Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/iacr/iacr2007.bht:"
@article{DBLP:journals/iacr/AabidGH07, author = {M. Abdelaziz Elaabid and Sylvain Guilley and Philippe Hoogvorst}, title = {Template Attacks with a Power Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {443}, year = {2007}, url = {http://eprint.iacr.org/2007/443}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AabidGH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaKN07, author = {Michel Abdalla and Eike Kiltz and Gregory Neven}, title = {Generalized Key Delegation for Hierarchical Identity-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {221}, year = {2007}, url = {http://eprint.iacr.org/2007/221}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaKN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbeCIK07, author = {Masayuki Abe and Yang Cui and Hideki Imai and Eike Kiltz}, title = {Efficient Hybrid Encryption from ID-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {23}, year = {2007}, url = {http://eprint.iacr.org/2007/023}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbeCIK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Aciicmez07, author = {Onur Acii{\c{c}}mez}, title = {Yet Another MicroArchitectural Attack: Exploiting I-cache}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {164}, year = {2007}, url = {http://eprint.iacr.org/2007/164}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Aciicmez07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AciicmezGS07, author = {Onur Acii{\c{c}}mez and Shay Gueron and Jean{-}Pierre Seifert}, title = {New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {39}, year = {2007}, url = {http://eprint.iacr.org/2007/039}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AciicmezGS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AciicmezS07, author = {Onur Acii{\c{c}}mez and Werner Schindler}, title = {A Major Vulnerability in {RSA} Implementations due to MicroArchitectural Analysis Threat}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {336}, year = {2007}, url = {http://eprint.iacr.org/2007/336}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AciicmezS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AdidaW07, author = {Ben Adida and Douglas Wikstr{\"{o}}m}, title = {Offline/Online Mixing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {143}, year = {2007}, url = {http://eprint.iacr.org/2007/143}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AdidaW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalJ07, author = {Dakshi Agrawal and Charanjit S. Jutla}, title = {Utility Sampling for Trust Metrics in {PKI}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {178}, year = {2007}, url = {http://eprint.iacr.org/2007/178}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AimaniG07, author = {Laila El Aimani and Joachim von zur Gathen}, title = {Finding Low Weight Polynomial Multiples Using Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {423}, year = {2007}, url = {http://eprint.iacr.org/2007/423}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AimaniG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AndreevaNPS07, author = {Elena Andreeva and Gregory Neven and Bart Preneel and Thomas Shrimpton}, title = {Seven-Property-Preserving Iterated Hashing: {ROX}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {176}, year = {2007}, url = {http://eprint.iacr.org/2007/176}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AndreevaNPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AntonioTN07, author = {Christine Abegail Antonio and Satoru Tanaka and Ken Nakamula}, title = {Implementing Cryptographic Pairings over Curves of Embedding Degrees 8 and 10}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {426}, year = {2007}, url = {http://eprint.iacr.org/2007/426}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AntonioTN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AntonioTN07a, author = {Christine Abegail Antonio and Satoru Tanaka and Ken Nakamula}, title = {Comparing Implementation Efficiency of Ordinary and Squared Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {457}, year = {2007}, url = {http://eprint.iacr.org/2007/457}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AntonioTN07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AokiFKLO07, author = {Kazumaro Aoki and Jens Franke and Thorsten Kleinjung and Arjen K. Lenstra and Dag Arne Osvik}, title = {A kilobit special number field sieve factorization}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {205}, year = {2007}, url = {http://eprint.iacr.org/2007/205}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AokiFKLO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AraujoCG07, author = {Roberto Ara{\'{u}}jo and Ricardo Felipe Cust{\'{o}}dio and Jeroen van de Graaf}, title = {A Verifiable Voting Protocol based on Farnel}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {252}, year = {2007}, url = {http://eprint.iacr.org/2007/252}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AraujoCG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArnaultBLM07, author = {Fran{\c{c}}ois Arnault and Thierry P. Berger and C{\'{e}}dric Lauradoux and Marine Minier}, title = {{X-FCSR:} a new software oriented stream cipher based upon FCSRs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {380}, year = {2007}, url = {http://eprint.iacr.org/2007/380}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArnaultBLM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtallahBF07, author = {Mikhail J. Atallah and Marina Blanton and Keith B. Frikken}, title = {Incorporating Temporal Capabilities in Existing Key Management Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {245}, year = {2007}, url = {http://eprint.iacr.org/2007/245}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtallahBF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtaniAM07, author = {Reza Ebrahimi Atani and Shahabaddin Ebrahimi Atani and Sattar Mirzakuchaki}, title = {A novel public key crypto system based on semi-modules over quotient semi-rings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {391}, year = {2007}, url = {http://eprint.iacr.org/2007/391}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtaniAM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseBCHKPS07, author = {Giuseppe Ateniese and Randal C. Burns and Reza Curtmola and Joseph Herring and Lea Kissner and Zachary N. J. Peterson and Dawn Song}, title = {Provable Data Possession at Untrusted Stores}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {202}, year = {2007}, url = {http://eprint.iacr.org/2007/202}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseBCHKPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtkinsonS07, author = {Timothy Atkinson and Marius Silaghi}, title = {Guarantees for Customers of Incentive Anonymizing Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {460}, year = {2007}, url = {http://eprint.iacr.org/2007/460}, timestamp = {Wed, 26 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AtkinsonS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtzemoglouM07, author = {Philip Atzemoglou and Tal Malkin}, title = {ProSiBIR: Proactive Signer-Base Intrusion Resilient Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {200}, year = {2007}, url = {http://eprint.iacr.org/2007/200}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtzemoglouM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AuSM07, author = {Man Ho Au and Willy Susilo and Yi Mu}, title = {Practical Compact E-Cash}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {148}, year = {2007}, url = {http://eprint.iacr.org/2007/148}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AuSM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AuSM07a, author = {Man Ho Au and Willy Susilo and Yi Mu}, title = {Practical Anonymous Divisible E-Cash From Bounded Accumulators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {459}, year = {2007}, url = {http://eprint.iacr.org/2007/459}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AuSM07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AuY07, author = {Man Ho Au and Siu{-}Ming Yiu}, title = {Structural Identity-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {422}, year = {2007}, url = {http://eprint.iacr.org/2007/422}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AuY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AumannL07, author = {Yonatan Aumann and Yehuda Lindell}, title = {Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {60}, year = {2007}, url = {http://eprint.iacr.org/2007/060}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AumannL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AumassonFKMR07, author = {Jean{-}Philippe Aumasson and Simon Fischer and Shahram Khazaei and Willi Meier and Christian Rechberger}, title = {New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {472}, year = {2007}, url = {http://eprint.iacr.org/2007/472}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AumassonFKMR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Avanzi07, author = {Roberto Avanzi}, title = {Another Look at Square Roots and Traces (and Quadratic Equations) in Fields of Even Characteristic}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {103}, year = {2007}, url = {http://eprint.iacr.org/2007/103}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Avanzi07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesDK07, author = {Michael Backes and Markus D{\"{u}}rmuth and Ralf K{\"{u}}sters}, title = {On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {233}, year = {2007}, url = {http://eprint.iacr.org/2007/233}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesDK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesMU07, author = {Michael Backes and Matteo Maffei and Dominique Unruh}, title = {Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {289}, year = {2007}, url = {http://eprint.iacr.org/2007/289}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesMU07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesU07, author = {Michael Backes and Dominique Unruh}, title = {On the Security of Protocols with Logarithmic Communication Complexity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {169}, year = {2007}, url = {http://eprint.iacr.org/2007/169}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesU07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaekSZ07, author = {Joonsang Baek and Willy Susilo and Jianying Zhou}, title = {New Constructions of Fuzzy Identity-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {47}, year = {2007}, url = {http://eprint.iacr.org/2007/047}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaekSZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BambergerWSM07, author = {Walter Bamberger and Oliver Welter and Stephan Spitz and Michael Marh{\"{o}}fer}, title = {Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication (Revised)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {337}, year = {2007}, url = {http://eprint.iacr.org/2007/337}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BambergerWSM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BanaHO07, author = {Gergei Bana and Koji Hasebe and Mitsuhiro Okada}, title = {Computational Semantics for Basic Protocol Logic - {A} Stochastic Approach}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {156}, year = {2007}, url = {http://eprint.iacr.org/2007/156}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BanaHO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarakCLPR07, author = {Boaz Barak and Ran Canetti and Yehuda Lindell and Rafael Pass and Tal Rabin}, title = {Secure Computation Without Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {464}, year = {2007}, url = {http://eprint.iacr.org/2007/464}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarakCLPR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarbosaMP07, author = {Manuel Barbosa and Andrew Moss and Dan Page}, title = {Compiler Assisted Elliptic Curve Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {53}, year = {2007}, url = {http://eprint.iacr.org/2007/053}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarbosaMP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BardCJ07, author = {Gregory V. Bard and Nicolas T. Courtois and Chris Jefferson}, title = {Efficient Methods for Conversion and Solution of Sparse Systems of Low-Degree Multivariate Polynomials over {GF(2)} via SAT-Solvers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {24}, year = {2007}, url = {http://eprint.iacr.org/2007/024}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BardCJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Beerliova-TrubiniovaFHMZ07, author = {Zuzana Beerliov{\'{a}}{-}Trub{\'{\i}}niov{\'{a}} and Matthias Fitzi and Martin Hirt and Ueli Maurer and Vassilis Zikas}, title = {{MPC} vs. {SFE:} Perfect Security in a Unified Corruption Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {78}, year = {2007}, url = {http://eprint.iacr.org/2007/078}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Beerliova-TrubiniovaFHMZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BelenkiyCKL07, author = {Mira Belenkiy and Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya}, title = {Non-Interactive Anonymous Credentials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {384}, year = {2007}, url = {http://eprint.iacr.org/2007/384}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BelenkiyCKL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareBKN07, author = {Mihir Bellare and Alexandra Boldyreva and Lars R. Knudsen and Chanathip Namprempre}, title = {On-Line Ciphers and the Hash-CBC Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {197}, year = {2007}, url = {http://eprint.iacr.org/2007/197}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareBKN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareR07, author = {Mihir Bellare and Thomas Ristenpart}, title = {Hash Functions in the Dedicated-Key Setting: Design Choices and {MPP} Transforms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {271}, year = {2007}, url = {http://eprint.iacr.org/2007/271}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareS07, author = {Mihir Bellare and Sarah Shoup}, title = {Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {273}, year = {2007}, url = {http://eprint.iacr.org/2007/273}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinBLP07, author = {Daniel J. Bernstein and Peter Birkner and Tanja Lange and Christiane Peters}, title = {Optimizing double-base elliptic-curve single-scalar multiplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {414}, year = {2007}, url = {http://eprint.iacr.org/2007/414}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinBLP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinL07, author = {Daniel J. Bernstein and Tanja Lange}, title = {Faster addition and doubling on elliptic curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {286}, year = {2007}, url = {http://eprint.iacr.org/2007/286}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinL07a, author = {Daniel J. Bernstein and Tanja Lange}, title = {Inverted Edwards coordinates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {410}, year = {2007}, url = {http://eprint.iacr.org/2007/410}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinL07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinL07b, author = {Daniel J. Bernstein and Tanja Lange}, title = {Analysis and optimization of elliptic-curve single-scalar multiplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {455}, year = {2007}, url = {http://eprint.iacr.org/2007/455}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinL07b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeuchatBDO07, author = {Jean{-}Luc Beuchat and Nicolas Brisebarre and J{\'{e}}r{\'{e}}mie Detrey and Eiji Okamoto}, title = {Arithmetic Operators for Pairing-Based Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {91}, year = {2007}, url = {http://eprint.iacr.org/2007/091}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeuchatBDO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeuchatBDOST07, author = {Jean{-}Luc Beuchat and Nicolas Brisebarre and J{\'{e}}r{\'{e}}mie Detrey and Eiji Okamoto and Masaaki Shirase and Tsuyoshi Takagi}, title = {Algorithms and Arithmetic Operators for Computing the eta\({}_{\mbox{T}}\) Pairing in Characteristic Three}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {417}, year = {2007}, url = {http://eprint.iacr.org/2007/417}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeuchatBDOST07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeuchatBSTO07, author = {Jean{-}Luc Beuchat and Nicolas Brisebarre and Masaaki Shirase and Tsuyoshi Takagi and Eiji Okamoto}, title = {A Coprocessor for the Final Exponentiation of the eta\({}_{\mbox{T}}\) Pairing in Characteristic Three}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {45}, year = {2007}, url = {http://eprint.iacr.org/2007/045}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeuchatBSTO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeuchatSTO07, author = {Jean{-}Luc Beuchat and Masaaki Shirase and Tsuyoshi Takagi and Eiji Okamoto}, title = {A Refined Algorithm for the eta\({}_{\mbox{T}}\) Pairing Calculation in Characteristic Three}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {311}, year = {2007}, url = {http://eprint.iacr.org/2007/311}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeuchatSTO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BihamD07, author = {Eli Biham and Orr Dunkelman}, title = {Differential Cryptanalysis in Stream Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {218}, year = {2007}, url = {http://eprint.iacr.org/2007/218}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BihamD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BihamD07a, author = {Eli Biham and Orr Dunkelman}, title = {A Framework for Iterative Hash Functions - {HAIFA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {278}, year = {2007}, url = {http://eprint.iacr.org/2007/278}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BihamD07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BirkettD07, author = {James Birkett and Alexander W. Dent}, title = {Relations Among Notions of Plaintext Awareness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {291}, year = {2007}, url = {http://eprint.iacr.org/2007/291}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BirkettD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlackCS07, author = {John Black and Martin Cochran and Thomas Shrimpton}, title = {On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {223}, year = {2007}, url = {http://eprint.iacr.org/2007/223}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlackCS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlackburnEN07, author = {Simon R. Blackburn and Tuvi Etzion and Siaw{-}Lynn Ng}, title = {Prolific Codes with the Identifiable Parent Property}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {276}, year = {2007}, url = {http://eprint.iacr.org/2007/276}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlackburnEN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlackburnESZ07, author = {Simon R. Blackburn and Tuvi Etzion and Douglas R. Stinson and Gregory M. Zaverucha}, title = {A Bound on the Size of Separating Hash Families}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {304}, year = {2007}, url = {http://eprint.iacr.org/2007/304}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlackburnESZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Blanchet07, author = {Bruno Blanchet}, title = {Computationally Sound Mechanized Proofs of Correspondence Assertions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {128}, year = {2007}, url = {http://eprint.iacr.org/2007/128}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Blanchet07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlomerK07, author = {Johannes Bl{\"{o}}mer and Volker Krummel}, title = {Analysis of countermeasures against access driven cache attacks on {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, volume = {2007/282}, year = {2007}, url = {http://eprint.iacr.org/2007/282}, eprinttype = {IACR}, eprint = {2007/282}, timestamp = {Tue, 30 Mar 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlomerK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bogdanov07, author = {Andrey Bogdanov}, title = {Cryptanalysis of the KeeLoq block cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {55}, year = {2007}, url = {http://eprint.iacr.org/2007/055}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bogdanov07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BogdanovP07, author = {Andrey Bogdanov and Andrei Pyshkin}, title = {Algebraic Side-Channel Collision Attacks on {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {477}, year = {2007}, url = {http://eprint.iacr.org/2007/477}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BogdanovP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BohliMR07, author = {Jens{-}Matthias Bohli and J{\"{o}}rn M{\"{u}}ller{-}Quade and Stefan R{\"{o}}hrich}, title = {Bingo Voting: Secure and coercion-free voting using a trusted random number generator}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {162}, year = {2007}, url = {http://eprint.iacr.org/2007/162}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BohliMR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoldyrevaGOY07, author = {Alexandra Boldyreva and Craig Gentry and Adam O'Neill and Dae Hyun Yum}, title = {Ordered Multisignatures and Identity-Based Sequential Aggregate Signatures, with Applications to Secure Routing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {438}, year = {2007}, url = {http://eprint.iacr.org/2007/438}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoldyrevaGOY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoldyrevaK07, author = {Alexandra Boldyreva and Virendra Kumar}, title = {Provable-Security Analysis of Authenticated Encryption in Kerberos}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {234}, year = {2007}, url = {http://eprint.iacr.org/2007/234}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoldyrevaK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehGH07, author = {Dan Boneh and Craig Gentry and Michael Hamburg}, title = {Space-Efficient Identity Based Encryption Without Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {177}, year = {2007}, url = {http://eprint.iacr.org/2007/177}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehGH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehKOS07, author = {Dan Boneh and Eyal Kushilevitz and Rafail Ostrovsky and William E. Skeith III}, title = {Public Key Encryption that Allows {PIR} Queries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {73}, year = {2007}, url = {http://eprint.iacr.org/2007/073}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehKOS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BorissovLN07, author = {Yuri L. Borissov and Moon Ho Lee and Svetla Nikova}, title = {On Asymptotic Behavior of the Ratio Between the Numbers of Binary Primitive and Irreducible Polynomials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {301}, year = {2007}, url = {http://eprint.iacr.org/2007/301}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BorissovLN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BouillaguetFSZ07, author = {Charles Bouillaguet and Pierre{-}Alain Fouque and Adi Shamir and S{\'{e}}bastien Zimmer}, title = {Second Preimage Attacks on Dithered Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {395}, year = {2007}, url = {http://eprint.iacr.org/2007/395}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BouillaguetFSZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Boyen07, author = {Xavier Boyen}, title = {Mesh Signatures : How to Leak a Secret with Unwitting and Unwilling Participants}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {94}, year = {2007}, url = {http://eprint.iacr.org/2007/094}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Boyen07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrackenBMM07, author = {Carl Bracken and Eimear Byrne and Nadya Markin and Gary McGuire}, title = {Quadratic Almost Perfect Nonlinear Functions With Many Terms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {115}, year = {2007}, url = {http://eprint.iacr.org/2007/115}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrackenBMM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BraunK07, author = {Michael Braun and Anton Kargl}, title = {A Note on Signature Standards}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {357}, year = {2007}, url = {http://eprint.iacr.org/2007/357}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BraunK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrickellL07, author = {Ernie Brickell and Jiangtao Li}, title = {Enhanced Privacy {ID:} {A} Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {194}, year = {2007}, url = {http://eprint.iacr.org/2007/194}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrickellL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BringerCI07, author = {Julien Bringer and Herv{\'{e}} Chabanne and Thomas Icart}, title = {Improved Privacy of the Tree-Based Hash protocols using Physically Unclonable Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {294}, year = {2007}, url = {http://eprint.iacr.org/2007/294}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BringerCI07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Brown07, author = {Daniel R. L. Brown}, title = {Irreducibility to the One-More Evaluation Problems: More May Be Less}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {435}, year = {2007}, url = {http://eprint.iacr.org/2007/435}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Brown07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrownG07, author = {Daniel R. L. Brown and Kristian Gj{\o}steen}, title = {A Security Analysis of the {NIST} {SP} 800-90 Elliptic Curve Random Number Generator}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {48}, year = {2007}, url = {http://eprint.iacr.org/2007/048}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrownG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Budaghyan07, author = {Lilya Budaghyan}, title = {The simplest method for constructing {APN} polynomials EA-inequivalent to power functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {58}, year = {2007}, url = {http://eprint.iacr.org/2007/058}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Budaghyan07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BudaghyanC07, author = {Lilya Budaghyan and Claude Carlet}, title = {Classes of Quadratic {APN} Trinomials and Hexanomials and Related Structures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {98}, year = {2007}, url = {http://eprint.iacr.org/2007/098}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BudaghyanC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BudaghyanCL07, author = {Lilya Budaghyan and Claude Carlet and Gregor Leander}, title = {Constructing new {APN} functions from known ones}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {63}, year = {2007}, url = {http://eprint.iacr.org/2007/063}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BudaghyanCL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BuldasL07, author = {Ahto Buldas and Sven Laur}, title = {Knowledge-Binding Commitments with Applications in Time-Stamping (Full Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {71}, year = {2007}, url = {http://eprint.iacr.org/2007/071}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BuldasL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BunnO07, author = {Paul Bunn and Rafail Ostrovsky}, title = {Secure Two-Party k-Means Clustering}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {231}, year = {2007}, url = {http://eprint.iacr.org/2007/231}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BunnO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BurmesterM07, author = {Mike Burmester and Breno de Medeiros}, title = {Towards provable security for route discovery protocols in mobile ad hoc networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {324}, year = {2007}, url = {http://eprint.iacr.org/2007/324}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BurmesterM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BurmesterMM07, author = {Mike Burmester and Breno de Medeiros and Rossana Motta}, title = {Robust, Anonymous {RFID} Authentication with Constant Key-Lookup}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {402}, year = {2007}, url = {http://eprint.iacr.org/2007/402}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BurmesterMM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CamenischHP07, author = {Jan Camenisch and Susan Hohenberger and Michael {\O}stergaard Pedersen}, title = {Batch Verification of Short Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {172}, year = {2007}, url = {http://eprint.iacr.org/2007/172}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CamenischHP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Canetti07, author = {Ran Canetti}, title = {Obtaining Universally Composable Security: Towards the Bare Bones of Trust}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {475}, year = {2007}, url = {http://eprint.iacr.org/2007/475}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Canetti07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiCKLP07, author = {Ran Canetti and Ling Cheung and Dilsun Kirli Kaynar and Nancy A. Lynch and Olivier Pereira}, title = {Modeling Computational Security in Long-Lived Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {406}, year = {2007}, url = {http://eprint.iacr.org/2007/406}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiCKLP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiCLP07, author = {Ran Canetti and Ling Cheung and Nancy A. Lynch and Olivier Pereira}, title = {On the Role of Scheduling in Simulation-Based Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {102}, year = {2007}, url = {http://eprint.iacr.org/2007/102}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiCLP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiH07, author = {Ran Canetti and Susan Hohenberger}, title = {Chosen-Ciphertext Secure Proxy Re-Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {171}, year = {2007}, url = {http://eprint.iacr.org/2007/171}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Cao07, author = {Zhengjun Cao}, title = {On the Big Gap Between {\(\vert\)}p{\(\vert\)} and {\(\vert\)}q{\(\vert\)} in {DSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {320}, year = {2007}, url = {http://eprint.iacr.org/2007/320}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Cao07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Cao07a, author = {Zhengjun Cao}, title = {On the Authentication of One Popular Signcryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {372}, year = {2007}, url = {http://eprint.iacr.org/2007/372}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Cao07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Cao07b, author = {Zhengjun Cao}, title = {An Efficient Range-Bounded Commitment Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {376}, year = {2007}, url = {http://eprint.iacr.org/2007/376}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Cao07b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CaoDW07, author = {Zhenfu Cao and Xiaolei Dong and Licheng Wang}, title = {New Public Key Cryptosystems Using Polynomials over Non-commutative Rings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {9}, year = {2007}, url = {http://eprint.iacr.org/2007/009}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CaoDW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletKLL07, author = {Claude Carlet and Khoongming Khoo and Chu{-}Wee Lim and Chuan{-}Wen Loe}, title = {On an Improved Correlation Analysis of Stream Ciphers Using Muti-Output Boolean Functions and the Related Generalized Notion of Nonlinearity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {207}, year = {2007}, url = {http://eprint.iacr.org/2007/207}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletKLL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletZLH07, author = {Claude Carlet and Xiangyong Zeng and Chunlei Li and Lei Hu}, title = {Further Properties of Several Classes of Boolean Functions with Optimum Algebraic Immunity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {370}, year = {2007}, url = {http://eprint.iacr.org/2007/370}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletZLH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CastroD07a, author = {Rafael Castro and Ricardo Dahab}, title = {Efficient Certificateless Signatures Suitable for Aggregation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {454}, year = {2007}, url = {http://eprint.iacr.org/2007/454}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CastroD07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaillouxCKV07, author = {Andr{\'{e}} Chailloux and Dragos Florin Ciocan and Iordanis Kerenidis and Salil P. Vadhan}, title = {Interactive and Noninteractive Zero Knowledge are Equivalent in the Help Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {467}, year = {2007}, url = {http://eprint.iacr.org/2007/467}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaillouxCKV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaillouxK07, author = {Andr{\'{e}} Chailloux and Iordanis Kerenidis}, title = {The role of help in Classical and Quantum Zero-Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {421}, year = {2007}, url = {http://eprint.iacr.org/2007/421}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaillouxK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChakrabortyS07, author = {Debrup Chakraborty and Palash Sarkar}, title = {{HCH:} {A} New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {28}, year = {2007}, url = {http://eprint.iacr.org/2007/028}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChakrabortyS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChakrabortyS07a, author = {Debrup Chakraborty and Palash Sarkar}, title = {A General Construction of Tweakable Block Ciphers and Different Modes of Operations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {29}, year = {2007}, url = {http://eprint.iacr.org/2007/029}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChakrabortyS07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChandranGS07, author = {Nishanth Chandran and Vipul Goyal and Amit Sahai}, title = {New Constructions for {UC} Secure Computation using Tamper-proof Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {334}, year = {2007}, url = {http://eprint.iacr.org/2007/334}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChandranGS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChangNLSH07, author = {Donghoon Chang and Mridul Nandi and Jesang Lee and Jaechul Sung and Seokhie Hong}, title = {Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {416}, year = {2007}, url = {http://eprint.iacr.org/2007/416}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChangNLSH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChatterjeeS07, author = {Sanjit Chatterjee and Palash Sarkar}, title = {Constant Size Ciphertext {HIBE} in the Augmented Selective-ID Model and its Extensions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {84}, year = {2007}, url = {http://eprint.iacr.org/2007/084}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChatterjeeS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaumGRV07, author = {David Chaum and Jeroen van de Graaf and Peter Y. A. Ryan and Poorvi L. Vora}, title = {Secret Ballot Elections with Unconditional Integrity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {270}, year = {2007}, url = {http://eprint.iacr.org/2007/270}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaumGRV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenT07, author = {Liqun Chen and Qiang Tang}, title = {Bilateral Unknown Key-Share Attacks in Key Agreement Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {209}, year = {2007}, url = {http://eprint.iacr.org/2007/209}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenX07, author = {Zhixiong Chen and Guozhen Xiao}, title = {'Good' Pseudo-Random Binary Sequences from Elliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {275}, year = {2007}, url = {http://eprint.iacr.org/2007/275}, timestamp = {Mon, 07 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChenX07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CheungCKN07, author = {Ling Cheung and Joseph A. Cooley and Roger I. Khazan and Calvin C. Newport}, title = {Collusion-Resistant Group Key Management Using Attribute-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {161}, year = {2007}, url = {http://eprint.iacr.org/2007/161}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CheungCKN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CheungMP07, author = {Ling Cheung and Sayan Mitra and Olivier Pereira}, title = {Verifying Statistical Zero Knowledge with Approximate Implementations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {195}, year = {2007}, url = {http://eprint.iacr.org/2007/195}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CheungMP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CheungN07, author = {Ling Cheung and Calvin C. Newport}, title = {Provably Secure Ciphertext Policy {ABE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {183}, year = {2007}, url = {http://eprint.iacr.org/2007/183}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CheungN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChmielewskiH07, author = {Lukasz Chmielewski and Jaap{-}Henk Hoepman}, title = {Fuzzy Private Matching (Extended Abstract)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {363}, year = {2007}, url = {http://eprint.iacr.org/2007/363}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChmielewskiH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoP07, author = {Joo Yeon Cho and Josef Pieprzyk}, title = {Multiple Modular Additions and Crossword Puzzle Attack on NLSv2}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {38}, year = {2007}, url = {http://eprint.iacr.org/2007/038}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoP07a, author = {Joo Yeon Cho and Josef Pieprzyk}, title = {An Improved Distinguisher for Dragon}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {108}, year = {2007}, url = {http://eprint.iacr.org/2007/108}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoP07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoiHK07, author = {Dooho Choi and Dong{-}Guk Han and Howon Kim}, title = {Construction of Efficient and Secure Pairing Algorithm and its Application}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {296}, year = {2007}, url = {http://eprint.iacr.org/2007/296}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChoiHK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Choo07, author = {Kim{-}Kwang Raymond Choo}, title = {A Proof of Revised Yahalom Protocol in the Bellare and Rogaway {(1993)} Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {188}, year = {2007}, url = {http://eprint.iacr.org/2007/188}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Choo07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChouCC07, author = {Jue{-}Sam Chou and Yalin Chen and Chung{-}Ju Chan}, title = {Cryptanalysis of Hwang-Chang's a Time-Stamp Protocol for Digital Watermarking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {4}, year = {2007}, url = {http://eprint.iacr.org/2007/004}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChouCC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChouCC07a, author = {Jue{-}Sam Chou and Yalin Chen and Tsung{-}Heng Chen}, title = {A Novel Secure Session Key Generation using two-level architecture For Cluster-Based Ad Hoc Networks Based On ID-Based Bilinear Paring}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {180}, year = {2007}, url = {http://eprint.iacr.org/2007/180}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChouCC07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChouLC07, author = {Jue{-}Sam Chou and Guey{-}Chuen Lee and Chung{-}Ju Chan}, title = {A Novel Mutual Authentication Scheme Based on Quadratic Residues for {RFID} Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {224}, year = {2007}, url = {http://eprint.iacr.org/2007/224}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChouLC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChowC07, author = {Sherman S. M. Chow and Kim{-}Kwang Raymond Choo}, title = {Strongly-Secure Identity-based Key Agreement and Anonymous Extension}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {18}, year = {2007}, url = {http://eprint.iacr.org/2007/018}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChowC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChowY07, author = {Sherman S. M. Chow and Wun{-}She Yap}, title = {Certificateless Ring Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {236}, year = {2007}, url = {http://eprint.iacr.org/2007/236}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChowY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChuT07, author = {Cheng{-}Kang Chu and Wen{-}Guey Tzeng}, title = {Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {354}, year = {2007}, url = {http://eprint.iacr.org/2007/354}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChuT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CiocanV07, author = {Dragos Florin Ciocan and Salil P. Vadhan}, title = {Interactive and Noninteractive Zero Knowledge Coincide in the Help Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {389}, year = {2007}, url = {http://eprint.iacr.org/2007/389}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CiocanV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Cochran07, author = {Martin Cochran}, title = {Notes on the Wang et al. 2\({}^{\mbox{63}}\) {SHA-1} Differential Path}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {474}, year = {2007}, url = {http://eprint.iacr.org/2007/474}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Cochran07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Coelho07, author = {Fabien Coelho}, title = {An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol based on Merkle Trees}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {433}, year = {2007}, url = {http://eprint.iacr.org/2007/433}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Coelho07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ContiniMPSGLW07, author = {Scott Contini and Krystian Matusiewicz and Josef Pieprzyk and Ron Steinfeld and Jian Guo and San Ling and Huaxiong Wang}, title = {Cryptanalysis of {LASH}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {430}, year = {2007}, url = {http://eprint.iacr.org/2007/430}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ContiniMPSGLW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CortierKW07, author = {V{\'{e}}ronique Cortier and Ralf K{\"{u}}sters and Bogdan Warinschi}, title = {A Cryptographic Model for Branching Time Security Properties - the Case of Contract Signing Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {251}, year = {2007}, url = {http://eprint.iacr.org/2007/251}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CortierKW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CostiganS07, author = {Neil Costigan and Michael Scott}, title = {Accelerating {SSL} using the Vector processors in IBM's Cell Broadband Engine for Sony's Playstation 3}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {61}, year = {2007}, url = {http://eprint.iacr.org/2007/061}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CostiganS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Courtois07, author = {Nicolas T. Courtois}, title = {{CTC2} and Fast Algebraic Attacks on Block Ciphers Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {152}, year = {2007}, url = {http://eprint.iacr.org/2007/152}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Courtois07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CourtoisBW07, author = {Nicolas T. Courtois and Gregory V. Bard and David A. Wagner}, title = {Algebraic and Slide Attacks on KeeLoq}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {62}, year = {2007}, url = {http://eprint.iacr.org/2007/062}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CourtoisBW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Csirmaz07, author = {L{\'{a}}szl{\'{o}} Csirmaz}, title = {Secret sharing on infinite graphs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {297}, year = {2007}, url = {http://eprint.iacr.org/2007/297}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Csirmaz07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Csirmaz07a, author = {L{\'{a}}szl{\'{o}} Csirmaz}, title = {Secret sharing on the infinite ladder}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {355}, year = {2007}, url = {http://eprint.iacr.org/2007/355}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Csirmaz07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CuiFHI007, author = {Yang Cui and Eiichiro Fujisaki and Goichiro Hanaoka and Hideki Imai and Rui Zhang}, title = {Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {30}, year = {2007}, url = {http://eprint.iacr.org/2007/030}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CuiFHI007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DahmenOS07, author = {Erik Dahmen and Katsuyuki Okeya and Daniel Schepers}, title = {Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {268}, year = {2007}, url = {http://eprint.iacr.org/2007/268}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DahmenOS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaiK07, author = {Wei Dai and Ted Krovetz}, title = {{VHASH} Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {338}, year = {2007}, url = {http://eprint.iacr.org/2007/338}, timestamp = {Wed, 15 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DaiK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardFRSS07, author = {Ivan Damg{\aa}rd and Serge Fehr and Renato Renner and Louis Salvail and Christian Schaffner}, title = {A Tight High-Order Entropic Quantum Uncertainty Relation With Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {328}, year = {2007}, url = {http://eprint.iacr.org/2007/328}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardFRSS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardFSS07, author = {Ivan Damg{\aa}rd and Serge Fehr and Louis Salvail and Christian Schaffner}, title = {Secure Identification and {QKD} in the Bounded-Quantum-Storage Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {327}, year = {2007}, url = {http://eprint.iacr.org/2007/327}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardFSS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardNW07, author = {Ivan Damg{\aa}rd and Jesper Buus Nielsen and Daniel Wichs}, title = {Isolated Proofs of Knowledge and Isolated Zero Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {331}, year = {2007}, url = {http://eprint.iacr.org/2007/331}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardNW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardNW07a, author = {Ivan Damg{\aa}rd and Jesper Buus Nielsen and Daniel Wichs}, title = {Universally Composable Multiparty Computation with Partially Isolated Parties}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {332}, year = {2007}, url = {http://eprint.iacr.org/2007/332}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardNW07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardT07, author = {Ivan Damg{\aa}rd and Rune Thorbek}, title = {Non-Interactive Proofs for Integer Multiplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {86}, year = {2007}, url = {http://eprint.iacr.org/2007/086}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DavidaH07, author = {George I. Davida and Jeremy A. Hansen}, title = {A Four-Component Framework for Designing and Analyzing Cryptographic Hash Algorithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {240}, year = {2007}, url = {http://eprint.iacr.org/2007/240}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DavidaH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DazaHMR07, author = {Vanesa Daza and Javier Herranz and Paz Morillo and Carla R{\`{a}}fols}, title = {CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {127}, year = {2007}, url = {http://eprint.iacr.org/2007/127}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DazaHMR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DedicHR07, author = {Nenad Dedic and Danny Harnik and Leonid Reyzin}, title = {Saving Private Randomness in One-Way Functions and Pseudorandom Generators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {458}, year = {2007}, url = {http://eprint.iacr.org/2007/458}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DedicHR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DegabrieleP07, author = {Jean Paul Degabriele and Kenneth G. Paterson}, title = {Attacking the IPsec Standards in Encryption-only Configurations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {125}, year = {2007}, url = {http://eprint.iacr.org/2007/125}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DegabrieleP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DemirkiranN07, author = {Cevahir Demirkiran and Enric Nart}, title = {Counting hyperelliptic curves that admit a Koblitz model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {174}, year = {2007}, url = {http://eprint.iacr.org/2007/174}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DemirkiranN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DentLP07, author = {Alexander W. Dent and Beno{\^{\i}}t Libert and Kenneth G. Paterson}, title = {Certificateless Encryption Schemes Strongly Secure in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {121}, year = {2007}, url = {http://eprint.iacr.org/2007/121}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DentLP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DevegiliSD07, author = {Augusto Jun Devegili and Michael Scott and Ricardo Dahab}, title = {Implementing Cryptographic Pairings over Barreto-Naehrig Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {390}, year = {2007}, url = {http://eprint.iacr.org/2007/390}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DevegiliSD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DingL07, author = {Jintai Ding and Richard Lindner}, title = {Identifying Ideal Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {322}, year = {2007}, url = {http://eprint.iacr.org/2007/322}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DingL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DingW07, author = {Jintai Ding and John Wagner}, title = {Cryptanalysis of Rational Multivariate Public Key Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {367}, year = {2007}, url = {http://eprint.iacr.org/2007/367}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DingW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DingY07, author = {Jintai Ding and Bo{-}Yin Yang}, title = {Multivariates Polynomials for Hashing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {137}, year = {2007}, url = {http://eprint.iacr.org/2007/137}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DingY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DingYCCD07, author = {Jintai Ding and Bo{-}Yin Yang and Chen{-}Mou Cheng and Chia{-}Hsin Owen Chen and Vivien Dubois}, title = {Breaking the Symmetry: a Way to Resist the New Differential Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {366}, year = {2007}, url = {http://eprint.iacr.org/2007/366}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DingYCCD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisLY07, author = {Yevgeniy Dodis and Pil Joong Lee and Dae Hyun Yum}, title = {Optimistic Fair Exchange in a Multi-user Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {182}, year = {2007}, url = {http://eprint.iacr.org/2007/182}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisLY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DorrendorfGP07, author = {Leo Dorrendorf and Zvi Gutterman and Benny Pinkas}, title = {Cryptanalysis of the Random Number Generator of the Windows Operating System}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {419}, year = {2007}, url = {http://eprint.iacr.org/2007/419}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DorrendorfGP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuW07, author = {Hongzhen Du and Qiaoyan Wen}, title = {Efficient and Provably-Secure Certificateless Short Signature Scheme from Bilinear Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {250}, year = {2007}, url = {http://eprint.iacr.org/2007/250}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuboisFSS07, author = {Vivien Dubois and Pierre{-}Alain Fouque and Adi Shamir and Jacques Stern}, title = {Practical Cryptanalysis of {SFLASH}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {141}, year = {2007}, url = {http://eprint.iacr.org/2007/141}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuboisFSS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DziembowskiP07, author = {Stefan Dziembowski and Krzysztof Pietrzak}, title = {Intrusion-Resilient Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {359}, year = {2007}, url = {http://eprint.iacr.org/2007/359}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DziembowskiP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/El-FotouhD07, author = {Mohamed Abo El{-}Fotouh and Klaus Diepold}, title = {Statistical Testing for Disk Encryption Modes of Operations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {362}, year = {2007}, url = {http://eprint.iacr.org/2007/362}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/El-FotouhD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ellison07, author = {Carl M. Ellison}, title = {Ceremony Design and Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {399}, year = {2007}, url = {http://eprint.iacr.org/2007/399}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ellison07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EvdokimovG07, author = {Sergei Evdokimov and Oliver G{\"{u}}nther}, title = {Encryption Techniques for Secure Database Outsourcing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {335}, year = {2007}, url = {http://eprint.iacr.org/2007/335}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EvdokimovG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FanSGL07, author = {Haining Fan and Jiaguang Sun and Ming Gu and Kwok{-}Yan Lam}, title = {Overlap-free Karatsuba-Ofman Polynomial Multiplication Algorithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {393}, year = {2007}, url = {http://eprint.iacr.org/2007/393}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FanSGL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FehrS07, author = {Serge Fehr and Christian Schaffner}, title = {Randomness Extraction via Delta-Biased Masking in the Presence of a Quantum Attacker}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {249}, year = {2007}, url = {http://eprint.iacr.org/2007/249}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FehrS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FengW07, author = {Rongquan Feng and Hongfeng Wu}, title = {Efficient Pairing Computation on Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {138}, year = {2007}, url = {http://eprint.iacr.org/2007/138}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FengW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FouqueLN07, author = {Pierre{-}Alain Fouque and Ga{\"{e}}tan Leurent and Phong Q. Nguyen}, title = {Automatic Search of Differential Path in {MD4}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {206}, year = {2007}, url = {http://eprint.iacr.org/2007/206}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FouqueLN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FranklinGM07, author = {Matthew K. Franklin and Mark A. Gondree and Payman Mohassel}, title = {Multi-Party Indirect Indexing and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {341}, year = {2007}, url = {http://eprint.iacr.org/2007/341}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FranklinGM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Freeman07, author = {David Freeman}, title = {Constructing pairing-friendly genus 2 curves over prime fields with ordinary Jacobians}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {57}, year = {2007}, url = {http://eprint.iacr.org/2007/057}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Freeman07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FreemanL07, author = {David Freeman and Kristin E. Lauter}, title = {Computing endomorphism rings of Jacobians of genus 2 curves over finite fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {10}, year = {2007}, url = {http://eprint.iacr.org/2007/010}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FreemanL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithHV07, author = {Steven D. Galbraith and Florian Hess and Frederik Vercauteren}, title = {Aspects of Pairing Inversion}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {256}, year = {2007}, url = {http://eprint.iacr.org/2007/256}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithHV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaoWWL07, author = {Wei Gao and Xueli Wang and Guilin Wang and Fei Li}, title = {One-Round ID-Based Blind Signature Scheme without {ROS} Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {7}, year = {2007}, url = {http://eprint.iacr.org/2007/007}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaoWWL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarayO07, author = {Juan A. Garay and Rafail Ostrovsky}, title = {Almost-everywhere Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {394}, year = {2007}, url = {http://eprint.iacr.org/2007/394}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarayO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GauravaramK07, author = {Praveen Gauravaram and John Kelsey}, title = {Cryptanalysis of a class of cryptographic hash functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {277}, year = {2007}, url = {http://eprint.iacr.org/2007/277}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GauravaramK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaziS07, author = {Peter Gazi and Martin Stanek}, title = {On Ciphertext Undetectability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {388}, year = {2007}, url = {http://eprint.iacr.org/2007/388}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaziS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GeiselmannS07, author = {Willi Geiselmann and Rainer Steinwandt}, title = {Cryptanalysis of a Hash Function Proposed at {ICISC} 2006}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {272}, year = {2007}, url = {http://eprint.iacr.org/2007/272}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GeiselmannS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gennaro07, author = {Rosario Gennaro}, title = {Faster and Shorter Password-Authenticated Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {325}, year = {2007}, url = {http://eprint.iacr.org/2007/325}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gennaro07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryPV07, author = {Craig Gentry and Chris Peikert and Vinod Vaikuntanathan}, title = {Trapdoors for Hard Lattices and New Cryptographic Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {432}, year = {2007}, url = {http://eprint.iacr.org/2007/432}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryPV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GeronW07, author = {Erel Geron and Avishai Wool}, title = {{CRUST:} Cryptographic Remote Untrusted Storage without Public Keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {267}, year = {2007}, url = {http://eprint.iacr.org/2007/267}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GeronW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GierlichsBT07, author = {Benedikt Gierlichs and Lejla Batina and Pim Tuyls}, title = {Mutual Information Analysis - {A} Universal Differential Side-Channel Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {198}, year = {2007}, url = {http://eprint.iacr.org/2007/198}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GierlichsBT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GittinsL07, author = {Benjamin Gittins and Howard A. Landman}, title = {Rebuttal of overtaking {VEST}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {124}, year = {2007}, url = {http://eprint.iacr.org/2007/124}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GittinsL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gligoroski07, author = {Danilo Gligoroski}, title = {On the insecurity of interchanged use of {OFB} and {CBC} modes of operation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {385}, year = {2007}, url = {http://eprint.iacr.org/2007/385}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gligoroski07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GligoroskiK07, author = {Danilo Gligoroski and Svein Johan Knapskog}, title = {Edon-R(256, 384, 512) - an Efficient Implementation of Edon-R\} Family of Cryptographic Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {154}, year = {2007}, url = {http://eprint.iacr.org/2007/154}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GligoroskiK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GligoroskiK07a, author = {Danilo Gligoroski and Svein Johan Knapskog}, title = {Turbo {SHA-2}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {403}, year = {2007}, url = {http://eprint.iacr.org/2007/403}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GligoroskiK07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldenbergHLSS07, author = {David Goldenberg and Susan Hohenberger and Moses D. Liskov and Elizabeth Crump Schwartz and Hakan Seyalioglu}, title = {On Tweaking Luby-Rackoff Blockciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {350}, year = {2007}, url = {http://eprint.iacr.org/2007/350}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoldenbergHLSS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GomezGI07, author = {Domingo G{\'{o}}mez and Jaime Gutierrez and {\'{A}}lvar Ibeas}, title = {An Algorithm for Finding Small Roots of Multivariate Polynomials over the Integers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {88}, year = {2007}, url = {http://eprint.iacr.org/2007/088}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GomezGI07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GongLC07, author = {Zheng Gong and Xuejia Lai and Kefei Chen}, title = {A Synthetic Indifferentiability Analysis of Some Block-Cipher-Based Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {465}, year = {2007}, url = {http://eprint.iacr.org/2007/465}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GongLC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GosperS07, author = {R. Wm. Gosper and Rich Schroeppel}, title = {Somos Sequence Near-Addition Formulas and Modular Theta Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {96}, year = {2007}, url = {http://eprint.iacr.org/2007/096}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GosperS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoubinMQ07, author = {Louis Goubin and Jean{-}Michel Masereel and Micha{\"{e}}l Quisquater}, title = {Cryptanalysis of white box {DES} implementations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {35}, year = {2007}, url = {http://eprint.iacr.org/2007/035}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoubinMQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Goyal07, author = {Vipul Goyal}, title = {Reducing Trust in the {PKG} in Identity Based Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {368}, year = {2007}, url = {http://eprint.iacr.org/2007/368}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Goyal07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalK07, author = {Vipul Goyal and Jonathan Katz}, title = {Universally Composable Multi-Party Computation with an Unreliable Common Reference String}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {369}, year = {2007}, url = {http://eprint.iacr.org/2007/369}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Graaf07, author = {Jeroen van de Graaf}, title = {Voting with Unconditional Privacy by Merging Pr{\^{e}}t-{\`{a}}-Voter and PunchScan}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {269}, year = {2007}, url = {http://eprint.iacr.org/2007/269}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Graaf07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GreenH07, author = {Matthew Green and Susan Hohenberger}, title = {Blind Identity-Based Encryption and Simulatable Oblivious Transfer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {235}, year = {2007}, url = {http://eprint.iacr.org/2007/235}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GreenH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Grnauer07, author = {Gerold Grnauer}, title = {Proposal of a new efficient public key system for encryption and digital signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {445}, year = {2007}, url = {http://eprint.iacr.org/2007/445}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Grnauer07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GroszschaedlST07, author = {Johann Gro{\ss}sch{\"{a}}dl and Alexander Szekely and Stefan Tillich}, title = {The Energy Cost of Cryptographic Key Establishment in Wireless Sensor Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {3}, year = {2007}, url = {http://eprint.iacr.org/2007/003}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GroszschaedlST07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Groth07, author = {Jens Groth}, title = {Fully Anonymous Group Signatures without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {186}, year = {2007}, url = {http://eprint.iacr.org/2007/186}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Groth07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrothS07, author = {Jens Groth and Amit Sahai}, title = {Efficient Non-interactive Proof Systems for Bilinear Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {155}, year = {2007}, url = {http://eprint.iacr.org/2007/155}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrothS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GutierrezI07, author = {Jaime Gutierrez and {\'{A}}lvar Ibeas}, title = {Inferring sequences produced by a linear congruential generator on elliptic curves missing high-order bits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {99}, year = {2007}, url = {http://eprint.iacr.org/2007/099}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GutierrezI07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Haber07, author = {Stuart Haber}, title = {Long-lived digital integrity using short-lived hash functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {238}, year = {2007}, url = {http://eprint.iacr.org/2007/238}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Haber07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaitnerHRS07, author = {Iftach Haitner and Jonathan J. Hoch and Omer Reingold and Gil Segev}, title = {Finding Collisions in Interactive Protocols - {A} Tight Lower Bound on the Round Complexity of Statistically-Hiding Commitments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {145}, year = {2007}, url = {http://eprint.iacr.org/2007/145}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaitnerHRS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaitnerHS07, author = {Iftach Haitner and Jonathan J. Hoch and Gil Segev}, title = {A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {351}, year = {2007}, url = {http://eprint.iacr.org/2007/351}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaitnerHS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Halevi07, author = {Shai Halevi}, title = {Invertible Universal Hashing and the {TET} Encryption Mode}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {14}, year = {2007}, url = {http://eprint.iacr.org/2007/014}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Halevi07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleviK07, author = {Shai Halevi and Yael Tauman Kalai}, title = {Smooth Projective Hashing and Two-Message Oblivious Transfer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {118}, year = {2007}, url = {http://eprint.iacr.org/2007/118}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleviK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleviK07a, author = {Shai Halevi and Hugo Krawczyk}, title = {Security under Key-Dependent Inputs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {315}, year = {2007}, url = {http://eprint.iacr.org/2007/315}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleviK07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HanZC07, author = {Wei Han and Dong Zheng and Kefei Chen}, title = {Filling the Gap between Voters and Cryptography in e-Voting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {266}, year = {2007}, url = {http://eprint.iacr.org/2007/266}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HanZC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HawkesMPRV07, author = {Philip Hawkes and Cameron McDonald and Michael Paddon and Gregory G. Rose and Miriam Wiggers de Vries}, title = {Design and Primitive Specification for Shannon}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {44}, year = {2007}, url = {http://eprint.iacr.org/2007/044}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HawkesMPRV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HemenwayO07, author = {Brett Hemenway and Rafail Ostrovsky}, title = {Public Key Encryption Which is Simultaneously a Locally-Decodable Error-Correcting Code}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {83}, year = {2007}, url = {http://eprint.iacr.org/2007/083}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HemenwayO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HenrySS07, author = {Kevin J. Henry and Douglas R. Stinson and Jiayuan Sui}, title = {The Effectiveness of Receipt-Based Attacks on ThreeBallot}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {287}, year = {2007}, url = {http://eprint.iacr.org/2007/287}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HenrySS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HerrmannM07, author = {Mathias Herrmann and Alexander May}, title = {On Factoring Arbitrary Integers with Known Bits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {374}, year = {2007}, url = {http://eprint.iacr.org/2007/374}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HerrmannM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HerzbergY07, author = {Amir Herzberg and Igal Yoffe}, title = {The Delivery and Evidences Layer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {139}, year = {2007}, url = {http://eprint.iacr.org/2007/139}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HerzbergY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hirshman07, author = {Gregory Hirshman}, title = {Further Musings on the Wang et al. {MD5} Collision: Improvements and Corrections on the Work of Hawkes, Paddon, and Rose}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {375}, year = {2007}, url = {http://eprint.iacr.org/2007/375}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hirshman07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HisilWCD07, author = {H{\"{u}}seyin Hisil and Kenneth Koon{-}Ho Wong and Gary Carter and Ed Dawson}, title = {Faster Group Operations on Elliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {441}, year = {2007}, url = {http://eprint.iacr.org/2007/441}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HisilWCD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hitt07, author = {Laura Hitt}, title = {Families of genus 2 curves with small embedding degree}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1}, year = {2007}, url = {http://eprint.iacr.org/2007/001}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hitt07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hitt07a, author = {Laura Hitt}, title = {Updated standards for validating elliptic curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {343}, year = {2007}, url = {http://eprint.iacr.org/2007/343}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hitt07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HlavacR07, author = {Martin Hlav{\'{a}}c and Tom{\'{a}}s Rosa}, title = {A Note on the Relay Attacks on e-passports: The Case of Czech e-passports}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {244}, year = {2007}, url = {http://eprint.iacr.org/2007/244}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HlavacR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HofheinzK07, author = {Dennis Hofheinz and Eike Kiltz}, title = {Secure Hybrid Encryption from Weakened Key Encapsulation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {288}, year = {2007}, url = {http://eprint.iacr.org/2007/288}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HofheinzK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HofheinzU07, author = {Dennis Hofheinz and Dominique Unruh}, title = {Towards Key-Dependent Message Security in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {333}, year = {2007}, url = {http://eprint.iacr.org/2007/333}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HofheinzU07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HongCSLHLMC07, author = {Deukjo Hong and Donghoon Chang and Jaechul Sung and Sangjin Lee and Seokhie Hong and Jesang Lee and Dukjae Moon and Sungtaek Chee}, title = {New {FORK-256}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {185}, year = {2007}, url = {http://eprint.iacr.org/2007/185}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HongCSLHLMC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Howgrave-Graham07, author = {Nicholas A. Howgrave{-}Graham}, title = {Isodual Reduction of Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {105}, year = {2007}, url = {http://eprint.iacr.org/2007/105}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Howgrave-Graham07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuWHYD07, author = {Bessie C. Hu and Duncan S. Wong and Qiong Huang and Guomin Yang and Xiaotie Deng}, title = {Time Capsule Signature: Efficient and Provably Secure Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {146}, year = {2007}, url = {http://eprint.iacr.org/2007/146}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuWHYD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuangGKE07, author = {Miaoqing Huang and Kris Gaj and Soonhak Kwon and Tarek A. El{-}Ghazawi}, title = {An Optimized Hardware Architecture of Montgomery Multiplication Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {228}, year = {2007}, url = {http://eprint.iacr.org/2007/228}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuangGKE07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuangW07, author = {Qiong Huang and Duncan S. Wong}, title = {Generic Certificateless Encryption in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {95}, year = {2007}, url = {http://eprint.iacr.org/2007/095}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HuangW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HwangLC07, author = {Yong Ho Hwang and Joseph K. Liu and Sherman S. M. Chow}, title = {Certificateless Public Key Encryption Secure against Malicious {KGC} Attacks in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {262}, year = {2007}, url = {http://eprint.iacr.org/2007/262}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HwangLC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IzuKKS07, author = {Tetsuya Izu and Jun Kogure and Takeshi Koshiba and Takeshi Shimoyama}, title = {Low-Density Attack Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {66}, year = {2007}, url = {http://eprint.iacr.org/2007/066}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IzuKKS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JhaKSVC07, author = {Somesh Jha and Stefan Katzenbeisser and Christian Schallhart and Helmut Veith and Stephen Chenney}, title = {Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {56}, year = {2007}, url = {http://eprint.iacr.org/2007/056}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JhaKSVC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JhoKHL07, author = {Nam{-}Su Jho and Myung{-}Hwan Kim and Dowon Hong and Byung{-}Gil Lee}, title = {Multiparty Key Agreement Using Bilinear Map}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {439}, year = {2007}, url = {http://eprint.iacr.org/2007/439}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JhoKHL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Jiang07, author = {Shaoquan Jiang}, title = {Deniable Authentication on the Internet}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {82}, year = {2007}, url = {http://eprint.iacr.org/2007/082}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Jiang07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JiangDH07, author = {Xin Jiang and Jintai Ding and Lei Hu}, title = {Kipnis-Shamir's Attack on {HFE} Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {203}, year = {2007}, url = {http://eprint.iacr.org/2007/203}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JiangDH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JouxNT07, author = {Antoine Joux and David Naccache and Emmanuel Thom{\'{e}}}, title = {When e-th Roots Become Easier Than Factoring}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {424}, year = {2007}, url = {http://eprint.iacr.org/2007/424}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JouxNT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KachisaSS07, author = {Ezekiel J. Kachisa and Edward F. Schaefer and Michael Scott}, title = {Constructing Brezing-Weng pairing friendly elliptic curves using elements in the cyclotomic field}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {452}, year = {2007}, url = {http://eprint.iacr.org/2007/452}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KachisaSS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kaiser07, author = {Ulrich Kaiser}, title = {{UICE:} {A} High-Performance Cryptographic Module for SoC and {RFID} Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {258}, year = {2007}, url = {http://eprint.iacr.org/2007/258}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kaiser07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kan07, author = {Wilson Kan}, title = {Analysis of Underlying Assumptions in {NIST} DRBGs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {345}, year = {2007}, url = {http://eprint.iacr.org/2007/345}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kan07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kang07, author = {Woo Sug Kang}, title = {Construction of Pairing-Friendly Elliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {110}, year = {2007}, url = {http://eprint.iacr.org/2007/110}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kang07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kara07, author = {Orhun Kara}, title = {Reflection Attacks on Product Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {43}, year = {2007}, url = {http://eprint.iacr.org/2007/043}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kara07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KarabinaT07, author = {Koray Karabina and Edlyn Teske}, title = {On prime-order elliptic curves with embedding degrees k=3, 4 and 6}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {425}, year = {2007}, url = {http://eprint.iacr.org/2007/425}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KarabinaT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kasahara07, author = {Masao Kasahara}, title = {A generalization of Secret Sharing Scheme on the Basis of Recovering Algorithm, {K-RA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {106}, year = {2007}, url = {http://eprint.iacr.org/2007/106}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kasahara07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Katz07, author = {Jonathan Katz}, title = {Which Languages Have 4-Round Zero-Knowledge Proofs?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {265}, year = {2007}, url = {http://eprint.iacr.org/2007/265}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Katz07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KatzKK07, author = {Jonathan Katz and Chiu{-}Yuen Koo and Ranjit Kumaresan}, title = {Improving the Round Complexity of {VSS} in Point-to-Point Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {358}, year = {2007}, url = {http://eprint.iacr.org/2007/358}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KatzKK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KatzSW07, author = {Jonathan Katz and Amit Sahai and Brent Waters}, title = {Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {404}, year = {2007}, url = {http://eprint.iacr.org/2007/404}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KatzSW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KavutY07, author = {Sel{\c{c}}uk Kavut and Melek Diker Y{\"{u}}cel}, title = {Generalized Rotation Symmetric and Dihedral Symmetric Boolean Functions - 9 variable Boolean Functions with Nonlinearity 242}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {308}, year = {2007}, url = {http://eprint.iacr.org/2007/308}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KavutY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KavutY07a, author = {Sel{\c{c}}uk Kavut and Melek Diker Y{\"{u}}cel}, title = {Balanced Boolean Functions with Nonlinearity {\textgreater} 2\({}^{\mbox{n-1}}\) - 2\({}^{\mbox{(n-1)/2}}\)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {321}, year = {2007}, url = {http://eprint.iacr.org/2007/321}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KavutY07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Khader07, author = {Dalia Khader}, title = {Attribute Based Group Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {159}, year = {2007}, url = {http://eprint.iacr.org/2007/159}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Khader07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Khader07a, author = {Dalia Khader}, title = {Attribute Based Group Signature with Revocation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {241}, year = {2007}, url = {http://eprint.iacr.org/2007/241}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Khader07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Khalyavin07, author = {Andrey Khalyavin}, title = {The constructing of 3-resilient Boolean functions of 9 variables with nonlinearity 240}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {212}, year = {2007}, url = {http://eprint.iacr.org/2007/212}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Khalyavin07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhooCGL07, author = {Khoongming Khoo and Guanhan Chew and Guang Gong and Hian{-}Kiat Lee}, title = {Time-Memory-Data Trade-off Attack on Stream Ciphers based on Maiorana-McFarland Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {242}, year = {2007}, url = {http://eprint.iacr.org/2007/242}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhooCGL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasTY07, author = {Aggelos Kiayias and Yiannis Tsiounis and Moti Yung}, title = {Group Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {15}, year = {2007}, url = {http://eprint.iacr.org/2007/015}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasTY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasY07, author = {Aggelos Kiayias and Moti Yung}, title = {Cryptographic Hardness based on the Decoding of Reed-Solomon Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {153}, year = {2007}, url = {http://eprint.iacr.org/2007/153}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasZ07, author = {Aggelos Kiayias and Hong{-}Sheng Zhou}, title = {Equivocal Blind Signatures and Adaptive UC-Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {132}, year = {2007}, url = {http://eprint.iacr.org/2007/132}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasZ07a, author = {Aggelos Kiayias and Hong{-}Sheng Zhou}, title = {Hidden Identity-Based Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {140}, year = {2007}, url = {http://eprint.iacr.org/2007/140}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasZ07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KidronL07, author = {Dafna Kidron and Yehuda Lindell}, title = {Impossibility Results for Universal Composability in Public-Key Models and with Fixed Inputs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {478}, year = {2007}, url = {http://eprint.iacr.org/2007/478}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KidronL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kiltz07, author = {Eike Kiltz}, title = {From Selective-ID to Full Security: The Case of the Inversion-Based Boneh-Boyen {IBE} Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {33}, year = {2007}, url = {http://eprint.iacr.org/2007/033}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kiltz07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kiltz07a, author = {Eike Kiltz}, title = {Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {36}, year = {2007}, url = {http://eprint.iacr.org/2007/036}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kiltz07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kim07, author = {Kwang Ho Kim}, title = {A Note on Point Multiplication on Supersingular Elliptic Curves over Ternary Fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {310}, year = {2007}, url = {http://eprint.iacr.org/2007/310}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kim07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimK07, author = {Kwang Ho Kim and So In Kim}, title = {A New Method for Speeding Up Arithmetic on Elliptic Curves over Binary Fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {181}, year = {2007}, url = {http://eprint.iacr.org/2007/181}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimKC07, author = {Kwang Ho Kim and So In Kim and Ju Song Choe}, title = {New Fast Algorithms for Arithmetic on Elliptic Curves over Fields of Characteristic Three}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {179}, year = {2007}, url = {http://eprint.iacr.org/2007/179}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimKC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Klima07, author = {Vlastimil Kl{\'{\i}}ma}, title = {Special block cipher family {DN} and new generation SNMAC-type hash function family {HDN}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {50}, year = {2007}, url = {http://eprint.iacr.org/2007/050}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Klima07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KlonowskiKRR07, author = {Marek Klonowski and Miroslaw Kutylowski and Michal Ren and Katarzyna Rybarczyk}, title = {Forward-secure Key Evolution in Wireless Sensor Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {237}, year = {2007}, url = {http://eprint.iacr.org/2007/237}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KlonowskiKRR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KoLT07, author = {Ki Hyoung Ko and Jang{-}Won Lee and Tony Thomas}, title = {Towards Generating Secure Keys for Braid Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {149}, year = {2007}, url = {http://eprint.iacr.org/2007/149}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KoLT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KobaraMO07, author = {Kazukuni Kobara and Kirill Morozov and Raphael Overbeck}, title = {Oblivious Transfer via McEliece's {PKC} and Permuted Kernels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {382}, year = {2007}, url = {http://eprint.iacr.org/2007/382}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KobaraMO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Koblitz07, author = {Neal Koblitz}, title = {Another Look at Automated Theorem-Proving}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {401}, year = {2007}, url = {http://eprint.iacr.org/2007/401}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Koblitz07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KoblitzM07, author = {Neal Koblitz and Alfred Menezes}, title = {Another Look at Non-Standard Discrete Log and Diffie-Hellman Problems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {442}, year = {2007}, url = {http://eprint.iacr.org/2007/442}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KoblitzM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kocar07, author = {Osman Kocar}, title = {Estimation of keys stored in {CMOS} cryptographic device after baking by using the charge shift}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {134}, year = {2007}, url = {http://eprint.iacr.org/2007/134}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kocar07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KolokotronisLK07, author = {Nicholas Kolokotronis and Konstantinos Limniotis and Nicholas Kalouptsidis}, title = {Best Quadratic Approximations of Cubic Boolean Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {37}, year = {2007}, url = {http://eprint.iacr.org/2007/037}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KolokotronisLK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KuhlmanMBET07, author = {Doug Kuhlman and Ryan Moriarty and Tony Braskich and Steve Emeott and Mahesh V. Tripunitara}, title = {A Proof of Security of a Mesh Security Architecture}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {364}, year = {2007}, url = {http://eprint.iacr.org/2007/364}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KuhlmanMBET07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kumar07, author = {Manoj Kumar}, title = {A Forward Secure Remote User Authentication Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {303}, year = {2007}, url = {http://eprint.iacr.org/2007/303}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kumar07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KurosawaK07, author = {Kaoru Kurosawa and Takeshi Koshiba}, title = {Direct Reduction of String (1, 2)-OT to Rabin's {OT}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {46}, year = {2007}, url = {http://eprint.iacr.org/2007/046}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KurosawaK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KurosawaKK07, author = {Kaoru Kurosawa and Wataru Kishimoto and Takeshi Koshiba}, title = {How to Derive Lower Bound on Oblivious Transfer Reduction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {65}, year = {2007}, url = {http://eprint.iacr.org/2007/065}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KurosawaKK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KurosawaS07, author = {Kaoru Kurosawa and Kazuhiro Suzuki}, title = {Almost Secure (1-Round, n-Channel) Message Transmission Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {76}, year = {2007}, url = {http://eprint.iacr.org/2007/076}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KurosawaS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KuwakadoM07, author = {Hidenori Kuwakado and Masakatu Morii}, title = {Compression Functions Suitable for the Multi-Property-Preserving Transform}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {302}, year = {2007}, url = {http://eprint.iacr.org/2007/302}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KuwakadoM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LalG07, author = {Sunder Lal and K. K. Goyal}, title = {An Improved Remote User Authentication Scheme using Bilinear Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {440}, year = {2007}, url = {http://eprint.iacr.org/2007/440}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LalG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LalS07, author = {Sunder Lal and Priyam Sharma}, title = {Security Proof for Shengbao Wang's Identity-Based Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {316}, year = {2007}, url = {http://eprint.iacr.org/2007/316}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LalS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LalS07a, author = {Sunder Lal and Priyam Sharma}, title = {Remarks on {IBE} Scheme of Wang and Cao}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {400}, year = {2007}, url = {http://eprint.iacr.org/2007/400}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LalS07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LalV07, author = {Sunder Lal and Vandani Verma}, title = {Some Identity Based Strong Bi-Designated Verifier Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {193}, year = {2007}, url = {http://eprint.iacr.org/2007/193}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LalV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeBM07, author = {Tri Van Le and Mike Burmester and Breno de Medeiros}, title = {Forward-secure {RFID} Authentication and Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {51}, year = {2007}, url = {http://eprint.iacr.org/2007/051}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeBM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeNCC07, author = {Thanh{-}Ha Le and Quoc{-}Thinh Nguyen{-}Vuong and C{\'{e}}cile Canovas and Jessy Cl{\'{e}}di{\`{e}}re}, title = {Novel Approaches for Improving the Power Consumption Models in Correlation Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {306}, year = {2007}, url = {http://eprint.iacr.org/2007/306}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeNCC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeePH07, author = {Dong Hoon Lee and Je Hong Park and Jae Woo Han}, title = {Security analysis of the variant of the self-shrinking generator proposed at {ICISC} 2006}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {8}, year = {2007}, url = {http://eprint.iacr.org/2007/008}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeePH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LemieuxT07, author = {Stephane Lemieux and Adrian Tang}, title = {Clone Resistant Mutual Authentication for Low-Cost {RFID} Technology}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {170}, year = {2007}, url = {http://eprint.iacr.org/2007/170}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LemieuxT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Li07, author = {An{-}Ping Li}, title = {A New Type of Cipher: DICING{\_}CSB}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {34}, year = {2007}, url = {http://eprint.iacr.org/2007/034}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Li07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiC07, author = {Chengqing Li and Guanrong Chen}, title = {On the security of a class of image encryption schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {339}, year = {2007}, url = {http://eprint.iacr.org/2007/339}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiLANAC07a, author = {Chengqing Li and Shujun Li and Muhammad Asim and Juana Nunez and Gonzalo {\'{A}}lvarez and Guanrong Chen}, title = {On the security defects of an image encryption scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {397}, year = {2007}, url = {http://eprint.iacr.org/2007/397}, timestamp = {Thu, 18 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiLANAC07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiangCSL07, author = {Xiaohui Liang and Zhenfu Cao and Jun Shao and Huang Lin}, title = {Short Group Signature without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {450}, year = {2007}, url = {http://eprint.iacr.org/2007/450}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiangCSL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LimL07, author = {Meng{-}Hui Lim and Sanggon Lee}, title = {An Improved One-Round ID-Based Tripartite Authenticated Key Agreement Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {189}, year = {2007}, url = {http://eprint.iacr.org/2007/189}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LimL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LimLL07, author = {Meng{-}Hui Lim and Sanggon Lee and Hoonjae Lee}, title = {Cryptanalysis on Improved Chou et al.'s ID-Based Deniable Authentication Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {383}, year = {2007}, url = {http://eprint.iacr.org/2007/383}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LimLL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LimLL07a, author = {Meng{-}Hui Lim and Sanggon Lee and Hoonjae Lee}, title = {Cryptanalysis on Improved One-round Lin-Li's Tripartite Key Agreement Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {411}, year = {2007}, url = {http://eprint.iacr.org/2007/411}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LimLL07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LimLL07b, author = {Meng{-}Hui Lim and Sanggon Lee and Hoonjae Lee}, title = {Cryptanalytic Flaws in Oh et al.'s ID-Based Authenticated Key Agreement Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {415}, year = {2007}, url = {http://eprint.iacr.org/2007/415}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LimLL07b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LimLPL07, author = {Meng{-}Hui Lim and Sanggon Lee and Youngho Park and Hoonjae Lee}, title = {An Enhanced ID-based Deniable Authentication Protocol on Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {113}, year = {2007}, url = {http://eprint.iacr.org/2007/113}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LimLPL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LimLPL07a, author = {Meng{-}Hui Lim and Sanggon Lee and Youngho Park and Hoonjae Lee}, title = {An Enhanced One-round Pairing-based Tripartite Authenticated Key Agreement Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {142}, year = {2007}, url = {http://eprint.iacr.org/2007/142}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LimLPL07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LimLPM07, author = {Meng{-}Hui Lim and Sanggon Lee and Youngho Park and Sang{-}Jae Moon}, title = {Secure Deniable Authenticated Key Establishment for Internet Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {163}, year = {2007}, url = {http://eprint.iacr.org/2007/163}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LimLPM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LimPLL07, author = {Shu Yun Lim and Chuan Chin Pu and Hyotaek Lim and Hoon{-}Jae Lee}, title = {Dragon-MAC: Securing Wireless Sensor Networks with Authenticated Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {204}, year = {2007}, url = {http://eprint.iacr.org/2007/204}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LimPLL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinW07, author = {Dai{-}Rui Lin and Chih{-}I Wang}, title = {A Forward-Secure Signature with Backward-Secure Detection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {257}, year = {2007}, url = {http://eprint.iacr.org/2007/257}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinZZW07, author = {Xibin Lin and Changan Zhao and Fangguo Zhang and Yanming Wang}, title = {Computing the Ate Pairing on Elliptic Curves with Embedding Degree k=9}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {434}, year = {2007}, url = {http://eprint.iacr.org/2007/434}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinZZW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lipmaa07, author = {Helger Lipmaa}, title = {New Communication-Efficient Oblivious Transfer Protocols Based on Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {133}, year = {2007}, url = {http://eprint.iacr.org/2007/133}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lipmaa07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuCZ07, author = {Shengli Liu and Xiaofeng Chen and Fangguo Zhang}, title = {On the Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {225}, year = {2007}, url = {http://eprint.iacr.org/2007/225}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuCZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuHW07, author = {Dennis Y. W. Liu and Qiong Huang and Duncan S. Wong}, title = {An Efficient One-move Nominative Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {260}, year = {2007}, url = {http://eprint.iacr.org/2007/260}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LiuHW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuL07, author = {Jie Liu and Jianhua Li}, title = {Improvement on a Digital Signature Scheme without using One-way Hash and Message Redundancy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {87}, year = {2007}, url = {http://eprint.iacr.org/2007/087}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuLYD07, author = {Feng{-}Hao Liu and Chi{-}Jen Lu and Bo{-}Yin Yang and Jintai Ding}, title = {Secure PRNGs from Specialized Polynomial Maps over Any F\({}_{\mbox{q}}\)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {405}, year = {2007}, url = {http://eprint.iacr.org/2007/405}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuLYD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuSKW07, author = {Jingwei Liu and Rong Sun and Weidong Kou and Xinmei Wang}, title = {Efficient ID-based Signature Without Trusted {PKG}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {135}, year = {2007}, url = {http://eprint.iacr.org/2007/135}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuSKW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuT07, author = {Yi{-}Ru Liu and Wen{-}Guey Tzeng}, title = {Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time (Version 2)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {167}, year = {2007}, url = {http://eprint.iacr.org/2007/167}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuWHWHMS07, author = {Dennis Y. W. Liu and Duncan S. Wong and Xinyi Huang and Guilin Wang and Qiong Huang and Yi Mu and Willy Susilo}, title = {Nominative Signature: Application, Security Model and Construction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {69}, year = {2007}, url = {http://eprint.iacr.org/2007/069}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuWHWHMS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Logachev07, author = {O. A. Logachev}, title = {On Perfectly Balanced Boolean Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {22}, year = {2007}, url = {http://eprint.iacr.org/2007/022}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Logachev07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Logachev07a, author = {Oleg A. Logachev}, title = {Locally Invertible Boolean Mappings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {307}, year = {2007}, url = {http://eprint.iacr.org/2007/307}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Logachev07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuLHL07a, author = {Xianhui Lu and Xuejia Lai and Dake He and Guomin Li}, title = {Weak adaptive chosen ciphertext secure hybrid encryption scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {447}, year = {2007}, url = {http://eprint.iacr.org/2007/447}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuLHL07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LubiczS07, author = {David Lubicz and Thomas Sirvent}, title = {A Tunable Broadcast Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {329}, year = {2007}, url = {http://eprint.iacr.org/2007/329}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LubiczS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaAL07, author = {Chunbo Ma and Jun Ao and Jianhua Li}, title = {Provable password-based tripartite key agreement protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {184}, year = {2007}, url = {http://eprint.iacr.org/2007/184}, timestamp = {Sun, 03 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaAL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaAL07a, author = {Chunbo Ma and Jun Ao and Jianhua Li}, title = {Scalable Storage Scheme from Forward Key Rotation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {211}, year = {2007}, url = {http://eprint.iacr.org/2007/211}, timestamp = {Sun, 03 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaAL07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaAL07b, author = {Chunbo Ma and Jun Ao and Jianhua Li}, title = {Group-based Proxy Re-encryption scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {274}, year = {2007}, url = {http://eprint.iacr.org/2007/274}, timestamp = {Sun, 03 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaAL07b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaAL07c, author = {Chunbo Ma and Jun Ao and Jianhua Li}, title = {Group-oriented encryption secure against collude attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {371}, year = {2007}, url = {http://eprint.iacr.org/2007/371}, timestamp = {Sun, 03 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaAL07c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaT07, author = {Di Ma and Gene Tsudik}, title = {Forward-Secure Sequential Aggregate Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {52}, year = {2007}, url = {http://eprint.iacr.org/2007/052}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaWZ07, author = {Changshe Ma and Jian Weng and Dong Zheng}, title = {Fast Digital Signature Schemes as Secure as Diffie-Hellman Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {19}, year = {2007}, url = {http://eprint.iacr.org/2007/019}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaWZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Madore07, author = {David Madore}, title = {ConSum v0: An Experimental Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {157}, year = {2007}, url = {http://eprint.iacr.org/2007/157}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Madore07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Maitra07, author = {Subhamoy Maitra}, title = {Balanced Boolean Function on 13-variables having Nonlinearity strictly greater than the Bent Concatenation Bound}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {309}, year = {2007}, url = {http://eprint.iacr.org/2007/309}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Maitra07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaitraP07, author = {Subhamoy Maitra and Goutam Paul}, title = {New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of {RC4}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {261}, year = {2007}, url = {http://eprint.iacr.org/2007/261}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaitraP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Mancillas-LopezCR07, author = {Cuauhtemoc Mancillas{-}L{\'{o}}pez and Debrup Chakraborty and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {437}, year = {2007}, url = {http://eprint.iacr.org/2007/437}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Mancillas-LopezCR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MandalN07, author = {Avradip Mandal and Mridul Nandi}, title = {An improved collision probability for {CBC-MAC} and {PMAC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {32}, year = {2007}, url = {http://eprint.iacr.org/2007/032}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MandalN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ManulisS07, author = {Mark Manulis and J{\"{o}}rg Schwenk}, title = {Provably Secure Framework for Information Aggregation is Sensor Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {283}, year = {2007}, url = {http://eprint.iacr.org/2007/283}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ManulisS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MashatanS07, author = {Atefeh Mashatan and Douglas R. Stinson}, title = {Interactive two-channel message authentication based on interactive-collision Resistant hash functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {12}, year = {2007}, url = {http://eprint.iacr.org/2007/012}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MashatanS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MatsudaKHO07, author = {Seiichi Matsuda and Naoki Kanayama and Florian Hess and Eiji Okamoto}, title = {Optimised versions of the Ate and Twisted Ate Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {13}, year = {2007}, url = {http://eprint.iacr.org/2007/013}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MatsudaKHO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Matsuo07, author = {Toshihiko Matsuo}, title = {Proxy Re-encryption Systems for Identity-based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {361}, year = {2007}, url = {http://eprint.iacr.org/2007/361}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Matsuo07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaurerR07, author = {Ueli Maurer and Dominik Raub}, title = {Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {89}, year = {2007}, url = {http://eprint.iacr.org/2007/089}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaurerR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaurerT07, author = {Ueli Maurer and Stefano Tessaro}, title = {Domain Extension of Public Random Functions: Beyond the Birthday Barrier}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {229}, year = {2007}, url = {http://eprint.iacr.org/2007/229}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaurerT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Maximov07, author = {Alexander Maximov}, title = {Two Linear Distinguishing Attacks on {VMPC} and {RC4A} and Weakness of {RC4} Family of Stream Ciphers (Corrected)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {70}, year = {2007}, url = {http://eprint.iacr.org/2007/070}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Maximov07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaximovB07, author = {Alexander Maximov and Alex Biryukov}, title = {Two Trivial Attacks on Trivium}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {21}, year = {2007}, url = {http://eprint.iacr.org/2007/021}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaximovB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/McDonaldCP07, author = {Cameron McDonald and Chris Charnes and Josef Pieprzyk}, title = {An Algebraic Analysis of Trivium Ciphers based on the Boolean Satisfiability Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {129}, year = {2007}, url = {http://eprint.iacr.org/2007/129}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/McDonaldCP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/McGrewF07, author = {David A. McGrew and Scott R. Fluhrer}, title = {The Security of the Extended Codebook {(XCB)} Mode of Operation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {298}, year = {2007}, url = {http://eprint.iacr.org/2007/298}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/McGrewF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MelchorG07, author = {Carlos Aguilar Melchor and Philippe Gaborit}, title = {A Lattice-Based Computationally-Efficient Private Information Retrieval Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {446}, year = {2007}, url = {http://eprint.iacr.org/2007/446}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MelchorG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Mesnager07, author = {Sihem Mesnager}, title = {Improving the lower bound on the higher order nonlinearity of Boolean functions with prescribed algebraic immunity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {117}, year = {2007}, url = {http://eprint.iacr.org/2007/117}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Mesnager07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Mikhail07, author = {Mikhail Lobanov}, title = {Tight bounds between algebraic immunity and nonlinearities of high orders}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {444}, year = {2007}, url = {http://eprint.iacr.org/2007/444}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Mikhail07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MirV07, author = {Darakhshan J. Mir and Poorvi L. Vora}, title = {Related-Key Statistical Cryptanalysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {227}, year = {2007}, url = {http://eprint.iacr.org/2007/227}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MirV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MishraD07, author = {Pradeep Kumar Mishra and Vassil S. Dimitrov}, title = {Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number Representation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {40}, year = {2007}, url = {http://eprint.iacr.org/2007/040}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MishraD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Moh07, author = {Tzuong{-}Tsieng Moh}, title = {Two New Examples of {TTM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {144}, year = {2007}, url = {http://eprint.iacr.org/2007/144}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Moh07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MollerR07, author = {Bodo M{\"{o}}ller and Andy Rupp}, title = {Faster Multi-Exponentiation through Caching: Accelerating {(EC)DSA} Signature Verification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {470}, year = {2007}, url = {http://eprint.iacr.org/2007/470}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MollerR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoranNS07, author = {Tal Moran and Moni Naor and Gil Segev}, title = {Deterministic History-Independent Strategies for Storing Information on Write-Once Memories}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {151}, year = {2007}, url = {http://eprint.iacr.org/2007/151}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoranNS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MossPS07, author = {Andrew Moss and Dan Page and Nigel P. Smart}, title = {Executing Modular Exponentiation on a Graphics Accelerator}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {187}, year = {2007}, url = {http://eprint.iacr.org/2007/187}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MossPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MurakamiN07, author = {Yasuyuki Murakami and Takeshi Nasako}, title = {Knapsack Public-Key Cryptosystem Using Chinese Remainder Theorem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {107}, year = {2007}, url = {http://eprint.iacr.org/2007/107}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MurakamiN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaehrigBS07, author = {Michael Naehrig and Paulo S. L. M. Barreto and Peter Schwabe}, title = {On compressible pairings and their computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {429}, year = {2007}, url = {http://eprint.iacr.org/2007/429}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaehrigBS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nagao07, author = {Koh{-}ichi Nagao}, title = {Decomposed Attack for the Jacobian of a Hyperelliptic Curve over an Extension Field}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {112}, year = {2007}, url = {http://eprint.iacr.org/2007/112}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nagao07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nam07, author = {Junghyun Nam}, title = {Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {166}, year = {2007}, url = {http://eprint.iacr.org/2007/166}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nam07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nandi07, author = {Mridul Nandi}, title = {A Simple Security Analysis of Hash-CBC and a New Efficient One-Key Online Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {158}, year = {2007}, url = {http://eprint.iacr.org/2007/158}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nandi07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nandi07a, author = {Mridul Nandi}, title = {Improved security analysis of {OMAC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {292}, year = {2007}, url = {http://eprint.iacr.org/2007/292}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nandi07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NandiM07, author = {Mridul Nandi and Avradip Mandal}, title = {Improved Security Analysis of {PMAC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {31}, year = {2007}, url = {http://eprint.iacr.org/2007/031}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NandiM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NeveT07, author = {Michael Neve and Kris Tiri}, title = {On the complexity of side-channel attacks on {AES-256} - methodology and quantitative results on cache attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {318}, year = {2007}, url = {http://eprint.iacr.org/2007/318}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NeveT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nguyen07, author = {Lan Nguyen}, title = {Privacy-Protecting Coupon System Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {5}, year = {2007}, url = {http://eprint.iacr.org/2007/005}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nguyen07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nguyen07a, author = {Lan Nguyen}, title = {Efficient Dynamic k-Times Anonymous Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {6}, year = {2007}, url = {http://eprint.iacr.org/2007/006}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nguyen07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NieJHD07, author = {Xuyun Nie and Xin Jiang and Lei Hu and Jintai Ding}, title = {Cryptanalysis of Two New Instances of {TTM} Cryptosystem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {381}, year = {2007}, url = {http://eprint.iacr.org/2007/381}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NieJHD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nielsen07, author = {Jesper Buus Nielsen}, title = {Extending Oblivious Transfers Efficiently - How to get Robustness Almost for Free}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {215}, year = {2007}, url = {http://eprint.iacr.org/2007/215}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nielsen07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nowak07, author = {David Nowak}, title = {A Framework for Game-Based Security Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {199}, year = {2007}, url = {http://eprint.iacr.org/2007/199}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nowak07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ONeil07, author = {Sean O'Neil}, title = {Algebraic Structure Defectoscopy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {378}, year = {2007}, url = {http://eprint.iacr.org/2007/378}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ONeil07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Okamoto07, author = {Tatsuaki Okamoto}, title = {Authenticated Key Exchange and Key Encapsulation Without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {473}, year = {2007}, url = {http://eprint.iacr.org/2007/473}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Okamoto07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OliveiraAMDLD07, author = {Leonardo B. Oliveira and Diego F. Aranha and Eduardo Morais and Felipe Daguano and Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez and Ricardo Dahab}, title = {TinyTate: Identity-Based Encryption for Sensor Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {20}, year = {2007}, url = {http://eprint.iacr.org/2007/020}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OliveiraAMDLD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OliveiraSLD07, author = {Leonardo B. Oliveira and Michael Scott and Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez and Ricardo Dahab}, title = {TinyPBC: Pairings for Authenticated Identity-Based Non-Interactive Key Distribution in Sensor Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {482}, year = {2007}, url = {http://eprint.iacr.org/2007/482}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OliveiraSLD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Oren07, author = {Yossi Oren}, title = {Remote Power Analysis of {RFID} Tags}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {330}, year = {2007}, url = {http://eprint.iacr.org/2007/330}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Oren07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OstrovskyPS07, author = {Rafail Ostrovsky and Omkant Pandey and Amit Sahai}, title = {Private Locally Decodable Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {25}, year = {2007}, url = {http://eprint.iacr.org/2007/025}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OstrovskyPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OstrovskyS07, author = {Rafail Ostrovsky and William E. Skeith III}, title = {A Survey of Single Database {PIR:} Techniques and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {59}, year = {2007}, url = {http://eprint.iacr.org/2007/059}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OstrovskyS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OstrovskyS07a, author = {Rafail Ostrovsky and William E. Skeith III}, title = {Algebraic Lower Bounds for Computing on Encrypted Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {64}, year = {2007}, url = {http://eprint.iacr.org/2007/064}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OstrovskyS07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OstrovskySW07, author = {Rafail Ostrovsky and Amit Sahai and Brent Waters}, title = {Attribute-Based Encryption with Non-Monotonic Access Structures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {323}, year = {2007}, url = {http://eprint.iacr.org/2007/323}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OstrovskySW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PandeyPSTV07, author = {Omkant Pandey and Rafael Pass and Amit Sahai and Wei{-}Lung Dustin Tseng and Muthuramakrishnan Venkitasubramaniam}, title = {Precise Concurrent Zero Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {451}, year = {2007}, url = {http://eprint.iacr.org/2007/451}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PandeyPSTV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ParkKLCZ07, author = {Hyun{-}A Park and Bum Han Kim and Dong Hoon Lee and Yon Dohn Chung and Justin Zhan}, title = {Secure Similarity Search}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {312}, year = {2007}, url = {http://eprint.iacr.org/2007/312}, timestamp = {Fri, 24 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ParkKLCZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatarinNB07, author = {Jacques Patarin and Val{\'{e}}rie Nachef and C{\^{o}}me Berbain}, title = {Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {449}, year = {2007}, url = {http://eprint.iacr.org/2007/449}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatarinNB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatersonS07, author = {Kenneth G. Paterson and Sriramkrishnan Srinivasan}, title = {On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {453}, year = {2007}, url = {http://eprint.iacr.org/2007/453}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatersonS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Paul07, author = {Souradyuti Paul}, title = {Cryptanalysis of Stream Ciphers Based on Arrays and Modular Addition}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {54}, year = {2007}, url = {http://eprint.iacr.org/2007/054}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Paul07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PaulM07, author = {Goutam Paul and Subhamoy Maitra}, title = {{RC4} State Information at Any Stage Reveals the Secret Key}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {208}, year = {2007}, url = {http://eprint.iacr.org/2007/208}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PaulM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PaulMS07, author = {Goutam Paul and Subhamoy Maitra and Rohit Srivastava}, title = {On Non-Randomness of the Permutation after {RC4} Key Scheduling}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {305}, year = {2007}, url = {http://eprint.iacr.org/2007/305}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PaulMS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PeikertVW07, author = {Chris Peikert and Vinod Vaikuntanathan and Brent Waters}, title = {A Framework for Efficient and Composable Oblivious Transfer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {348}, year = {2007}, url = {http://eprint.iacr.org/2007/348}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PeikertVW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PeikertW07, author = {Chris Peikert and Brent Waters}, title = {Lossy Trapdoor Functions and Their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {279}, year = {2007}, url = {http://eprint.iacr.org/2007/279}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PeikertW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PetitSPMY07, author = {Christophe Petit and Fran{\c{c}}ois{-}Xavier Standaert and Olivier Pereira and Tal Malkin and Moti Yung}, title = {A Block Cipher based {PRNG} Secure Against Side-Channel Key Recovery}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {356}, year = {2007}, url = {http://eprint.iacr.org/2007/356}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/PetitSPMY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Pometun07, author = {Sergiy Pometun}, title = {Generalized Correlation and Higher Order Nonlinearity for Probabilistic Algebraic Attacks Description}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {448}, year = {2007}, url = {http://eprint.iacr.org/2007/448}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Pometun07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PrabhakaranR07, author = {Manoj Prabhakaran and Mike Rosulek}, title = {Rerandomizable {RCCA} Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {119}, year = {2007}, url = {http://eprint.iacr.org/2007/119}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PrabhakaranR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PrabhakaranX07, author = {Manoj Prabhakaran and Rui Xue}, title = {Statistically Hiding Sets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {349}, year = {2007}, url = {http://eprint.iacr.org/2007/349}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PrabhakaranX07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PszonaS07, author = {Pawel Pszona and Grzegorz Stachowiak}, title = {Unlinkable Divisible Digital Cash without Trusted Third Party}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {216}, year = {2007}, url = {http://eprint.iacr.org/2007/216}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PszonaS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/QinWSMW07, author = {Bo Qin and Qianhong Wu and Willy Susilo and Yi Mu and Yumin Wang}, title = {Group Decryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {17}, year = {2007}, url = {http://eprint.iacr.org/2007/017}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/QinWSMW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RaddumS07, author = {H{\aa}vard Raddum and Igor A. Semaev}, title = {Solving {MRHS} linear equations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {285}, year = {2007}, url = {http://eprint.iacr.org/2007/285}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RaddumS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ravnshoj07, author = {Christian Robenhagen Ravnsh{\o}j}, title = {Large Cyclic Subgroups of Jacobians of Hyperelliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {97}, year = {2007}, url = {http://eprint.iacr.org/2007/097}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ravnshoj07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ravnshoj07a, author = {Christian Robenhagen Ravnsh{\o}j}, title = {Generators of Jacobians of Hyperelliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {150}, year = {2007}, url = {http://eprint.iacr.org/2007/150}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ravnshoj07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ravnshoj07b, author = {Christian Robenhagen Ravnsh{\o}j}, title = {Embedding Degree of Hyperelliptic Curves with Complex Multiplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {175}, year = {2007}, url = {http://eprint.iacr.org/2007/175}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ravnshoj07b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ravnshoj07c, author = {Christian Robenhagen Ravnsh{\o}j}, title = {Pairings on Jacobians of Hyperelliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {365}, year = {2007}, url = {http://eprint.iacr.org/2007/365}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ravnshoj07c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ReyhanitabarWS07, author = {Mohammad Reza Reyhanitabar and Shuhong Wang and Reihaneh Safavi{-}Naini}, title = {Noninteractive Manual Channel Message Authentication Based On eTCR Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {131}, year = {2007}, url = {http://eprint.iacr.org/2007/131}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ReyhanitabarWS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RistenpartR07, author = {Thomas Ristenpart and Phillip Rogaway}, title = {How to Enrich the Message Space of a Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {109}, year = {2007}, url = {http://eprint.iacr.org/2007/109}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RistenpartR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RistenpartY07, author = {Thomas Ristenpart and Scott Yilek}, title = {The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {264}, year = {2007}, url = {http://eprint.iacr.org/2007/264}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RistenpartY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RoyDDM07, author = {Arnab Roy and Anupam Datta and Ante Derek and John C. Mitchell}, title = {Inductive Proof Method for Computational Secrecy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {165}, year = {2007}, url = {http://eprint.iacr.org/2007/165}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RoyDDM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RubinS07, author = {Karl Rubin and Alice Silverberg}, title = {Choosing the correct elliptic curve in the {CM} method}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {253}, year = {2007}, url = {http://eprint.iacr.org/2007/253}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RubinS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RuppLBSD07, author = {Andy Rupp and Gregor Leander and Endre Bangerter and Ahmad{-}Reza Sadeghi and Alexander W. Dent}, title = {Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized {DL} and {DH} Problems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {360}, year = {2007}, url = {http://eprint.iacr.org/2007/360}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RuppLBSD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Saarinen07, author = {Markku{-}Juhani O. Saarinen}, title = {Linearization Attacks Against Syndrome Based Hashes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {295}, year = {2007}, url = {http://eprint.iacr.org/2007/295}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Saarinen07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Saarinen07a, author = {Markku{-}Juhani O. Saarinen}, title = {A Meet-in-the-Middle Collision Attack Against the New {FORK-256}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {373}, year = {2007}, url = {http://eprint.iacr.org/2007/373}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Saarinen07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SakaiF07, author = {Ryuichi Sakai and Jun Furukawa}, title = {Identity-Based Broadcast Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {217}, year = {2007}, url = {http://eprint.iacr.org/2007/217}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SakaiF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SakalauskasL07, author = {Eligijus Sakalauskas and Kestutis Luksys}, title = {Matrix Power S-Box Construction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {214}, year = {2007}, url = {http://eprint.iacr.org/2007/214}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SakalauskasL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Samid07, author = {Gideon Samid}, title = {Proposing a Master One-Way Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {412}, year = {2007}, url = {http://eprint.iacr.org/2007/412}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Samid07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SanadhyaS07, author = {Somitra Kumar Sanadhya and Palash Sarkar}, title = {New Local Collisions for the {SHA-2} Hash Family}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {352}, year = {2007}, url = {http://eprint.iacr.org/2007/352}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SanadhyaS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Sarkar07, author = {Palash Sarkar}, title = {Improving Upon the {TET} Mode of Operation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {317}, year = {2007}, url = {http://eprint.iacr.org/2007/317}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Sarkar07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SarkarM07, author = {Sumanta Sarkar and Subhamoy Maitra}, title = {Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity on Odd Number of Variables}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {290}, year = {2007}, url = {http://eprint.iacr.org/2007/290}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SarkarM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SarkarM07a, author = {Sumanta Sarkar and Subhamoy Maitra}, title = {Idempotents in the Neighbourhood of Patterson-Wiedemann Functions having Walsh Spectra Zeros}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {427}, year = {2007}, url = {http://eprint.iacr.org/2007/427}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SarkarM07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SasakiYA07, author = {Yu Sasaki and Go Yamamoto and Kazumaro Aoki}, title = {Practical Password Recovery on an {MD5} Challenge and Response}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {101}, year = {2007}, url = {http://eprint.iacr.org/2007/101}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SasakiYA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Scott07, author = {Michael Scott}, title = {Optimal Irreducible Polynomials for GF(2\({}^{\mbox{m}}\)) Arithmetic}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {192}, year = {2007}, url = {http://eprint.iacr.org/2007/192}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Scott07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ScottS07, author = {Michael Scott and Piotr Szczechowiak}, title = {Optimizing Multiprecision Multiplication for Public Key Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {299}, year = {2007}, url = {http://eprint.iacr.org/2007/299}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ScottS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SekarPP07, author = {Gautham Sekar and Souradyuti Paul and Bart Preneel}, title = {Weaknesses in the Pseudorandom Bit Generation Algorithms of the Stream Ciphers TPypy and TPy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {75}, year = {2007}, url = {http://eprint.iacr.org/2007/075}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SekarPP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SekarPP07a, author = {Gautham Sekar and Souradyuti Paul and Bart Preneel}, title = {New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {230}, year = {2007}, url = {http://eprint.iacr.org/2007/230}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SekarPP07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SekarPP07b, author = {Gautham Sekar and Souradyuti Paul and Bart Preneel}, title = {New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {436}, year = {2007}, url = {http://eprint.iacr.org/2007/436}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SekarPP07b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Semaev07, author = {Igor A. Semaev}, title = {On solving sparse algebraic equations over finite fields {II}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {280}, year = {2007}, url = {http://eprint.iacr.org/2007/280}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Semaev07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Shacham07, author = {Hovav Shacham}, title = {A Cramer-Shoup Encryption Scheme from the Linear Assumption and from Progressively Weaker Linear Variants}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {74}, year = {2007}, url = {http://eprint.iacr.org/2007/074}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Shacham07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Shacham07a, author = {Hovav Shacham}, title = {The {BBG} {HIBE} Has Limited Delegation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {201}, year = {2007}, url = {http://eprint.iacr.org/2007/201}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Shacham07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShahandashtiS07, author = {Siamak Fayyaz Shahandashti and Reihaneh Safavi{-}Naini}, title = {Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {462}, year = {2007}, url = {http://eprint.iacr.org/2007/462}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShahandashtiS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShaoCWL07a, author = {Jun Shao and Zhenfu Cao and Licheng Wang and Rongxing Lu}, title = {Efficient Password-based Authenticated Key Exchange without Public Information}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {326}, year = {2007}, url = {http://eprint.iacr.org/2007/326}, timestamp = {Tue, 02 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShaoCWL07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShaoCWL07b, author = {Jun Shao and Zhenfu Cao and Licheng Wang and Xiaohui Liang}, title = {Proxy Re-Signature Schemes without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {396}, year = {2007}, url = {http://eprint.iacr.org/2007/396}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShaoCWL07b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShpilrainZ07, author = {Vladimir Shpilrain and Gabriel Zapata}, title = {Using decision problems in public key cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {147}, year = {2007}, url = {http://eprint.iacr.org/2007/147}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShpilrainZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShrimptonS07, author = {Thomas Shrimpton and Martijn Stam}, title = {Building a Collision-Resistant Compression Function from Non-Compressing Primitives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {409}, year = {2007}, url = {http://eprint.iacr.org/2007/409}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShrimptonS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SkoricKC07, author = {Boris Skoric and Stefan Katzenbeisser and Mehmet Utku Celik}, title = {Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {41}, year = {2007}, url = {http://eprint.iacr.org/2007/041}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SkoricKC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Smith07, author = {Warren D. Smith}, title = {1. {AES} seems weak. 2. Linear time secure cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {248}, year = {2007}, url = {http://eprint.iacr.org/2007/248}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Smith07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Smith07a, author = {Benjamin A. Smith}, title = {Isogenies and the Discrete Logarithm Problem on Jacobians of Genus 3 Hyperelliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {428}, year = {2007}, url = {http://eprint.iacr.org/2007/428}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Smith07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SorienteTU07, author = {Claudio Soriente and Gene Tsudik and Ersin Uzun}, title = {{HAPADEP:} Human Asisted Pure Audio Device Pairing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {93}, year = {2007}, url = {http://eprint.iacr.org/2007/093}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SorienteTU07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SorienteTU07a, author = {Claudio Soriente and Gene Tsudik and Ersin Uzun}, title = {{BEDA:} Button-Enabled Device Pairing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {246}, year = {2007}, url = {http://eprint.iacr.org/2007/246}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SorienteTU07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SpeirsM07, author = {William R. Speirs and Ian M. Molloy}, title = {Making Large Hash Functions From Small Compression Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {239}, year = {2007}, url = {http://eprint.iacr.org/2007/239}, timestamp = {Wed, 02 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SpeirsM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StandaertPAQ07, author = {Fran{\c{c}}ois{-}Xavier Standaert and Eric Peeters and C{\'{e}}dric Archambeau and Jean{-}Jacques Quisquater}, title = {Towards Security Limits in Side-Channel Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {222}, year = {2007}, url = {http://eprint.iacr.org/2007/222}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StandaertPAQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Stinson07, author = {Douglas R. Stinson}, title = {Generalized mix functions and orthogonal equitable rectangles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {226}, year = {2007}, url = {http://eprint.iacr.org/2007/226}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Stinson07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StinsonW07, author = {Douglas R. Stinson and Jiang Wu}, title = {A Zero-Knowledge Identification and Key Agreement Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {116}, year = {2007}, url = {http://eprint.iacr.org/2007/116}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StinsonW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Strangio07, author = {Maurizio Adriano Strangio}, title = {Revisiting an Efficient Elliptic Curve Key Agreement Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {81}, year = {2007}, url = {http://eprint.iacr.org/2007/081}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Strangio07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StudholmeB07, author = {Chris Studholme and Ian F. Blake}, title = {Multiparty Computation to Generate Secret Permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {353}, year = {2007}, url = {http://eprint.iacr.org/2007/353}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StudholmeB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SuiS07, author = {Jiayuan Sui and Douglas R. Stinson}, title = {A Critical Analysis and Improvement of {AACS} Drive-Host Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {420}, year = {2007}, url = {http://eprint.iacr.org/2007/420}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SuiS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SuzukiK07, author = {Kazuhiro Suzuki and Kaoru Kurosawa}, title = {How To Find Many Collisions of 3-Pass {HAVAL}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {79}, year = {2007}, url = {http://eprint.iacr.org/2007/079}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SuzukiK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TakahashiF07, author = {Junko Takahashi and Toshinori Fukunaga}, title = {Differential Fault Analysis on the {AES} Key Schedule}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {480}, year = {2007}, url = {http://eprint.iacr.org/2007/480}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TakahashiF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TakahashiHK07, author = {Gen Takahashi and Fumitaka Hoshino and Tetsutaro Kobayashi}, title = {Efficient GF(3m) Multiplication Algorithm for eta {T} Pairing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {463}, year = {2007}, url = {http://eprint.iacr.org/2007/463}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TakahashiHK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Tang07, author = {Qiang Tang}, title = {On the Security of three Versions of the {WAI} Protocol in Chinese {WLAN} Implementation Plan}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {122}, year = {2007}, url = {http://eprint.iacr.org/2007/122}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Tang07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TangJ07, author = {Qiang Tang and Dongyao Ji}, title = {Verifiable Attribute-based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {461}, year = {2007}, url = {http://eprint.iacr.org/2007/461}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TangJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Tao07, author = {Renji Tao}, title = {A Note on Automata-based Dynamic Convolutional Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {300}, year = {2007}, url = {http://eprint.iacr.org/2007/300}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Tao07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Tews07, author = {Erik Tews}, title = {Attacks on the {WEP} protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {471}, year = {2007}, url = {http://eprint.iacr.org/2007/471}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Tews07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TewsWP07, author = {Erik Tews and Ralf{-}Philipp Weinmann and Andrei Pyshkin}, title = {Breaking 104 bit {WEP} in less than 60 seconds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {120}, year = {2007}, url = {http://eprint.iacr.org/2007/120}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TewsWP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TianCJJM07, author = {Yuan Tian and Zhi{-}Yu Chen and Yuee Jin and Feng Jin and Huihui Ma}, title = {Some Results on Anonymity in Hybrid Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {130}, year = {2007}, url = {http://eprint.iacr.org/2007/130}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TianCJJM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TrostleP07, author = {Jonathan T. Trostle and Andy Parrish}, title = {Efficient Computationally Private Information Retrieval From Anonymity or Trapdoor Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {392}, year = {2007}, url = {http://eprint.iacr.org/2007/392}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TrostleP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TuD07, author = {Ziran Tu and Yingpu Deng}, title = {Algebraic Immunity Hierarchy of Boolean Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {259}, year = {2007}, url = {http://eprint.iacr.org/2007/259}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TuD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Unruh07, author = {Dominique Unruh}, title = {Random Oracles and Auxiliary Input}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {168}, year = {2007}, url = {http://eprint.iacr.org/2007/168}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Unruh07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ustaoglu07, author = {Berkant Ustaoglu}, title = {Obtaining a secure and efficient key agreement protocol from {(H)MQV} and {NAXOS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {123}, year = {2007}, url = {http://eprint.iacr.org/2007/123}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ustaoglu07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Vielhaber07, author = {Michael Vielhaber}, title = {Breaking {ONE.FIVIUM} by {AIDA} an Algebraic {IV} Differential Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {413}, year = {2007}, url = {http://eprint.iacr.org/2007/413}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Vielhaber07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Wang07, author = {Meiqin Wang}, title = {Differential Cryptanalysis of {PRESENT}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {408}, year = {2007}, url = {http://eprint.iacr.org/2007/408}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Wang07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangC07, author = {Shengbao Wang and Zhenfu Cao}, title = {Practical Identity-Based Encryption {(IBE)} in Multiple {PKG} Environments and Its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {100}, year = {2007}, url = {http://eprint.iacr.org/2007/100}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangCCC07, author = {Shengbao Wang and Zhenfu Cao and ZhaoHui Cheng and Kim{-}Kwang Raymond Choo}, title = {Perfect Forward Secure Identity-Based Authenticated Key Agreement Protocol in the Escrow Mode}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {313}, year = {2007}, url = {http://eprint.iacr.org/2007/313}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangCCC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangCSW07, author = {Shengbao Wang and Zhenfu Cao and Maurizio Adriano Strangio and Lihua Wang}, title = {Cryptanalysis and Improvement of an Elliptic Curve Diffie-Hellman Key Agreement Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {26}, year = {2007}, url = {http://eprint.iacr.org/2007/026}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangCSW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangW07, author = {Wei Wang and Xiaoyun Wang}, title = {Improved Impossible Differential Cryptanalysis of {CLEFIA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {466}, year = {2007}, url = {http://eprint.iacr.org/2007/466}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangYH07, author = {Xu An Wang and Xiaoyuan Yang and Yiliang Han}, title = {Provable Secure Generalized Signcryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {173}, year = {2007}, url = {http://eprint.iacr.org/2007/173}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangYH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangZ07, author = {Fengjiao Wang and Yuqing Zhang}, title = {A New Provably Secure Authentication and Key Agreement Mechanism for {SIP} Using Certificateless Public-key Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {220}, year = {2007}, url = {http://eprint.iacr.org/2007/220}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangZ07a, author = {Fengjiao Wang and Yuqing Zhang}, title = {A New Security Model for Cross-Realm {C2C-PAKE} Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {342}, year = {2007}, url = {http://eprint.iacr.org/2007/342}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangZ07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Wei07, author = {Tzer{-}jen Wei}, title = {Notions of Efficiency in Simulation Paradigm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {431}, year = {2007}, url = {http://eprint.iacr.org/2007/431}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Wei07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Wojtenko07, author = {Grzegorz Wojtenko}, title = {{PRIME} {POINTS} {ON} {ELLIPTIC} {CURVES} {AND} {ITS} {IMPACT} {ON} {ECDLP}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {92}, year = {2007}, url = {http://eprint.iacr.org/2007/092}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Wojtenko07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Wojtenko07a, author = {Grzegorz Wojtenko}, title = {A Pollard-like pseudorandom number generator over {EC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {281}, year = {2007}, url = {http://eprint.iacr.org/2007/281}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Wojtenko07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WuS07, author = {Jiang Wu and Douglas R. Stinson}, title = {Authorship Proof for Textual Document}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {42}, year = {2007}, url = {http://eprint.iacr.org/2007/042}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WuS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WuS07a, author = {Jiang Wu and Douglas R. Stinson}, title = {An Efficient Identification Protocol and the Knowledge-of-Exponent Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {479}, year = {2007}, url = {http://eprint.iacr.org/2007/479}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WuS07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WuZW07, author = {Liufei Wu and Yuqing Zhang and Fengjiao Wang}, title = {A New Provably Secure Authentication and Key Agreement Protocol for {SIP} Using {ECC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {219}, year = {2007}, url = {http://eprint.iacr.org/2007/219}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WuZW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WuZW07a, author = {Liufei Wu and Yuqing Zhang and Fengjiao Wang}, title = {Security Analysis of {WAPI} Authentication and Key Exchange Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {344}, year = {2007}, url = {http://eprint.iacr.org/2007/344}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WuZW07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WyseurMGP07, author = {Brecht Wyseur and Wil Michiels and Paul Gorissen and Bart Preneel}, title = {Cryptanalysis of White-Box {DES} Implementations with Arbitrary External Encodings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {104}, year = {2007}, url = {http://eprint.iacr.org/2007/104}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WyseurMGP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Xu07, author = {ZiJie Xu}, title = {Dynamic {SHA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {476}, year = {2007}, url = {http://eprint.iacr.org/2007/476}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Xu07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangWHD07, author = {Guomin Yang and Duncan S. Wong and Qiong Huang and Xiaotie Deng}, title = {A New Security Definition for Public Key Encryption Schemes and Its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {319}, year = {2007}, url = {http://eprint.iacr.org/2007/319}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangWHD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YaoYZZ07, author = {Andrew Chi{-}Chih Yao and Frances F. Yao and Yunlei Zhao and Bin B. Zhu}, title = {Deniable Internet Key-Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {191}, year = {2007}, url = {http://eprint.iacr.org/2007/191}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YaoYZZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YeWT07, author = {Qingsong Ye and Huaxiong Wang and Christophe Tartary}, title = {Privacy-Preserving Distributed Set Intersection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {111}, year = {2007}, url = {http://eprint.iacr.org/2007/111}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YeWT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YiTO07, author = {Xun Yi and Raylin Tso and Eiji Okamoto}, title = {ID-Based Group Password-Authenticated Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {469}, year = {2007}, url = {http://eprint.iacr.org/2007/469}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YiTO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YooSK07, author = {Eun Sun Yoo and Koutarou Suzuki and Myung{-}Hwan Kim}, title = {Fully Resilient Traitor Tracing Scheme using Key Update}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {293}, year = {2007}, url = {http://eprint.iacr.org/2007/293}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YooSK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YoshitomiTKT07, author = {Motoi Yoshitomi and Tsuyoshi Takagi and Shinsaku Kiyomoto and Toshiaki Tanaka}, title = {Efficient Implementation of the Pairing on Mobilephones using {BREW}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {340}, year = {2007}, url = {http://eprint.iacr.org/2007/340}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YoshitomiTKT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YuW07, author = {Hongbo Yu and Xiaoyun Wang}, title = {MultiCollision Attack on the Compression Functions of {MD4} and 3-Pass {HAVAL}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {85}, year = {2007}, url = {http://eprint.iacr.org/2007/085}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YuW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Yuan07, author = {Tian Yuan}, title = {Some General Results on Chosen-ciphertext Anonymity in Public-key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {190}, year = {2007}, url = {http://eprint.iacr.org/2007/190}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Yuan07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YuenALS07, author = {Tsz Hon Yuen and Man Ho Au and Joseph K. Liu and Willy Susilo}, title = {(Convertible) Undeniable Signatures without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {386}, year = {2007}, url = {http://eprint.iacr.org/2007/386}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YuenALS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YunPL07, author = {Aaram Yun and Je Hong Park and Jooyoung Lee}, title = {Lai-Massey Scheme and Quasi-Feistel Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {347}, year = {2007}, url = {http://eprint.iacr.org/2007/347}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YunPL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZengHH07, author = {Guang Zeng and Wenbao Han and Kaicheng He}, title = {High Efficiency Feedback Shift Register: sigma-LFSR}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {114}, year = {2007}, url = {http://eprint.iacr.org/2007/114}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZengHH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZengHYJ07, author = {Xiangyong Zeng and Lei Hu and Yang Yang and Wenfeng Jiang}, title = {On The Inequivalence Of Ness-Helleseth {APN} Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {379}, year = {2007}, url = {http://eprint.iacr.org/2007/379}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZengHYJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Zhang07, author = {Muxiang Zhang}, title = {Analysis of Collusion-Attack Free ID-Based Non-Interactive Key Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {160}, year = {2007}, url = {http://eprint.iacr.org/2007/160}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Zhang07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoZH07, author = {Changan Zhao and Fangguo Zhang and Jiwu Huang}, title = {A Note on the Ate Pairing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {247}, year = {2007}, url = {http://eprint.iacr.org/2007/247}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoZH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhouCZZ07, author = {Jin Zhou and TingMao Chang and YaJuan Zhang and Yuefei Zhu}, title = {Universally Composable Key-evolving Signature}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {11}, year = {2007}, url = {http://eprint.iacr.org/2007/011}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhouCZZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhouL07a, author = {Sujing Zhou and Dongdai Lin}, title = {An Interesting Member ID-based Group Signature}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {126}, year = {2007}, url = {http://eprint.iacr.org/2007/126}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhouL07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhouL07b, author = {Sujing Zhou and Dongdai Lin}, title = {Unlinkable Randomizable Signature and Its Application in Group Signature}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {213}, year = {2007}, url = {http://eprint.iacr.org/2007/213}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhouL07b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhouZZ07, author = {Jin Zhou and YaJuan Zhang and Yuefei Zhu}, title = {Security Arguments for a Class of ID-based Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {49}, year = {2007}, url = {http://eprint.iacr.org/2007/049}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhouZZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AuLYW07, title = {Efficient Hierarchical Identity Based Signature in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {68}, year = {2007}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2007/068}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AuLYW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Awasthi07, title = {An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {418}, year = {2007}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2007/418}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Awasthi07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BartheGJB07, title = {Formal Certification of Code-Based Cryptographic Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {314}, year = {2007}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2007/314}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BartheGJB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BuchmannDL07, title = {Efficiency Improvement for {NTRU}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {263}, year = {2007}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2007/263}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BuchmannDL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BurmesterMM07a, title = {Provably Secure Grouping-proofs for {RFID} tags}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {407}, year = {2007}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2007/407}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BurmesterMM07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CastroD07, title = {An Efficient Certificateless Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {196}, year = {2007}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2007/196}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CastroD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ClarkT07, title = {Analysis of Local Optima in Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {387}, year = {2007}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2007/387}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ClarkT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DingG07, title = {Precise Zero-Knowledge in Concurrent Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {456}, year = {2007}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2007/456}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DingG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FengW07a, title = {Fast Point Multiplication on Elliptic Curves of Even Order}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {377}, year = {2007}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2007/377}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FengW07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gangopadhyay07, title = {On bent functions with zero second derivatives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {77}, year = {2007}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2007/077}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gangopadhyay07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JuelsK07, title = {PORs: Proofs of Retrievability for Large Files}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {243}, year = {2007}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2007/243}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JuelsK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KangTLF07, title = {A Short Signature Scheme in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {398}, year = {2007}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2007/398}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KangTLF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiLANAC07, title = {On the security of an image encryption scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {90}, year = {2007}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2007/090}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiLANAC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinC07, title = {Cryptanalysis of An Oblivious Polynomial Evaluation Protocol Based On Polynomial Reconstruction Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {2}, year = {2007}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2007/002}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuSKW07a, title = {Fair Exchange Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {136}, year = {2007}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2007/136}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuSKW07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuLH07, title = {A new paradigm of chosen ciphertext secure public key encryption scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {232}, year = {2007}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2007/232}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuLH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuLH07a, title = {MAC-free variant of {KD04}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {481}, year = {2007}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2007/481}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuLH07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuLHL07, title = {Efficient chosen ciphertext secure {PKE} scheme with short ciphertext}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {210}, year = {2007}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2007/210}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuLHL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuLHL07b, title = {On the hash function of {ODH} assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {468}, year = {2007}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2007/468}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuLHL07b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Narayan07, title = {Efficient Identity Based Signature in Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {255}, year = {2007}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2007/255}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Narayan07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ONeilGL07, title = {{VEST} Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {16}, year = {2007}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2007/016}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ONeilGL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Potlapally07, title = {Verifying Data Integrity with Few Queries to Untrusted Memory}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {27}, year = {2007}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2007/027}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Potlapally07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShaoCWL07, title = {Fully Secure Proxy Re-Encryption without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {254}, year = {2007}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2007/254}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShaoCWL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Vaya07, title = {Secure multi-party computation on incomplete networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {346}, year = {2007}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2007/346}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Vaya07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YuH07, title = {A Hybrid Approach to Concurrent Error Detection for a Compact {ASIC} Implementation of the Advanced Encryption Standard}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {72}, year = {2007}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2007/072}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YuH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhouL07, title = {Weakly only Unforgeable Signature and Its Application in Group Signature}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {80}, year = {2007}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2007/080}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhouL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.