},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KohnoPB03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KohnoVW03,
  author       = {Tadayoshi Kohno and
                  John Viega and
                  Doug Whiting},
  title        = {{CWC:} {A} high-performance conventional authenticated encryption
                  mode},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {106},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/106},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KohnoVW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KuleszaKP03,
  author       = {Kamil Kulesza and
                  Zbigniew Kotulski and
                  Josef Pieprzyk},
  title        = {On alternative approach for verifiable secret sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {35},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/035},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KuleszaKP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kurosawa03,
  author       = {Kaoru Kurosawa},
  title        = {Almost Security of Cryptographic Boolean Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {75},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/075},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kurosawa03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KurosawaT03,
  author       = {Kaoru Kurosawa and
                  Tsuyoshi Takagi},
  title        = {Some RSA-based Encryption Schemes with Tight Security Reduction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {157},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/157},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KurosawaT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LalA03,
  author       = {Sunder Lal and
                  Amit K. Awasthi},
  title        = {A Scheme for obtaining a Warrant Message from the Digital Proxy Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {73},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/073},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LalA03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lange03,
  author       = {Tanja Lange},
  title        = {Trace Zero Subvariety for Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {94},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/094},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lange03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Le03,
  author       = {Tri Van Le},
  title        = {Novel Cyclic and Algebraic Properties of {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {108},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/108},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Le03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Le03a,
  author       = {Tri Van Le},
  title        = {Efficient Provably Secure Public Key Steganography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {156},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/156},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Le03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeK03,
  author       = {Tri Van Le and
                  Kaoru Kurosawa},
  title        = {Efficient Public Key Steganography Secure Against Adaptively Chosen
                  Stegotext Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {244},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/244},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lee03,
  author       = {Jong Won Lee},
  title        = {Isomorphism Classes of Picard Curves over Finite Fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {60},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/060},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lee03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeKHHM03,
  author       = {Dong Hoon Lee and
                  Jaeheon Kim and
                  Jin Hong and
                  Jae Woo Han and
                  Dukjae Moon},
  title        = {Algebraic Attacks on Summation Generators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {229},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/229},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeKHHM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeLL03,
  author       = {Ho{-}Kyu Lee and
                  Hyang{-}Sook Lee and
                  Young{-}Ran Lee},
  title        = {An Authenticated Group Key Agreement Protocol on Braid groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {18},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/018},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeLL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertQ03,
  author       = {Beno{\^{\i}}t Libert and
                  Jean{-}Jacques Quisquater},
  title        = {New identity based signcryption schemes from pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {23},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/023},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertQ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertQ03a,
  author       = {Beno{\^{\i}}t Libert and
                  Jean{-}Jacques Quisquater},
  title        = {Identity Based Undeniable Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {206},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/206},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertQ03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinW03,
  author       = {Chih{-}Yin Lin and
                  Tzong{-}Chen Wu},
  title        = {An identity-based ring signature scheme from bilinear pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {117},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/117},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinWZ03,
  author       = {Chih{-}Yin Lin and
                  Tzong{-}Chen Wu and
                  Fangguo Zhang},
  title        = {A Structured Multisignature Scheme from the Gap Diffie-Hellman Group},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {90},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/090},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinWZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lindell03,
  author       = {Yehuda Lindell},
  title        = {Protocols for Bounded-Concurrent Secure Two-Party Computation in the
                  Plain Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {100},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/100},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lindell03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lindell03a,
  author       = {Yehuda Lindell},
  title        = {General Composition and Universal Composability in Secure Multiparty
                  Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {141},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/141},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lindell03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lipmaa03,
  author       = {Helger Lipmaa},
  title        = {On Diophantine Complexity and Statistical Zero-Knowledge Arguments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {105},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/105},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lipmaa03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lohlein03,
  author       = {Bernhard L{\"{o}}hlein},
  title        = {Attacks based on Conditional Correlations against the Nonlinear Filter
                  Generator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {20},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/020},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lohlein03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuF03,
  author       = {Xin L{\"{u}} and
                  Dengguo Feng},
  title        = {Quantum Digital Signature Based on Quantum One-way Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {246},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/246},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuF03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LysyanskayaMRS03,
  author       = {Anna Lysyanskaya and
                  Silvio Micali and
                  Leonid Reyzin and
                  Hovav Shacham},
  title        = {Sequential Aggregate Signatures from Trapdoor Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {91},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/091},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LysyanskayaMRS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MacKenzieY03,
  author       = {Philip D. MacKenzie and
                  Ke Yang},
  title        = {On Simulation-Sound Trapdoor Commitments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {252},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/252},
  timestamp    = {Fri, 05 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/MacKenzieY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaityM03,
  author       = {Soumen Maity and
                  Subhamoy Maitra},
  title        = {Minimum Distance between Bent and 1-resilient Boolean Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {133},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/133},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaityM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Marti-FarreP03,
  author       = {Jaume Mart{\'{\i}}{-}Farr{\'{e}} and
                  Carles Padr{\'{o}}},
  title        = {Secret sharing schemes on sparse homogeneous access structures with
                  rank three},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {151},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/151},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Marti-FarreP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MartinSWW03,
  author       = {Keith M. Martin and
                  Reihaneh Safavi{-}Naini and
                  Huaxiong Wang and
                  Peter R. Wild},
  title        = {Distributing the Encryption and Decryption of a Block Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {5},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/005},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MartinSWW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Martinez-MoroMM03,
  author       = {Edgar Mart{\'{\i}}nez{-}Moro and
                  Jorge Mozo{-}Fern{\'{a}}ndez and
                  Carlos Munuera},
  title        = {Compounding Secret Sharing Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {48},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/048},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Martinez-MoroMM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaurerRH03,
  author       = {Ueli Maurer and
                  Renato Renner and
                  Clemens Holenstein},
  title        = {Indifferentiability, Impossibility Results on Reductions, and Applications
                  to the Random Oracle Methodology},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {161},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/161},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaurerRH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MenezesTW03,
  author       = {Alfred Menezes and
                  Edlyn Teske and
                  Annegret Weng},
  title        = {Weak Fields for {ECC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {128},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/128},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MenezesTW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MicaliR03,
  author       = {Silvio Micali and
                  Leonid Reyzin},
  title        = {Physically Observable Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {120},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/120},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MicaliR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MishraS03,
  author       = {Pradeep Kumar Mishra and
                  Palash Sarkar},
  title        = {Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic
                  Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {180},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/180},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MishraS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MishraS03a,
  author       = {Pradeep Kumar Mishra and
                  Palash Sarkar},
  title        = {Inversion of Several Field Elements: {A} New Parallel Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {264},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/264},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MishraS03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Naccache03,
  author       = {David Naccache},
  title        = {Double-Speed Safe Prime Generation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {175},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/175},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Naccache03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaccacheSS03,
  author       = {David Naccache and
                  Nigel P. Smart and
                  Jacques Stern},
  title        = {Projective Coordinates Leak},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {191},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/191},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaccacheSS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nalla03,
  author       = {Divya Nalla},
  title        = {ID-based tripartite key agreement with signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {144},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/144},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nalla03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NallaR03,
  author       = {Divya Nalla and
                  K. C. Reddy},
  title        = {ID-based tripartite Authenticated Key Agreement Protocols from pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {4},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/004},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NallaR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NallaR03b,
  author       = {Divya Nalla and
                  K. C. Reddy},
  title        = {Signcryption scheme for Identity-based Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {66},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/066},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NallaR03b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nandi03,
  author       = {Mridul Nandi},
  title        = {A New Tree based Domain Extension of {UOWHF}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {142},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/142},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nandi03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nandi03a,
  author       = {Mridul Nandi},
  title        = {A Sufficient Condition and Optimal Domain Extension of {UOWHF}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {158},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/158},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nandi03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NikovN03,
  author       = {Ventzislav Nikov and
                  Svetla Nikova},
  title        = {On a Relation Between Verifiable Secret Sharing Schemes and a Class
                  of Error-Correcting Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {210},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/210},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NikovN03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NikovNP03,
  author       = {Ventzislav Nikov and
                  Svetla Nikova and
                  Bart Preneel},
  title        = {Multi-Party Computation from any Linear Secret Sharing Scheme Secure
                  against Adaptive Adversary: The Zero-Error Case},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {6},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/006},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NikovNP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OkamotoK03,
  author       = {Tatsuaki Okamoto and
                  Ryo Kashima},
  title        = {Resource Bounded Unprovability of Computational Lower Bounds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {187},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/187},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OkamotoK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Paixao03,
  author       = {Cesar Alison Monteiro Paix{\~{a}}o},
  title        = {An efficient variant of the {RSA} cryptosystem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {159},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/159},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Paixao03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PelzlWGP03,
  author       = {Jan Pelzl and
                  Thomas J. Wollinger and
                  Jorge Guajardo and
                  Christof Paar},
  title        = {Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to
                  Elliptic Curves (Update)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {26},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/026},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PelzlWGP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PelzlWP03,
  author       = {Jan Pelzl and
                  Thomas J. Wollinger and
                  Christof Paar},
  title        = {Low Cost Security: Explicit Formulae for Genus 4 Hyperelliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {97},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/097},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PelzlWP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PelzlWP03a,
  author       = {Jan Pelzl and
                  Thomas J. Wollinger and
                  Christof Paar},
  title        = {High Performance Arithmetic for Hyperelliptic Curve Cryptosystems
                  of Genus Two},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {212},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/212},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PelzlWP03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PiretQ03,
  author       = {Gilles Piret and
                  Jean{-}Jacques Quisquater},
  title        = {Integral Cryptanalysis on reduced-round Safer++},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {33},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/033},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PiretQ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PogorelovP03,
  author       = {Boris Pogorelov and
                  Marina Pudovkina},
  title        = {Properties of the Transformation Semigroup of the Solitaire Stream
                  Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {169},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/169},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PogorelovP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ponomarenko03,
  author       = {Dima Grigoriev and
                  Ilia Ponomarenko},
  title        = {Homomorphic public-key cryptosystems and encrypting boolean circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {25},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/025},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ponomarenko03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Proos03,
  author       = {John Proos},
  title        = {Imperfect Decryption and an Attack on the {NTRU} Encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {2},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/002},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Proos03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Pudovkina03,
  author       = {Marina Pudovkina},
  title        = {The number of initial states of the {RC4} cipher with the same cycle
                  structure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {12},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/012},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Pudovkina03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RaimondoG03,
  author       = {Mario Di Raimondo and
                  Rosario Gennaro},
  title        = {Secure Multiplication of Shared Secrets in the Exponent},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {57},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/057},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RaimondoG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RamkumarM03,
  author       = {Mahalingam Ramkumar and
                  Nasir D. Memon},
  title        = {{HARPS:} HAshed Random Preloaded Subset Key Distribution},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {170},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/170},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RamkumarM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ReyzinR03,
  author       = {Leonid Reyzin and
                  Scott Russell},
  title        = {Simple Stateless Steganography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {93},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/093},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ReyzinR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RogawayW03,
  author       = {Phillip Rogaway and
                  David A. Wagner},
  title        = {A Critique of {CCM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {70},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/070},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RogawayW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Rogawski03,
  author       = {Marcin Rogawski},
  title        = {Analysis of Implementation Hierocrypt-3 algorithm (and its comparison
                  to Camellia algorithm) using {ALTERA} devices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {258},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/258},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Rogawski03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RostovtsevM03,
  author       = {Alexander Rostovtsev and
                  Elena Makhovenko},
  title        = {Elliptic Curve Point Multiplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {88},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/088},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RostovtsevM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RubinS03,
  author       = {Karl Rubin and
                  Alice Silverberg},
  title        = {Torus-based cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {39},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/039},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RubinS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RyabkoM03,
  author       = {B. Ya. Ryabko and
                  V. A. Monarev},
  title        = {Using Information Theory Approach to Randomness Testing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {127},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/127},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RyabkoM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SakaiK03,
  author       = {Ryuichi Sakai and
                  Masao Kasahara},
  title        = {{ID} based Cryptosystems with Pairing on Elliptic Curve},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {54},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/054},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SakaiK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Sarkar03,
  author       = {Palash Sarkar},
  title        = {Domain Extenders for {UOWHF:} {A} Finite Binary Tree Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {9},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/009},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Sarkar03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Sarkar03a,
  author       = {Palash Sarkar},
  title        = {Hiji-bij-bij: {A} New Stream Cipher with a Self-Synchronizing Mode
                  of Operation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {14},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/014},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Sarkar03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Sarkar03b,
  author       = {Palash Sarkar},
  title        = {Domain Extender for Collision Resistant Hash Functions: Improving
                  Upon Merkle-Damgaard Iteration},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {173},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/173},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Sarkar03b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Sarkar03c,
  author       = {Palash Sarkar},
  title        = {Masking Based Domain Extenders for UOWHFs: Bounds and Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {225},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/225},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Sarkar03c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Semaev03,
  author       = {Igor A. Semaev},
  title        = {A reduction of the space for the parallelized Pollard lambda search
                  on elliptic curves over prime finite fields and on anomalous binary
                  elliptic curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {166},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/166},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Semaev03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShamirT03,
  author       = {Adi Shamir and
                  Boaz Tsaban},
  title        = {Guaranteeing the diversity of number generators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {132},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/132},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShamirT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Shao03,
  author       = {Zuhua Shao},
  title        = {Cryptanalysis of publicly verifiable authenticated encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {189},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/189},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Shao03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Shim03,
  author       = {Kyungah Shim},
  title        = {Cryptanalysis of ID-based Tripartite Authenticated Key Agreement Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {115},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/115},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Shim03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Shim03a,
  author       = {Kyungah Shim},
  title        = {Cryptanalysis of Al-Riyami-Paterson's Authenticated Three Party Key
                  Agreement Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {122},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/122},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Shim03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShparlinskiW03,
  author       = {Igor E. Shparlinski and
                  Arne Winterhof},
  title        = {Hidden Number Problem in Small Subgroups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {49},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/049},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShparlinskiW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Shpilrain03,
  author       = {Vladimir Shpilrain},
  title        = {Assessing security of some group based cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {123},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/123},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Shpilrain03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SteinfeldBWP03,
  author       = {Ron Steinfeld and
                  Laurence Bull and
                  Huaxiong Wang and
                  Josef Pieprzyk},
  title        = {Universal Designated-Verifier Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {192},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/192},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SteinfeldBWP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SteinfeldWP03,
  author       = {Ron Steinfeld and
                  Huaxiong Wang and
                  Josef Pieprzyk},
  title        = {Efficient Extension of Standard Schnorr/RSA signatures into Universal
                  Designated-Verifier Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {193},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/193},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SteinfeldWP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SunH03,
  author       = {Hung{-}Min Sun and
                  Bin{-}Tsan Hsieh},
  title        = {On the Security of Some Proxy Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {68},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/068},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SunH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SunH03a,
  author       = {Hung{-}Min Sun and
                  Bin{-}Tsan Hsieh},
  title        = {Security Analysis of Shim's Authenticated Key Agreement Protocols
                  from Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {113},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/113},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SunH03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TangLL03,
  author       = {Chunming Tang and
                  Zhuojun Liu and
                  Jinwang Liu},
  title        = {The Statistical Zero-knowledge Proof for Blum Integer Based on Discrete
                  Logarithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {232},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/232},
  timestamp    = {Fri, 22 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/TangLL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TangLW03,
  author       = {Chunming Tang and
                  Zhuojun Liu and
                  Mingsheng Wang},
  title        = {A Verifiable Secret Sharing Scheme with Statistical zero-knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {222},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/222},
  timestamp    = {Fri, 22 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/TangLW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Teske03,
  author       = {Edlyn Teske},
  title        = {An Elliptic Curve Trapdoor System},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {58},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/058},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Teske03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Toli03,
  author       = {Ilia Toli},
  title        = {Hidden Polynomial Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {61},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/061},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Toli03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Trichina03,
  author       = {Elena Trichina},
  title        = {Combinational Logic Design for {AES} SubByte Transformation on Masked
                  Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {236},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/236},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Trichina03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Tsaban03,
  author       = {Boaz Tsaban},
  title        = {Bernoulli numbers and the probability of a birthday surprise},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {137},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/137},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Tsaban03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Tsaban03a,
  author       = {Boaz Tsaban},
  title        = {Permutation graphs, fast forward permutations, and},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {138},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/138},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Tsaban03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TsabanV03,
  author       = {Boaz Tsaban and
                  Uzi Vishne},
  title        = {Efficient linear feedback shift registers with maximal period},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {136},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/136},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TsabanV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TsudikX03,
  author       = {Gene Tsudik and
                  Shouhuai Xu},
  title        = {Accumulating Composites and Improved Group Signing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {112},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/112},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TsudikX03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TuylsKSSD03,
  author       = {Pim Tuyls and
                  Tom A. M. Kevenaar and
                  Geert Jan Schrijen and
                  Toine Staring and
                  Marten van Dijk},
  title        = {Visual Crypto Displays Enabling Secure Communications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {118},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/118},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TuylsKSSD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/VijayaranganAK03,
  author       = {N. Vijayarangan and
                  Nitin Agarwal and
                  S. Kasilingam},
  title        = {Goldbach's Conjecture on {ECDSA} Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {76},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/076},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/VijayaranganAK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Wagner03,
  author       = {David A. Wagner},
  title        = {A Security Evaluation of Whitenoise},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {218},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/218},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Wagner03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Walter03,
  author       = {Colin D. Walter},
  title        = {Security Constraints on the Oswald-Aigner Exponentiation Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {13},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/013},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Walter03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Wang03,
  author       = {Guilin Wang},
  title        = {Security Analysis of Several Group Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {194},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/194},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Wang03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Wang03a,
  author       = {Guilin Wang},
  title        = {On the Security of a Group Signature Scheme with Forward Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {226},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/226},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Wang03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Wang03b,
  author       = {Guilin Wang},
  title        = {An Attack on Not-interactive Designated Verifier Proofs for Undeniable
                  Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {243},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/243},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Wang03b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangBZD03,
  author       = {Guilin Wang and
                  Feng Bao and
                  Jianying Zhou and
                  Robert H. Deng},
  title        = {Security Analysis of Some Proxy Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {196},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/196},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangBZD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangQ03,
  author       = {Guilin Wang and
                  Sihan Qing},
  title        = {Security Flaws in Several Group Signatures Proposed by Popescu},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {207},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/207},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangQ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangZ03,
  author       = {Guilin Wang and
                  Bo Zhu},
  title        = {Remarks on Saeednia's Identity-based Society Oriented Signature Scheme
                  with Anonymous Signers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {46},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/046},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WatanabeS03,
  author       = {Yodai Watanabe and
                  Junji Shikata},
  title        = {Relation among simulator-based and comparison-based definitions of
                  semantic security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {78},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/078},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WatanabeS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Wiener03,
  author       = {Michael J. Wiener},
  title        = {Safe Prime Generation with a Combined Sieve},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {186},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/186},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Wiener03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WinterNI03,
  author       = {Andreas J. Winter and
                  Anderson C. A. Nascimento and
                  Hideki Imai},
  title        = {Commitment Capacity of Discrete Memoryless Channels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {165},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/165},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WinterNI03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Wolf03,
  author       = {Christopher Wolf},
  title        = {Efficient Public Key Generation for Multivariate Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {89},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/089},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Wolf03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WollingerP03,
  author       = {Thomas J. Wollinger and
                  Christof Paar},
  title        = {How Secure Are FPGAs in Cryptographic Applications?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {119},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/119},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WollingerP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Wu03,
  author       = {Hongjun Wu},
  title        = {Breaking the Stream Cipher Whitenoise},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {250},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/250},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Wu03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuF03,
  author       = {Wenling Wu and
                  Dengguo Feng},
  title        = {Collision Attack on Reduced-Round Camellia},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {135},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/135},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WuF03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangKM03,
  author       = {Bo Yang and
                  Ramesh Karri and
                  David A. McGrew},
  title        = {Divide and Concatenate: {A} Scalable Hardware Architecture for Universal
                  {MAC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {215},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/215},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/YangKM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZengH03,
  author       = {Xiangyong Zeng and
                  Lei Hu},
  title        = {A Composition Construction of Bent-Like Boolean Functions from Quadratic
                  Polynomials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {204},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/204},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZengH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Zhang03,
  author       = {Muxiang Zhang},
  title        = {Provably-Secure Enhancement on 3GPP Authentication and Key Agreement
                  Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {92},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/092},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Zhang03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangC03,
  author       = {Fangguo Zhang and
                  Xiaofeng Chen},
  title        = {Attack on Two ID-based Authenticated Group Key Agreement Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {259},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/259},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangK03,
  author       = {Fangguo Zhang and
                  Kwangjo Kim},
  title        = {Cryptanalysis of Lee-Hwang-Li's Key Authentication Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {11},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/011},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangSL03,
  author       = {Fangguo Zhang and
                  Reihaneh Safavi{-}Naini and
                  Chih{-}Yin Lin},
  title        = {New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature
                  Schemes from Bilinear Pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {104},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/104},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangSL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangSS03,
  author       = {Fangguo Zhang and
                  Reihaneh Safavi{-}Naini and
                  Willy Susilo},
  title        = {Attack on Han et al.'s ID-based Confirmer (Undeniable) Signature at
                  ACM-EC'03},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {129},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/129},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangSS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangSS03a,
  author       = {Fangguo Zhang and
                  Reihaneh Safavi{-}Naini and
                  Willy Susilo},
  title        = {ID-Based Chameleon Hashes from Bilinear Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {208},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/208},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangSS03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangXF03,
  author       = {Zhenfeng Zhang and
                  Jing Xu and
                  Dengguo Feng},
  title        = {Attack on an Identification Scheme Based on Gap Diffie-Hellman Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {153},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/153},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangXF03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Zhao03,
  author       = {Yunlei Zhao},
  title        = {Concurrent/Resettable Zero-Knowledge With Concurrent Soundness in
                  the Bare Public-Key Model and Its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {265},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/265},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Zhao03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Zhu03a,
  author       = {Huafei Zhu},
  title        = {A Practical Elliptic Curve Public Key Encryption Scheme Provably Secure
                  Against Adaptive Chosen-message Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {87},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/087},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Zhu03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Zhu03b,
  author       = {Huafei Zhu},
  title        = {A Formal Proof of Zhu's Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {155},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/155},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Zhu03b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Zhu03c,
  author       = {Huafei Zhu},
  title        = {Constructing Optimistic Fair Exchange Protocols from Committed Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {178},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/178},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Zhu03c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Zhu03d,
  author       = {Huafei Zhu},
  title        = {Verifiably Committed Signatures Provably Secure in The Standard Complexity
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {228},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/228},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Zhu03d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhuBD03,
  author       = {Huafei Zhu and
                  Feng Bao and
                  Robert H. Deng},
  title        = {Computing of Trust in Distributed Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {56},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/056},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhuBD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Zoltak03,
  author       = {Bartosz Zoltak},
  title        = {{VMPC} One-Way Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {179},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/179},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Zoltak03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Zoltak03a,
  author       = {Bartosz Zoltak},
  title        = {{VMPC} Stream Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {185},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/185},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Zoltak03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaruaDS03a,
  title        = {Extending Joux's Protocol to Multi Party Key Agreement},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {190},
  year         = {2003},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2003/190},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaruaDS03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisFW03,
  title        = {Parallel Signcryption with OAEP, PSS-R, and other Feistel Paddings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {43},
  year         = {2003},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2003/043},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisFW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GangopadhyayM03,
  title        = {Direct Sum of Non Normal and Normal Bent Functions Always Produces
                  Non Normal Bent Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {134},
  year         = {2003},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2003/134},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GangopadhyayM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LvLW03,
  title        = {Further Cryptanalysis of some Proxy Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {111},
  year         = {2003},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2003/111},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LvLW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaoM03,
  title        = {Universal Padding Schemes for {RSA} with Optimal Bandwidth of Message
                  Recovery},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {29},
  year         = {2003},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2003/029},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaoM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NallaR03a,
  title        = {Signcryption scheme for Identity-based Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {44},
  year         = {2003},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2003/044},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NallaR03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Toli03a,
  title        = {Cryptanalysis of {HFE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {101},
  year         = {2003},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2003/101},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Toli03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YaoL03,
  title        = {Forward-Secure Hierarchical ID-Based Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {149},
  year         = {2003},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2003/149},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YaoL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Zhou03,
  title        = {On the Security of a Multi-Party Certified Email Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {256},
  year         = {2003},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2003/256},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Zhou03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Zhu03,
  title        = {A Price Negotiable Transaction System},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {7},
  year         = {2003},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2003/007},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Zhu03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhuFD03,
  title        = {A Transitive Signature Scheme Provably Secure Against Adaptive Chosen-message
                  Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {59},
  year         = {2003},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2003/059},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhuFD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics