Search dblp for Publications

export results for "toc:db/journals/iacr/iacr2007.bht:"

 download as .bib file

@article{DBLP:journals/iacr/AabidGH07,
  author       = {M. Abdelaziz Elaabid and
                  Sylvain Guilley and
                  Philippe Hoogvorst},
  title        = {Template Attacks with a Power Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {443},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/443},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AabidGH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaKN07,
  author       = {Michel Abdalla and
                  Eike Kiltz and
                  Gregory Neven},
  title        = {Generalized Key Delegation for Hierarchical Identity-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {221},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/221},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaKN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbeCIK07,
  author       = {Masayuki Abe and
                  Yang Cui and
                  Hideki Imai and
                  Eike Kiltz},
  title        = {Efficient Hybrid Encryption from ID-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {23},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/023},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbeCIK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Aciicmez07,
  author       = {Onur Acii{\c{c}}mez},
  title        = {Yet Another MicroArchitectural Attack: Exploiting I-cache},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {164},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/164},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Aciicmez07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AciicmezGS07,
  author       = {Onur Acii{\c{c}}mez and
                  Shay Gueron and
                  Jean{-}Pierre Seifert},
  title        = {New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software
                  Countermeasures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {39},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/039},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AciicmezGS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AciicmezS07,
  author       = {Onur Acii{\c{c}}mez and
                  Werner Schindler},
  title        = {A Major Vulnerability in {RSA} Implementations due to MicroArchitectural
                  Analysis Threat},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {336},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/336},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AciicmezS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AdidaW07,
  author       = {Ben Adida and
                  Douglas Wikstr{\"{o}}m},
  title        = {Offline/Online Mixing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {143},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/143},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AdidaW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalJ07,
  author       = {Dakshi Agrawal and
                  Charanjit S. Jutla},
  title        = {Utility Sampling for Trust Metrics in {PKI}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {178},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/178},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AimaniG07,
  author       = {Laila El Aimani and
                  Joachim von zur Gathen},
  title        = {Finding Low Weight Polynomial Multiples Using Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {423},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/423},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AimaniG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndreevaNPS07,
  author       = {Elena Andreeva and
                  Gregory Neven and
                  Bart Preneel and
                  Thomas Shrimpton},
  title        = {Seven-Property-Preserving Iterated Hashing: {ROX}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {176},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/176},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AndreevaNPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AntonioTN07,
  author       = {Christine Abegail Antonio and
                  Satoru Tanaka and
                  Ken Nakamula},
  title        = {Implementing Cryptographic Pairings over Curves of Embedding Degrees
                  8 and 10},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {426},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/426},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AntonioTN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AntonioTN07a,
  author       = {Christine Abegail Antonio and
                  Satoru Tanaka and
                  Ken Nakamula},
  title        = {Comparing Implementation Efficiency of Ordinary and Squared Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {457},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/457},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AntonioTN07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AokiFKLO07,
  author       = {Kazumaro Aoki and
                  Jens Franke and
                  Thorsten Kleinjung and
                  Arjen K. Lenstra and
                  Dag Arne Osvik},
  title        = {A kilobit special number field sieve factorization},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {205},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/205},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AokiFKLO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AraujoCG07,
  author       = {Roberto Ara{\'{u}}jo and
                  Ricardo Felipe Cust{\'{o}}dio and
                  Jeroen van de Graaf},
  title        = {A Verifiable Voting Protocol based on Farnel},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {252},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/252},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AraujoCG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArnaultBLM07,
  author       = {Fran{\c{c}}ois Arnault and
                  Thierry P. Berger and
                  C{\'{e}}dric Lauradoux and
                  Marine Minier},
  title        = {{X-FCSR:} a new software oriented stream cipher based upon FCSRs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {380},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/380},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArnaultBLM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtallahBF07,
  author       = {Mikhail J. Atallah and
                  Marina Blanton and
                  Keith B. Frikken},
  title        = {Incorporating Temporal Capabilities in Existing Key Management Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {245},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/245},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtallahBF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtaniAM07,
  author       = {Reza Ebrahimi Atani and
                  Shahabaddin Ebrahimi Atani and
                  Sattar Mirzakuchaki},
  title        = {A novel public key crypto system based on semi-modules over quotient
                  semi-rings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {391},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/391},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtaniAM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseBCHKPS07,
  author       = {Giuseppe Ateniese and
                  Randal C. Burns and
                  Reza Curtmola and
                  Joseph Herring and
                  Lea Kissner and
                  Zachary N. J. Peterson and
                  Dawn Song},
  title        = {Provable Data Possession at Untrusted Stores},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {202},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/202},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseBCHKPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtkinsonS07,
  author       = {Timothy Atkinson and
                  Marius Silaghi},
  title        = {Guarantees for Customers of Incentive Anonymizing Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {460},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/460},
  timestamp    = {Wed, 26 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AtkinsonS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtzemoglouM07,
  author       = {Philip Atzemoglou and
                  Tal Malkin},
  title        = {ProSiBIR: Proactive Signer-Base Intrusion Resilient Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {200},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/200},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtzemoglouM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AuSM07,
  author       = {Man Ho Au and
                  Willy Susilo and
                  Yi Mu},
  title        = {Practical Compact E-Cash},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {148},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/148},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AuSM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AuSM07a,
  author       = {Man Ho Au and
                  Willy Susilo and
                  Yi Mu},
  title        = {Practical Anonymous Divisible E-Cash From Bounded Accumulators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {459},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/459},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AuSM07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AuY07,
  author       = {Man Ho Au and
                  Siu{-}Ming Yiu},
  title        = {Structural Identity-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {422},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/422},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AuY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AumannL07,
  author       = {Yonatan Aumann and
                  Yehuda Lindell},
  title        = {Security Against Covert Adversaries: Efficient Protocols for Realistic
                  Adversaries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {60},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/060},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AumannL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AumassonFKMR07,
  author       = {Jean{-}Philippe Aumasson and
                  Simon Fischer and
                  Shahram Khazaei and
                  Willi Meier and
                  Christian Rechberger},
  title        = {New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {472},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/472},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AumassonFKMR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Avanzi07,
  author       = {Roberto Avanzi},
  title        = {Another Look at Square Roots and Traces (and Quadratic Equations)
                  in Fields of Even Characteristic},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {103},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/103},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Avanzi07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesDK07,
  author       = {Michael Backes and
                  Markus D{\"{u}}rmuth and
                  Ralf K{\"{u}}sters},
  title        = {On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {233},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/233},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesDK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesMU07,
  author       = {Michael Backes and
                  Matteo Maffei and
                  Dominique Unruh},
  title        = {Zero-Knowledge in the Applied Pi-calculus and Automated Verification
                  of the Direct Anonymous Attestation Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {289},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/289},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesMU07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesU07,
  author       = {Michael Backes and
                  Dominique Unruh},
  title        = {On the Security of Protocols with Logarithmic Communication Complexity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {169},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/169},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesU07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaekSZ07,
  author       = {Joonsang Baek and
                  Willy Susilo and
                  Jianying Zhou},
  title        = {New Constructions of Fuzzy Identity-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {47},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/047},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaekSZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BambergerWSM07,
  author       = {Walter Bamberger and
                  Oliver Welter and
                  Stephan Spitz and
                  Michael Marh{\"{o}}fer},
  title        = {Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication
                  (Revised)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {337},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/337},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BambergerWSM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BanaHO07,
  author       = {Gergei Bana and
                  Koji Hasebe and
                  Mitsuhiro Okada},
  title        = {Computational Semantics for Basic Protocol Logic - {A} Stochastic
                  Approach},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {156},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/156},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BanaHO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarakCLPR07,
  author       = {Boaz Barak and
                  Ran Canetti and
                  Yehuda Lindell and
                  Rafael Pass and
                  Tal Rabin},
  title        = {Secure Computation Without Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {464},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/464},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarakCLPR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarbosaMP07,
  author       = {Manuel Barbosa and
                  Andrew Moss and
                  Dan Page},
  title        = {Compiler Assisted Elliptic Curve Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {53},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/053},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarbosaMP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BardCJ07,
  author       = {Gregory V. Bard and
                  Nicolas T. Courtois and
                  Chris Jefferson},
  title        = {Efficient Methods for Conversion and Solution of Sparse Systems of
                  Low-Degree Multivariate Polynomials over {GF(2)} via SAT-Solvers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {24},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/024},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BardCJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Beerliova-TrubiniovaFHMZ07,
  author       = {Zuzana Beerliov{\'{a}}{-}Trub{\'{\i}}niov{\'{a}} and
                  Matthias Fitzi and
                  Martin Hirt and
                  Ueli Maurer and
                  Vassilis Zikas},
  title        = {{MPC} vs. {SFE:} Perfect Security in a Unified Corruption Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {78},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/078},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Beerliova-TrubiniovaFHMZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BelenkiyCKL07,
  author       = {Mira Belenkiy and
                  Melissa Chase and
                  Markulf Kohlweiss and
                  Anna Lysyanskaya},
  title        = {Non-Interactive Anonymous Credentials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {384},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/384},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BelenkiyCKL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareBKN07,
  author       = {Mihir Bellare and
                  Alexandra Boldyreva and
                  Lars R. Knudsen and
                  Chanathip Namprempre},
  title        = {On-Line Ciphers and the Hash-CBC Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {197},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/197},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareBKN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareR07,
  author       = {Mihir Bellare and
                  Thomas Ristenpart},
  title        = {Hash Functions in the Dedicated-Key Setting: Design Choices and {MPP}
                  Transforms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {271},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/271},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareS07,
  author       = {Mihir Bellare and
                  Sarah Shoup},
  title        = {Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir
                  without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {273},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/273},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinBLP07,
  author       = {Daniel J. Bernstein and
                  Peter Birkner and
                  Tanja Lange and
                  Christiane Peters},
  title        = {Optimizing double-base elliptic-curve single-scalar multiplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {414},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/414},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinBLP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinL07,
  author       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Faster addition and doubling on elliptic curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {286},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/286},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinL07a,
  author       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Inverted Edwards coordinates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {410},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/410},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinL07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinL07b,
  author       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Analysis and optimization of elliptic-curve single-scalar multiplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {455},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/455},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinL07b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeuchatBDO07,
  author       = {Jean{-}Luc Beuchat and
                  Nicolas Brisebarre and
                  J{\'{e}}r{\'{e}}mie Detrey and
                  Eiji Okamoto},
  title        = {Arithmetic Operators for Pairing-Based Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {91},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/091},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeuchatBDO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeuchatBDOST07,
  author       = {Jean{-}Luc Beuchat and
                  Nicolas Brisebarre and
                  J{\'{e}}r{\'{e}}mie Detrey and
                  Eiji Okamoto and
                  Masaaki Shirase and
                  Tsuyoshi Takagi},
  title        = {Algorithms and Arithmetic Operators for Computing the eta\({}_{\mbox{T}}\)
                  Pairing in Characteristic Three},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {417},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/417},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeuchatBDOST07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeuchatBSTO07,
  author       = {Jean{-}Luc Beuchat and
                  Nicolas Brisebarre and
                  Masaaki Shirase and
                  Tsuyoshi Takagi and
                  Eiji Okamoto},
  title        = {A Coprocessor for the Final Exponentiation of the eta\({}_{\mbox{T}}\)
                  Pairing in Characteristic Three},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {45},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/045},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeuchatBSTO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeuchatSTO07,
  author       = {Jean{-}Luc Beuchat and
                  Masaaki Shirase and
                  Tsuyoshi Takagi and
                  Eiji Okamoto},
  title        = {A Refined Algorithm for the eta\({}_{\mbox{T}}\) Pairing Calculation
                  in Characteristic Three},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {311},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/311},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeuchatSTO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BihamD07,
  author       = {Eli Biham and
                  Orr Dunkelman},
  title        = {Differential Cryptanalysis in Stream Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {218},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/218},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BihamD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BihamD07a,
  author       = {Eli Biham and
                  Orr Dunkelman},
  title        = {A Framework for Iterative Hash Functions - {HAIFA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {278},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/278},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BihamD07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BirkettD07,
  author       = {James Birkett and
                  Alexander W. Dent},
  title        = {Relations Among Notions of Plaintext Awareness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {291},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/291},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BirkettD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlackCS07,
  author       = {John Black and
                  Martin Cochran and
                  Thomas Shrimpton},
  title        = {On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {223},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/223},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlackCS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlackburnEN07,
  author       = {Simon R. Blackburn and
                  Tuvi Etzion and
                  Siaw{-}Lynn Ng},
  title        = {Prolific Codes with the Identifiable Parent Property},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {276},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/276},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlackburnEN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlackburnESZ07,
  author       = {Simon R. Blackburn and
                  Tuvi Etzion and
                  Douglas R. Stinson and
                  Gregory M. Zaverucha},
  title        = {A Bound on the Size of Separating Hash Families},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {304},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/304},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlackburnESZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Blanchet07,
  author       = {Bruno Blanchet},
  title        = {Computationally Sound Mechanized Proofs of Correspondence Assertions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {128},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/128},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Blanchet07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlomerK07,
  author       = {Johannes Bl{\"{o}}mer and
                  Volker Krummel},
  title        = {Analysis of countermeasures against access driven cache attacks on
                  {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  volume       = {2007/282},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/282},
  eprinttype    = {IACR},
  eprint       = {2007/282},
  timestamp    = {Tue, 30 Mar 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlomerK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bogdanov07,
  author       = {Andrey Bogdanov},
  title        = {Cryptanalysis of the KeeLoq block cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {55},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/055},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bogdanov07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogdanovP07,
  author       = {Andrey Bogdanov and
                  Andrei Pyshkin},
  title        = {Algebraic Side-Channel Collision Attacks on {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {477},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/477},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BogdanovP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BohliMR07,
  author       = {Jens{-}Matthias Bohli and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Stefan R{\"{o}}hrich},
  title        = {Bingo Voting: Secure and coercion-free voting using a trusted random
                  number generator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {162},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/162},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BohliMR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoldyrevaGOY07,
  author       = {Alexandra Boldyreva and
                  Craig Gentry and
                  Adam O'Neill and
                  Dae Hyun Yum},
  title        = {Ordered Multisignatures and Identity-Based Sequential Aggregate Signatures,
                  with Applications to Secure Routing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {438},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/438},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoldyrevaGOY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoldyrevaK07,
  author       = {Alexandra Boldyreva and
                  Virendra Kumar},
  title        = {Provable-Security Analysis of Authenticated Encryption in Kerberos},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {234},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/234},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoldyrevaK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehGH07,
  author       = {Dan Boneh and
                  Craig Gentry and
                  Michael Hamburg},
  title        = {Space-Efficient Identity Based Encryption Without Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {177},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/177},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehGH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehKOS07,
  author       = {Dan Boneh and
                  Eyal Kushilevitz and
                  Rafail Ostrovsky and
                  William E. Skeith III},
  title        = {Public Key Encryption that Allows {PIR} Queries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {73},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/073},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehKOS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BorissovLN07,
  author       = {Yuri L. Borissov and
                  Moon Ho Lee and
                  Svetla Nikova},
  title        = {On Asymptotic Behavior of the Ratio Between the Numbers of Binary
                  Primitive and Irreducible Polynomials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {301},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/301},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BorissovLN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouillaguetFSZ07,
  author       = {Charles Bouillaguet and
                  Pierre{-}Alain Fouque and
                  Adi Shamir and
                  S{\'{e}}bastien Zimmer},
  title        = {Second Preimage Attacks on Dithered Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {395},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/395},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouillaguetFSZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Boyen07,
  author       = {Xavier Boyen},
  title        = {Mesh Signatures : How to Leak a Secret with Unwitting and Unwilling
                  Participants},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {94},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/094},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Boyen07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrackenBMM07,
  author       = {Carl Bracken and
                  Eimear Byrne and
                  Nadya Markin and
                  Gary McGuire},
  title        = {Quadratic Almost Perfect Nonlinear Functions With Many Terms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {115},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/115},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrackenBMM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BraunK07,
  author       = {Michael Braun and
                  Anton Kargl},
  title        = {A Note on Signature Standards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {357},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/357},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BraunK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrickellL07,
  author       = {Ernie Brickell and
                  Jiangtao Li},
  title        = {Enhanced Privacy {ID:} {A} Direct Anonymous Attestation Scheme with
                  Enhanced Revocation Capabilities},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {194},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/194},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrickellL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BringerCI07,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Thomas Icart},
  title        = {Improved Privacy of the Tree-Based Hash protocols using Physically
                  Unclonable Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {294},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/294},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BringerCI07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Brown07,
  author       = {Daniel R. L. Brown},
  title        = {Irreducibility to the One-More Evaluation Problems: More May Be Less},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {435},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/435},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Brown07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrownG07,
  author       = {Daniel R. L. Brown and
                  Kristian Gj{\o}steen},
  title        = {A Security Analysis of the {NIST} {SP} 800-90 Elliptic Curve Random
                  Number Generator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {48},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/048},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrownG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Budaghyan07,
  author       = {Lilya Budaghyan},
  title        = {The simplest method for constructing {APN} polynomials EA-inequivalent
                  to power functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {58},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/058},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Budaghyan07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BudaghyanC07,
  author       = {Lilya Budaghyan and
                  Claude Carlet},
  title        = {Classes of Quadratic {APN} Trinomials and Hexanomials and Related
                  Structures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {98},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/098},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BudaghyanC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BudaghyanCL07,
  author       = {Lilya Budaghyan and
                  Claude Carlet and
                  Gregor Leander},
  title        = {Constructing new {APN} functions from known ones},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {63},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/063},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BudaghyanCL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BuldasL07,
  author       = {Ahto Buldas and
                  Sven Laur},
  title        = {Knowledge-Binding Commitments with Applications in Time-Stamping (Full
                  Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {71},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/071},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BuldasL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BunnO07,
  author       = {Paul Bunn and
                  Rafail Ostrovsky},
  title        = {Secure Two-Party k-Means Clustering},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {231},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/231},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BunnO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BurmesterM07,
  author       = {Mike Burmester and
                  Breno de Medeiros},
  title        = {Towards provable security for route discovery protocols in mobile
                  ad hoc networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {324},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/324},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BurmesterM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BurmesterMM07,
  author       = {Mike Burmester and
                  Breno de Medeiros and
                  Rossana Motta},
  title        = {Robust, Anonymous {RFID} Authentication with Constant Key-Lookup},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {402},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/402},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BurmesterMM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischHP07,
  author       = {Jan Camenisch and
                  Susan Hohenberger and
                  Michael {\O}stergaard Pedersen},
  title        = {Batch Verification of Short Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {172},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/172},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischHP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Canetti07,
  author       = {Ran Canetti},
  title        = {Obtaining Universally Composable Security: Towards the Bare Bones
                  of Trust},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {475},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/475},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Canetti07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiCKLP07,
  author       = {Ran Canetti and
                  Ling Cheung and
                  Dilsun Kirli Kaynar and
                  Nancy A. Lynch and
                  Olivier Pereira},
  title        = {Modeling Computational Security in Long-Lived Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {406},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/406},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiCKLP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiCLP07,
  author       = {Ran Canetti and
                  Ling Cheung and
                  Nancy A. Lynch and
                  Olivier Pereira},
  title        = {On the Role of Scheduling in Simulation-Based Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {102},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/102},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiCLP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiH07,
  author       = {Ran Canetti and
                  Susan Hohenberger},
  title        = {Chosen-Ciphertext Secure Proxy Re-Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {171},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/171},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Cao07,
  author       = {Zhengjun Cao},
  title        = {On the Big Gap Between {\(\vert\)}p{\(\vert\)} and {\(\vert\)}q{\(\vert\)}
                  in {DSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {320},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/320},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Cao07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Cao07a,
  author       = {Zhengjun Cao},
  title        = {On the Authentication of One Popular Signcryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {372},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/372},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Cao07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Cao07b,
  author       = {Zhengjun Cao},
  title        = {An Efficient Range-Bounded Commitment Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {376},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/376},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Cao07b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CaoDW07,
  author       = {Zhenfu Cao and
                  Xiaolei Dong and
                  Licheng Wang},
  title        = {New Public Key Cryptosystems Using Polynomials over Non-commutative
                  Rings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {9},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/009},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CaoDW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletKLL07,
  author       = {Claude Carlet and
                  Khoongming Khoo and
                  Chu{-}Wee Lim and
                  Chuan{-}Wen Loe},
  title        = {On an Improved Correlation Analysis of Stream Ciphers Using Muti-Output
                  Boolean Functions and the Related Generalized Notion of Nonlinearity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {207},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/207},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletKLL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletZLH07,
  author       = {Claude Carlet and
                  Xiangyong Zeng and
                  Chunlei Li and
                  Lei Hu},
  title        = {Further Properties of Several Classes of Boolean Functions with Optimum
                  Algebraic Immunity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {370},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/370},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletZLH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CastroD07a,
  author       = {Rafael Castro and
                  Ricardo Dahab},
  title        = {Efficient Certificateless Signatures Suitable for Aggregation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {454},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/454},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CastroD07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaillouxCKV07,
  author       = {Andr{\'{e}} Chailloux and
                  Dragos Florin Ciocan and
                  Iordanis Kerenidis and
                  Salil P. Vadhan},
  title        = {Interactive and Noninteractive Zero Knowledge are Equivalent in the
                  Help Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {467},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/467},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaillouxCKV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaillouxK07,
  author       = {Andr{\'{e}} Chailloux and
                  Iordanis Kerenidis},
  title        = {The role of help in Classical and Quantum Zero-Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {421},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/421},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaillouxK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChakrabortyS07,
  author       = {Debrup Chakraborty and
                  Palash Sarkar},
  title        = {{HCH:} {A} New Tweakable Enciphering Scheme Using the Hash-Counter-Hash
                  Approach},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {28},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/028},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChakrabortyS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChakrabortyS07a,
  author       = {Debrup Chakraborty and
                  Palash Sarkar},
  title        = {A General Construction of Tweakable Block Ciphers and Different Modes
                  of Operations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {29},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/029},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChakrabortyS07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChandranGS07,
  author       = {Nishanth Chandran and
                  Vipul Goyal and
                  Amit Sahai},
  title        = {New Constructions for {UC} Secure Computation using Tamper-proof Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {334},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/334},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChandranGS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangNLSH07,
  author       = {Donghoon Chang and
                  Mridul Nandi and
                  Jesang Lee and
                  Jaechul Sung and
                  Seokhie Hong},
  title        = {Compression Function Design Principles Supporting Variable Output
                  Lengths from a Single Small Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {416},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/416},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangNLSH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChatterjeeS07,
  author       = {Sanjit Chatterjee and
                  Palash Sarkar},
  title        = {Constant Size Ciphertext {HIBE} in the Augmented Selective-ID Model
                  and its Extensions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {84},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/084},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChatterjeeS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaumGRV07,
  author       = {David Chaum and
                  Jeroen van de Graaf and
                  Peter Y. A. Ryan and
                  Poorvi L. Vora},
  title        = {Secret Ballot Elections with Unconditional Integrity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {270},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/270},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaumGRV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenT07,
  author       = {Liqun Chen and
                  Qiang Tang},
  title        = {Bilateral Unknown Key-Share Attacks in Key Agreement Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {209},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/209},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenX07,
  author       = {Zhixiong Chen and
                  Guozhen Xiao},
  title        = {'Good' Pseudo-Random Binary Sequences from Elliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {275},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/275},
  timestamp    = {Mon, 07 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenX07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CheungCKN07,
  author       = {Ling Cheung and
                  Joseph A. Cooley and
                  Roger I. Khazan and
                  Calvin C. Newport},
  title        = {Collusion-Resistant Group Key Management Using Attribute-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {161},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/161},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CheungCKN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CheungMP07,
  author       = {Ling Cheung and
                  Sayan Mitra and
                  Olivier Pereira},
  title        = {Verifying Statistical Zero Knowledge with Approximate Implementations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {195},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/195},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CheungMP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CheungN07,
  author       = {Ling Cheung and
                  Calvin C. Newport},
  title        = {Provably Secure Ciphertext Policy {ABE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {183},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/183},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CheungN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChmielewskiH07,
  author       = {Lukasz Chmielewski and
                  Jaap{-}Henk Hoepman},
  title        = {Fuzzy Private Matching (Extended Abstract)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {363},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/363},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChmielewskiH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoP07,
  author       = {Joo Yeon Cho and
                  Josef Pieprzyk},
  title        = {Multiple Modular Additions and Crossword Puzzle Attack on NLSv2},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {38},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/038},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoP07a,
  author       = {Joo Yeon Cho and
                  Josef Pieprzyk},
  title        = {An Improved Distinguisher for Dragon},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {108},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/108},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoP07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoiHK07,
  author       = {Dooho Choi and
                  Dong{-}Guk Han and
                  Howon Kim},
  title        = {Construction of Efficient and Secure Pairing Algorithm and its Application},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {296},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/296},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoiHK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Choo07,
  author       = {Kim{-}Kwang Raymond Choo},
  title        = {A Proof of Revised Yahalom Protocol in the Bellare and Rogaway {(1993)}
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {188},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/188},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Choo07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChouCC07,
  author       = {Jue{-}Sam Chou and
                  Yalin Chen and
                  Chung{-}Ju Chan},
  title        = {Cryptanalysis of Hwang-Chang's a Time-Stamp Protocol for Digital Watermarking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {4},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/004},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChouCC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChouCC07a,
  author       = {Jue{-}Sam Chou and
                  Yalin Chen and
                  Tsung{-}Heng Chen},
  title        = {A Novel Secure Session Key Generation using two-level architecture
                  For Cluster-Based Ad Hoc Networks Based On ID-Based Bilinear Paring},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {180},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/180},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChouCC07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChouLC07,
  author       = {Jue{-}Sam Chou and
                  Guey{-}Chuen Lee and
                  Chung{-}Ju Chan},
  title        = {A Novel Mutual Authentication Scheme Based on Quadratic Residues for
                  {RFID} Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {224},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/224},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChouLC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChowC07,
  author       = {Sherman S. M. Chow and
                  Kim{-}Kwang Raymond Choo},
  title        = {Strongly-Secure Identity-based Key Agreement and Anonymous Extension},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {18},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/018},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChowC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChowY07,
  author       = {Sherman S. M. Chow and
                  Wun{-}She Yap},
  title        = {Certificateless Ring Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {236},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/236},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChowY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChuT07,
  author       = {Cheng{-}Kang Chu and
                  Wen{-}Guey Tzeng},
  title        = {Identity-Committable Signatures and Their Extension to Group-Oriented
                  Ring Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {354},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/354},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChuT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CiocanV07,
  author       = {Dragos Florin Ciocan and
                  Salil P. Vadhan},
  title        = {Interactive and Noninteractive Zero Knowledge Coincide in the Help
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {389},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/389},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CiocanV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Cochran07,
  author       = {Martin Cochran},
  title        = {Notes on the Wang et al. 2\({}^{\mbox{63}}\) {SHA-1} Differential
                  Path},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {474},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/474},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Cochran07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Coelho07,
  author       = {Fabien Coelho},
  title        = {An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol
                  based on Merkle Trees},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {433},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/433},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Coelho07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ContiniMPSGLW07,
  author       = {Scott Contini and
                  Krystian Matusiewicz and
                  Josef Pieprzyk and
                  Ron Steinfeld and
                  Jian Guo and
                  San Ling and
                  Huaxiong Wang},
  title        = {Cryptanalysis of {LASH}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {430},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/430},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ContiniMPSGLW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CortierKW07,
  author       = {V{\'{e}}ronique Cortier and
                  Ralf K{\"{u}}sters and
                  Bogdan Warinschi},
  title        = {A Cryptographic Model for Branching Time Security Properties - the
                  Case of Contract Signing Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {251},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/251},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CortierKW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CostiganS07,
  author       = {Neil Costigan and
                  Michael Scott},
  title        = {Accelerating {SSL} using the Vector processors in IBM's Cell Broadband
                  Engine for Sony's Playstation 3},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {61},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/061},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CostiganS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Courtois07,
  author       = {Nicolas T. Courtois},
  title        = {{CTC2} and Fast Algebraic Attacks on Block Ciphers Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {152},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/152},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Courtois07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CourtoisBW07,
  author       = {Nicolas T. Courtois and
                  Gregory V. Bard and
                  David A. Wagner},
  title        = {Algebraic and Slide Attacks on KeeLoq},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {62},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/062},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CourtoisBW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Csirmaz07,
  author       = {L{\'{a}}szl{\'{o}} Csirmaz},
  title        = {Secret sharing on infinite graphs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {297},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/297},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Csirmaz07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Csirmaz07a,
  author       = {L{\'{a}}szl{\'{o}} Csirmaz},
  title        = {Secret sharing on the infinite ladder},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {355},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/355},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Csirmaz07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CuiFHI007,
  author       = {Yang Cui and
                  Eiichiro Fujisaki and
                  Goichiro Hanaoka and
                  Hideki Imai and
                  Rui Zhang},
  title        = {Formal Security Treatments for IBE-to-Signature Transformation: Relations
                  among Security Notions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {30},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/030},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CuiFHI007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DahmenOS07,
  author       = {Erik Dahmen and
                  Katsuyuki Okeya and
                  Daniel Schepers},
  title        = {Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {268},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/268},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DahmenOS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaiK07,
  author       = {Wei Dai and
                  Ted Krovetz},
  title        = {{VHASH} Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {338},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/338},
  timestamp    = {Wed, 15 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DaiK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardFRSS07,
  author       = {Ivan Damg{\aa}rd and
                  Serge Fehr and
                  Renato Renner and
                  Louis Salvail and
                  Christian Schaffner},
  title        = {A Tight High-Order Entropic Quantum Uncertainty Relation With Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {328},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/328},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardFRSS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardFSS07,
  author       = {Ivan Damg{\aa}rd and
                  Serge Fehr and
                  Louis Salvail and
                  Christian Schaffner},
  title        = {Secure Identification and {QKD} in the Bounded-Quantum-Storage Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {327},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/327},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardFSS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardNW07,
  author       = {Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen and
                  Daniel Wichs},
  title        = {Isolated Proofs of Knowledge and Isolated Zero Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {331},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/331},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardNW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardNW07a,
  author       = {Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen and
                  Daniel Wichs},
  title        = {Universally Composable Multiparty Computation with Partially Isolated
                  Parties},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {332},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/332},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardNW07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardT07,
  author       = {Ivan Damg{\aa}rd and
                  Rune Thorbek},
  title        = {Non-Interactive Proofs for Integer Multiplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {86},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/086},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DavidaH07,
  author       = {George I. Davida and
                  Jeremy A. Hansen},
  title        = {A Four-Component Framework for Designing and Analyzing Cryptographic
                  Hash Algorithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {240},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/240},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DavidaH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DazaHMR07,
  author       = {Vanesa Daza and
                  Javier Herranz and
                  Paz Morillo and
                  Carla R{\`{a}}fols},
  title        = {CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {127},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/127},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DazaHMR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DedicHR07,
  author       = {Nenad Dedic and
                  Danny Harnik and
                  Leonid Reyzin},
  title        = {Saving Private Randomness in One-Way Functions and Pseudorandom Generators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {458},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/458},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DedicHR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DegabrieleP07,
  author       = {Jean Paul Degabriele and
                  Kenneth G. Paterson},
  title        = {Attacking the IPsec Standards in Encryption-only Configurations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {125},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/125},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DegabrieleP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DemirkiranN07,
  author       = {Cevahir Demirkiran and
                  Enric Nart},
  title        = {Counting hyperelliptic curves that admit a Koblitz model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {174},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/174},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DemirkiranN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DentLP07,
  author       = {Alexander W. Dent and
                  Beno{\^{\i}}t Libert and
                  Kenneth G. Paterson},
  title        = {Certificateless Encryption Schemes Strongly Secure in the Standard
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {121},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/121},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DentLP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DevegiliSD07,
  author       = {Augusto Jun Devegili and
                  Michael Scott and
                  Ricardo Dahab},
  title        = {Implementing Cryptographic Pairings over Barreto-Naehrig Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {390},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/390},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DevegiliSD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DingL07,
  author       = {Jintai Ding and
                  Richard Lindner},
  title        = {Identifying Ideal Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {322},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/322},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DingL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DingW07,
  author       = {Jintai Ding and
                  John Wagner},
  title        = {Cryptanalysis of Rational Multivariate Public Key Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {367},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/367},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DingW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DingY07,
  author       = {Jintai Ding and
                  Bo{-}Yin Yang},
  title        = {Multivariates Polynomials for Hashing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {137},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/137},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DingY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DingYCCD07,
  author       = {Jintai Ding and
                  Bo{-}Yin Yang and
                  Chen{-}Mou Cheng and
                  Chia{-}Hsin Owen Chen and
                  Vivien Dubois},
  title        = {Breaking the Symmetry: a Way to Resist the New Differential Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {366},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/366},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DingYCCD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisLY07,
  author       = {Yevgeniy Dodis and
                  Pil Joong Lee and
                  Dae Hyun Yum},
  title        = {Optimistic Fair Exchange in a Multi-user Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {182},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/182},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisLY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DorrendorfGP07,
  author       = {Leo Dorrendorf and
                  Zvi Gutterman and
                  Benny Pinkas},
  title        = {Cryptanalysis of the Random Number Generator of the Windows Operating
                  System},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {419},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/419},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DorrendorfGP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuW07,
  author       = {Hongzhen Du and
                  Qiaoyan Wen},
  title        = {Efficient and Provably-Secure Certificateless Short Signature Scheme
                  from Bilinear Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {250},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/250},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuboisFSS07,
  author       = {Vivien Dubois and
                  Pierre{-}Alain Fouque and
                  Adi Shamir and
                  Jacques Stern},
  title        = {Practical Cryptanalysis of {SFLASH}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {141},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/141},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuboisFSS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DziembowskiP07,
  author       = {Stefan Dziembowski and
                  Krzysztof Pietrzak},
  title        = {Intrusion-Resilient Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {359},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/359},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DziembowskiP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/El-FotouhD07,
  author       = {Mohamed Abo El{-}Fotouh and
                  Klaus Diepold},
  title        = {Statistical Testing for Disk Encryption Modes of Operations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {362},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/362},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/El-FotouhD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ellison07,
  author       = {Carl M. Ellison},
  title        = {Ceremony Design and Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {399},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/399},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ellison07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EvdokimovG07,
  author       = {Sergei Evdokimov and
                  Oliver G{\"{u}}nther},
  title        = {Encryption Techniques for Secure Database Outsourcing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {335},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/335},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EvdokimovG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FanSGL07,
  author       = {Haining Fan and
                  Jiaguang Sun and
                  Ming Gu and
                  Kwok{-}Yan Lam},
  title        = {Overlap-free Karatsuba-Ofman Polynomial Multiplication Algorithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {393},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/393},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FanSGL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FehrS07,
  author       = {Serge Fehr and
                  Christian Schaffner},
  title        = {Randomness Extraction via Delta-Biased Masking in the Presence of
                  a Quantum Attacker},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {249},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/249},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FehrS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FengW07,
  author       = {Rongquan Feng and
                  Hongfeng Wu},
  title        = {Efficient Pairing Computation on Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {138},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/138},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FengW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FouqueLN07,
  author       = {Pierre{-}Alain Fouque and
                  Ga{\"{e}}tan Leurent and
                  Phong Q. Nguyen},
  title        = {Automatic Search of Differential Path in {MD4}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {206},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/206},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FouqueLN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FranklinGM07,
  author       = {Matthew K. Franklin and
                  Mark A. Gondree and
                  Payman Mohassel},
  title        = {Multi-Party Indirect Indexing and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {341},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/341},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FranklinGM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Freeman07,
  author       = {David Freeman},
  title        = {Constructing pairing-friendly genus 2 curves over prime fields with
                  ordinary Jacobians},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {57},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/057},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Freeman07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FreemanL07,
  author       = {David Freeman and
                  Kristin E. Lauter},
  title        = {Computing endomorphism rings of Jacobians of genus 2 curves over finite
                  fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {10},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/010},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FreemanL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithHV07,
  author       = {Steven D. Galbraith and
                  Florian Hess and
                  Frederik Vercauteren},
  title        = {Aspects of Pairing Inversion},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {256},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/256},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithHV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaoWWL07,
  author       = {Wei Gao and
                  Xueli Wang and
                  Guilin Wang and
                  Fei Li},
  title        = {One-Round ID-Based Blind Signature Scheme without {ROS} Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {7},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/007},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaoWWL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarayO07,
  author       = {Juan A. Garay and
                  Rafail Ostrovsky},
  title        = {Almost-everywhere Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {394},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/394},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarayO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GauravaramK07,
  author       = {Praveen Gauravaram and
                  John Kelsey},
  title        = {Cryptanalysis of a class of cryptographic hash functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {277},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/277},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GauravaramK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaziS07,
  author       = {Peter Gazi and
                  Martin Stanek},
  title        = {On Ciphertext Undetectability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {388},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/388},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaziS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GeiselmannS07,
  author       = {Willi Geiselmann and
                  Rainer Steinwandt},
  title        = {Cryptanalysis of a Hash Function Proposed at {ICISC} 2006},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {272},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/272},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GeiselmannS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gennaro07,
  author       = {Rosario Gennaro},
  title        = {Faster and Shorter Password-Authenticated Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {325},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/325},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gennaro07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryPV07,
  author       = {Craig Gentry and
                  Chris Peikert and
                  Vinod Vaikuntanathan},
  title        = {Trapdoors for Hard Lattices and New Cryptographic Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {432},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/432},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryPV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GeronW07,
  author       = {Erel Geron and
                  Avishai Wool},
  title        = {{CRUST:} Cryptographic Remote Untrusted Storage without Public Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {267},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/267},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GeronW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GierlichsBT07,
  author       = {Benedikt Gierlichs and
                  Lejla Batina and
                  Pim Tuyls},
  title        = {Mutual Information Analysis - {A} Universal Differential Side-Channel
                  Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {198},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/198},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GierlichsBT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GittinsL07,
  author       = {Benjamin Gittins and
                  Howard A. Landman},
  title        = {Rebuttal of overtaking {VEST}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {124},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/124},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GittinsL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gligoroski07,
  author       = {Danilo Gligoroski},
  title        = {On the insecurity of interchanged use of {OFB} and {CBC} modes of
                  operation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {385},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/385},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gligoroski07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GligoroskiK07,
  author       = {Danilo Gligoroski and
                  Svein Johan Knapskog},
  title        = {Edon-R(256, 384, 512) - an Efficient Implementation of Edon-R\} Family
                  of Cryptographic Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {154},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/154},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GligoroskiK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GligoroskiK07a,
  author       = {Danilo Gligoroski and
                  Svein Johan Knapskog},
  title        = {Turbo {SHA-2}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {403},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/403},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GligoroskiK07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldenbergHLSS07,
  author       = {David Goldenberg and
                  Susan Hohenberger and
                  Moses D. Liskov and
                  Elizabeth Crump Schwartz and
                  Hakan Seyalioglu},
  title        = {On Tweaking Luby-Rackoff Blockciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {350},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/350},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldenbergHLSS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GomezGI07,
  author       = {Domingo G{\'{o}}mez and
                  Jaime Gutierrez and
                  {\'{A}}lvar Ibeas},
  title        = {An Algorithm for Finding Small Roots of Multivariate Polynomials over
                  the Integers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {88},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/088},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GomezGI07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GongLC07,
  author       = {Zheng Gong and
                  Xuejia Lai and
                  Kefei Chen},
  title        = {A Synthetic Indifferentiability Analysis of Some Block-Cipher-Based
                  Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {465},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/465},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GongLC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GosperS07,
  author       = {R. Wm. Gosper and
                  Rich Schroeppel},
  title        = {Somos Sequence Near-Addition Formulas and Modular Theta Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {96},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/096},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GosperS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoubinMQ07,
  author       = {Louis Goubin and
                  Jean{-}Michel Masereel and
                  Micha{\"{e}}l Quisquater},
  title        = {Cryptanalysis of white box {DES} implementations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {35},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/035},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoubinMQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Goyal07,
  author       = {Vipul Goyal},
  title        = {Reducing Trust in the {PKG} in Identity Based Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {368},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/368},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Goyal07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalK07,
  author       = {Vipul Goyal and
                  Jonathan Katz},
  title        = {Universally Composable Multi-Party Computation with an Unreliable
                  Common Reference String},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {369},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/369},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Graaf07,
  author       = {Jeroen van de Graaf},
  title        = {Voting with Unconditional Privacy by Merging Pr{\^{e}}t-{\`{a}}-Voter
                  and PunchScan},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {269},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/269},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Graaf07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GreenH07,
  author       = {Matthew Green and
                  Susan Hohenberger},
  title        = {Blind Identity-Based Encryption and Simulatable Oblivious Transfer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {235},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/235},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GreenH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Grnauer07,
  author       = {Gerold Grnauer},
  title        = {Proposal of a new efficient public key system for encryption and digital
                  signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {445},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/445},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Grnauer07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GroszschaedlST07,
  author       = {Johann Gro{\ss}sch{\"{a}}dl and
                  Alexander Szekely and
                  Stefan Tillich},
  title        = {The Energy Cost of Cryptographic Key Establishment in Wireless Sensor
                  Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {3},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/003},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GroszschaedlST07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Groth07,
  author       = {Jens Groth},
  title        = {Fully Anonymous Group Signatures without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {186},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/186},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Groth07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrothS07,
  author       = {Jens Groth and
                  Amit Sahai},
  title        = {Efficient Non-interactive Proof Systems for Bilinear Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {155},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/155},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrothS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GutierrezI07,
  author       = {Jaime Gutierrez and
                  {\'{A}}lvar Ibeas},
  title        = {Inferring sequences produced by a linear congruential generator on
                  elliptic curves missing high-order bits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {99},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/099},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GutierrezI07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Haber07,
  author       = {Stuart Haber},
  title        = {Long-lived digital integrity using short-lived hash functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {238},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/238},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Haber07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaitnerHRS07,
  author       = {Iftach Haitner and
                  Jonathan J. Hoch and
                  Omer Reingold and
                  Gil Segev},
  title        = {Finding Collisions in Interactive Protocols - {A} Tight Lower Bound
                  on the Round Complexity of Statistically-Hiding Commitments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {145},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/145},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaitnerHRS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaitnerHS07,
  author       = {Iftach Haitner and
                  Jonathan J. Hoch and
                  Gil Segev},
  title        = {A Linear Lower Bound on the Communication Complexity of Single-Server
                  Private Information Retrieval},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {351},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/351},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaitnerHS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Halevi07,
  author       = {Shai Halevi},
  title        = {Invertible Universal Hashing and the {TET} Encryption Mode},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {14},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/014},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Halevi07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviK07,
  author       = {Shai Halevi and
                  Yael Tauman Kalai},
  title        = {Smooth Projective Hashing and Two-Message Oblivious Transfer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {118},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/118},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviK07a,
  author       = {Shai Halevi and
                  Hugo Krawczyk},
  title        = {Security under Key-Dependent Inputs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {315},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/315},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviK07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HanZC07,
  author       = {Wei Han and
                  Dong Zheng and
                  Kefei Chen},
  title        = {Filling the Gap between Voters and Cryptography in e-Voting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {266},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/266},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HanZC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HawkesMPRV07,
  author       = {Philip Hawkes and
                  Cameron McDonald and
                  Michael Paddon and
                  Gregory G. Rose and
                  Miriam Wiggers de Vries},
  title        = {Design and Primitive Specification for Shannon},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {44},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/044},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HawkesMPRV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HemenwayO07,
  author       = {Brett Hemenway and
                  Rafail Ostrovsky},
  title        = {Public Key Encryption Which is Simultaneously a Locally-Decodable
                  Error-Correcting Code},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {83},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/083},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HemenwayO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HenrySS07,
  author       = {Kevin J. Henry and
                  Douglas R. Stinson and
                  Jiayuan Sui},
  title        = {The Effectiveness of Receipt-Based Attacks on ThreeBallot},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {287},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/287},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HenrySS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HerrmannM07,
  author       = {Mathias Herrmann and
                  Alexander May},
  title        = {On Factoring Arbitrary Integers with Known Bits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {374},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/374},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HerrmannM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HerzbergY07,
  author       = {Amir Herzberg and
                  Igal Yoffe},
  title        = {The Delivery and Evidences Layer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {139},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/139},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HerzbergY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hirshman07,
  author       = {Gregory Hirshman},
  title        = {Further Musings on the Wang et al. {MD5} Collision: Improvements and
                  Corrections on the Work of Hawkes, Paddon, and Rose},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {375},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/375},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hirshman07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HisilWCD07,
  author       = {H{\"{u}}seyin Hisil and
                  Kenneth Koon{-}Ho Wong and
                  Gary Carter and
                  Ed Dawson},
  title        = {Faster Group Operations on Elliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {441},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/441},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HisilWCD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hitt07,
  author       = {Laura Hitt},
  title        = {Families of genus 2 curves with small embedding degree},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/001},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hitt07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hitt07a,
  author       = {Laura Hitt},
  title        = {Updated standards for validating elliptic curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {343},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/343},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hitt07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HlavacR07,
  author       = {Martin Hlav{\'{a}}c and
                  Tom{\'{a}}s Rosa},
  title        = {A Note on the Relay Attacks on e-passports: The Case of Czech e-passports},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {244},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/244},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HlavacR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HofheinzK07,
  author       = {Dennis Hofheinz and
                  Eike Kiltz},
  title        = {Secure Hybrid Encryption from Weakened Key Encapsulation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {288},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/288},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HofheinzK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HofheinzU07,
  author       = {Dennis Hofheinz and
                  Dominique Unruh},
  title        = {Towards Key-Dependent Message Security in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {333},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/333},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HofheinzU07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HongCSLHLMC07,
  author       = {Deukjo Hong and
                  Donghoon Chang and
                  Jaechul Sung and
                  Sangjin Lee and
                  Seokhie Hong and
                  Jesang Lee and
                  Dukjae Moon and
                  Sungtaek Chee},
  title        = {New {FORK-256}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {185},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/185},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HongCSLHLMC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Howgrave-Graham07,
  author       = {Nicholas A. Howgrave{-}Graham},
  title        = {Isodual Reduction of Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {105},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/105},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Howgrave-Graham07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuWHYD07,
  author       = {Bessie C. Hu and
                  Duncan S. Wong and
                  Qiong Huang and
                  Guomin Yang and
                  Xiaotie Deng},
  title        = {Time Capsule Signature: Efficient and Provably Secure Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {146},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/146},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuWHYD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangGKE07,
  author       = {Miaoqing Huang and
                  Kris Gaj and
                  Soonhak Kwon and
                  Tarek A. El{-}Ghazawi},
  title        = {An Optimized Hardware Architecture of Montgomery Multiplication Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {228},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/228},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangGKE07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangW07,
  author       = {Qiong Huang and
                  Duncan S. Wong},
  title        = {Generic Certificateless Encryption in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {95},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/095},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HwangLC07,
  author       = {Yong Ho Hwang and
                  Joseph K. Liu and
                  Sherman S. M. Chow},
  title        = {Certificateless Public Key Encryption Secure against Malicious {KGC}
                  Attacks in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {262},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/262},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HwangLC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IzuKKS07,
  author       = {Tetsuya Izu and
                  Jun Kogure and
                  Takeshi Koshiba and
                  Takeshi Shimoyama},
  title        = {Low-Density Attack Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {66},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/066},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IzuKKS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JhaKSVC07,
  author       = {Somesh Jha and
                  Stefan Katzenbeisser and
                  Christian Schallhart and
                  Helmut Veith and
                  Stephen Chenney},
  title        = {Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual
                  Environments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {56},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/056},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JhaKSVC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JhoKHL07,
  author       = {Nam{-}Su Jho and
                  Myung{-}Hwan Kim and
                  Dowon Hong and
                  Byung{-}Gil Lee},
  title        = {Multiparty Key Agreement Using Bilinear Map},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {439},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/439},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JhoKHL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Jiang07,
  author       = {Shaoquan Jiang},
  title        = {Deniable Authentication on the Internet},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {82},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/082},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Jiang07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JiangDH07,
  author       = {Xin Jiang and
                  Jintai Ding and
                  Lei Hu},
  title        = {Kipnis-Shamir's Attack on {HFE} Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {203},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/203},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JiangDH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JouxNT07,
  author       = {Antoine Joux and
                  David Naccache and
                  Emmanuel Thom{\'{e}}},
  title        = {When e-th Roots Become Easier Than Factoring},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {424},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/424},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JouxNT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KachisaSS07,
  author       = {Ezekiel J. Kachisa and
                  Edward F. Schaefer and
                  Michael Scott},
  title        = {Constructing Brezing-Weng pairing friendly elliptic curves using elements
                  in the cyclotomic field},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {452},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/452},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KachisaSS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kaiser07,
  author       = {Ulrich Kaiser},
  title        = {{UICE:} {A} High-Performance Cryptographic Module for SoC and {RFID}
                  Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {258},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/258},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kaiser07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kan07,
  author       = {Wilson Kan},
  title        = {Analysis of Underlying Assumptions in {NIST} DRBGs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {345},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/345},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kan07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kang07,
  author       = {Woo Sug Kang},
  title        = {Construction of Pairing-Friendly Elliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {110},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/110},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kang07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kara07,
  author       = {Orhun Kara},
  title        = {Reflection Attacks on Product Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {43},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/043},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kara07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KarabinaT07,
  author       = {Koray Karabina and
                  Edlyn Teske},
  title        = {On prime-order elliptic curves with embedding degrees k=3, 4 and 6},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {425},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/425},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KarabinaT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kasahara07,
  author       = {Masao Kasahara},
  title        = {A generalization of Secret Sharing Scheme on the Basis of Recovering
                  Algorithm, {K-RA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {106},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/106},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kasahara07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Katz07,
  author       = {Jonathan Katz},
  title        = {Which Languages Have 4-Round Zero-Knowledge Proofs?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {265},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/265},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Katz07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KatzKK07,
  author       = {Jonathan Katz and
                  Chiu{-}Yuen Koo and
                  Ranjit Kumaresan},
  title        = {Improving the Round Complexity of {VSS} in Point-to-Point Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {358},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/358},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KatzKK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KatzSW07,
  author       = {Jonathan Katz and
                  Amit Sahai and
                  Brent Waters},
  title        = {Predicate Encryption Supporting Disjunctions, Polynomial Equations,
                  and Inner Products},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {404},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/404},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KatzSW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KavutY07,
  author       = {Sel{\c{c}}uk Kavut and
                  Melek Diker Y{\"{u}}cel},
  title        = {Generalized Rotation Symmetric and Dihedral Symmetric Boolean Functions
                  - 9 variable Boolean Functions with Nonlinearity 242},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {308},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/308},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KavutY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KavutY07a,
  author       = {Sel{\c{c}}uk Kavut and
                  Melek Diker Y{\"{u}}cel},
  title        = {Balanced Boolean Functions with Nonlinearity {\textgreater} 2\({}^{\mbox{n-1}}\)
                  - 2\({}^{\mbox{(n-1)/2}}\)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {321},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/321},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KavutY07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Khader07,
  author       = {Dalia Khader},
  title        = {Attribute Based Group Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {159},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/159},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Khader07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Khader07a,
  author       = {Dalia Khader},
  title        = {Attribute Based Group Signature with Revocation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {241},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/241},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Khader07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Khalyavin07,
  author       = {Andrey Khalyavin},
  title        = {The constructing of 3-resilient Boolean functions of 9 variables with
                  nonlinearity 240},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {212},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/212},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Khalyavin07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhooCGL07,
  author       = {Khoongming Khoo and
                  Guanhan Chew and
                  Guang Gong and
                  Hian{-}Kiat Lee},
  title        = {Time-Memory-Data Trade-off Attack on Stream Ciphers based on Maiorana-McFarland
                  Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {242},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/242},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KhooCGL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasTY07,
  author       = {Aggelos Kiayias and
                  Yiannis Tsiounis and
                  Moti Yung},
  title        = {Group Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {15},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/015},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasTY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasY07,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {Cryptographic Hardness based on the Decoding of Reed-Solomon Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {153},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/153},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasZ07,
  author       = {Aggelos Kiayias and
                  Hong{-}Sheng Zhou},
  title        = {Equivocal Blind Signatures and Adaptive UC-Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {132},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/132},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasZ07a,
  author       = {Aggelos Kiayias and
                  Hong{-}Sheng Zhou},
  title        = {Hidden Identity-Based Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {140},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/140},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasZ07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KidronL07,
  author       = {Dafna Kidron and
                  Yehuda Lindell},
  title        = {Impossibility Results for Universal Composability in Public-Key Models
                  and with Fixed Inputs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {478},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/478},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KidronL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kiltz07,
  author       = {Eike Kiltz},
  title        = {From Selective-ID to Full Security: The Case of the Inversion-Based
                  Boneh-Boyen {IBE} Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {33},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/033},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kiltz07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kiltz07a,
  author       = {Eike Kiltz},
  title        = {Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {36},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/036},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kiltz07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kim07,
  author       = {Kwang Ho Kim},
  title        = {A Note on Point Multiplication on Supersingular Elliptic Curves over
                  Ternary Fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {310},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/310},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kim07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimK07,
  author       = {Kwang Ho Kim and
                  So In Kim},
  title        = {A New Method for Speeding Up Arithmetic on Elliptic Curves over Binary
                  Fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {181},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/181},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimKC07,
  author       = {Kwang Ho Kim and
                  So In Kim and
                  Ju Song Choe},
  title        = {New Fast Algorithms for Arithmetic on Elliptic Curves over Fields
                  of Characteristic Three},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {179},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/179},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimKC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Klima07,
  author       = {Vlastimil Kl{\'{\i}}ma},
  title        = {Special block cipher family {DN} and new generation SNMAC-type hash
                  function family {HDN}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {50},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/050},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Klima07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KlonowskiKRR07,
  author       = {Marek Klonowski and
                  Miroslaw Kutylowski and
                  Michal Ren and
                  Katarzyna Rybarczyk},
  title        = {Forward-secure Key Evolution in Wireless Sensor Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {237},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/237},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KlonowskiKRR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoLT07,
  author       = {Ki Hyoung Ko and
                  Jang{-}Won Lee and
                  Tony Thomas},
  title        = {Towards Generating Secure Keys for Braid Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {149},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/149},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoLT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KobaraMO07,
  author       = {Kazukuni Kobara and
                  Kirill Morozov and
                  Raphael Overbeck},
  title        = {Oblivious Transfer via McEliece's {PKC} and Permuted Kernels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {382},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/382},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KobaraMO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Koblitz07,
  author       = {Neal Koblitz},
  title        = {Another Look at Automated Theorem-Proving},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {401},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/401},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Koblitz07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoblitzM07,
  author       = {Neal Koblitz and
                  Alfred Menezes},
  title        = {Another Look at Non-Standard Discrete Log and Diffie-Hellman Problems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {442},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/442},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoblitzM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kocar07,
  author       = {Osman Kocar},
  title        = {Estimation of keys stored in {CMOS} cryptographic device after baking
                  by using the charge shift},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {134},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/134},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kocar07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KolokotronisLK07,
  author       = {Nicholas Kolokotronis and
                  Konstantinos Limniotis and
                  Nicholas Kalouptsidis},
  title        = {Best Quadratic Approximations of Cubic Boolean Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {37},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/037},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KolokotronisLK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KuhlmanMBET07,
  author       = {Doug Kuhlman and
                  Ryan Moriarty and
                  Tony Braskich and
                  Steve Emeott and
                  Mahesh V. Tripunitara},
  title        = {A Proof of Security of a Mesh Security Architecture},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {364},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/364},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KuhlmanMBET07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kumar07,
  author       = {Manoj Kumar},
  title        = {A Forward Secure Remote User Authentication Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {303},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/303},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kumar07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KurosawaK07,
  author       = {Kaoru Kurosawa and
                  Takeshi Koshiba},
  title        = {Direct Reduction of String (1, 2)-OT to Rabin's {OT}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {46},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/046},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KurosawaK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KurosawaKK07,
  author       = {Kaoru Kurosawa and
                  Wataru Kishimoto and
                  Takeshi Koshiba},
  title        = {How to Derive Lower Bound on Oblivious Transfer Reduction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {65},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/065},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KurosawaKK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KurosawaS07,
  author       = {Kaoru Kurosawa and
                  Kazuhiro Suzuki},
  title        = {Almost Secure (1-Round, n-Channel) Message Transmission Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {76},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/076},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KurosawaS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KuwakadoM07,
  author       = {Hidenori Kuwakado and
                  Masakatu Morii},
  title        = {Compression Functions Suitable for the Multi-Property-Preserving Transform},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {302},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/302},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KuwakadoM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LalG07,
  author       = {Sunder Lal and
                  K. K. Goyal},
  title        = {An Improved Remote User Authentication Scheme using Bilinear Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {440},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/440},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LalG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LalS07,
  author       = {Sunder Lal and
                  Priyam Sharma},
  title        = {Security Proof for Shengbao Wang's Identity-Based Encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {316},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/316},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LalS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LalS07a,
  author       = {Sunder Lal and
                  Priyam Sharma},
  title        = {Remarks on {IBE} Scheme of Wang and Cao},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {400},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/400},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LalS07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LalV07,
  author       = {Sunder Lal and
                  Vandani Verma},
  title        = {Some Identity Based Strong Bi-Designated Verifier Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {193},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/193},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LalV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeBM07,
  author       = {Tri Van Le and
                  Mike Burmester and
                  Breno de Medeiros},
  title        = {Forward-secure {RFID} Authentication and Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {51},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/051},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeBM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeNCC07,
  author       = {Thanh{-}Ha Le and
                  Quoc{-}Thinh Nguyen{-}Vuong and
                  C{\'{e}}cile Canovas and
                  Jessy Cl{\'{e}}di{\`{e}}re},
  title        = {Novel Approaches for Improving the Power Consumption Models in Correlation
                  Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {306},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/306},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeNCC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeePH07,
  author       = {Dong Hoon Lee and
                  Je Hong Park and
                  Jae Woo Han},
  title        = {Security analysis of the variant of the self-shrinking generator proposed
                  at {ICISC} 2006},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {8},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/008},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeePH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LemieuxT07,
  author       = {Stephane Lemieux and
                  Adrian Tang},
  title        = {Clone Resistant Mutual Authentication for Low-Cost {RFID} Technology},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {170},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/170},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LemieuxT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Li07,
  author       = {An{-}Ping Li},
  title        = {A New Type of Cipher: DICING{\_}CSB},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {34},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/034},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Li07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiC07,
  author       = {Chengqing Li and
                  Guanrong Chen},
  title        = {On the security of a class of image encryption schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {339},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/339},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiLANAC07a,
  author       = {Chengqing Li and
                  Shujun Li and
                  Muhammad Asim and
                  Juana Nunez and
                  Gonzalo {\'{A}}lvarez and
                  Guanrong Chen},
  title        = {On the security defects of an image encryption scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {397},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/397},
  timestamp    = {Thu, 18 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiLANAC07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiangCSL07,
  author       = {Xiaohui Liang and
                  Zhenfu Cao and
                  Jun Shao and
                  Huang Lin},
  title        = {Short Group Signature without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {450},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/450},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiangCSL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LimL07,
  author       = {Meng{-}Hui Lim and
                  Sanggon Lee},
  title        = {An Improved One-Round ID-Based Tripartite Authenticated Key Agreement
                  Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {189},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/189},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LimL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LimLL07,
  author       = {Meng{-}Hui Lim and
                  Sanggon Lee and
                  Hoonjae Lee},
  title        = {Cryptanalysis on Improved Chou et al.'s ID-Based Deniable Authentication
                  Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {383},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/383},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LimLL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LimLL07a,
  author       = {Meng{-}Hui Lim and
                  Sanggon Lee and
                  Hoonjae Lee},
  title        = {Cryptanalysis on Improved One-round Lin-Li's Tripartite Key Agreement
                  Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {411},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/411},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LimLL07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LimLL07b,
  author       = {Meng{-}Hui Lim and
                  Sanggon Lee and
                  Hoonjae Lee},
  title        = {Cryptanalytic Flaws in Oh et al.'s ID-Based Authenticated Key Agreement
                  Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {415},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/415},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LimLL07b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LimLPL07,
  author       = {Meng{-}Hui Lim and
                  Sanggon Lee and
                  Youngho Park and
                  Hoonjae Lee},
  title        = {An Enhanced ID-based Deniable Authentication Protocol on Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {113},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/113},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LimLPL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LimLPL07a,
  author       = {Meng{-}Hui Lim and
                  Sanggon Lee and
                  Youngho Park and
                  Hoonjae Lee},
  title        = {An Enhanced One-round Pairing-based Tripartite Authenticated Key Agreement
                  Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {142},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/142},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LimLPL07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LimLPM07,
  author       = {Meng{-}Hui Lim and
                  Sanggon Lee and
                  Youngho Park and
                  Sang{-}Jae Moon},
  title        = {Secure Deniable Authenticated Key Establishment for Internet Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {163},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/163},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LimLPM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LimPLL07,
  author       = {Shu Yun Lim and
                  Chuan Chin Pu and
                  Hyotaek Lim and
                  Hoon{-}Jae Lee},
  title        = {Dragon-MAC: Securing Wireless Sensor Networks with Authenticated Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {204},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/204},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LimPLL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinW07,
  author       = {Dai{-}Rui Lin and
                  Chih{-}I Wang},
  title        = {A Forward-Secure Signature with Backward-Secure Detection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {257},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/257},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinZZW07,
  author       = {Xibin Lin and
                  Changan Zhao and
                  Fangguo Zhang and
                  Yanming Wang},
  title        = {Computing the Ate Pairing on Elliptic Curves with Embedding Degree
                  k=9},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {434},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/434},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinZZW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lipmaa07,
  author       = {Helger Lipmaa},
  title        = {New Communication-Efficient Oblivious Transfer Protocols Based on
                  Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {133},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/133},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lipmaa07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuCZ07,
  author       = {Shengli Liu and
                  Xiaofeng Chen and
                  Fangguo Zhang},
  title        = {On the Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially
                  Blind Signature},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {225},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/225},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuCZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuHW07,
  author       = {Dennis Y. W. Liu and
                  Qiong Huang and
                  Duncan S. Wong},
  title        = {An Efficient One-move Nominative Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {260},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/260},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuHW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuL07,
  author       = {Jie Liu and
                  Jianhua Li},
  title        = {Improvement on a Digital Signature Scheme without using One-way Hash
                  and Message Redundancy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {87},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/087},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuLYD07,
  author       = {Feng{-}Hao Liu and
                  Chi{-}Jen Lu and
                  Bo{-}Yin Yang and
                  Jintai Ding},
  title        = {Secure PRNGs from Specialized Polynomial Maps over Any F\({}_{\mbox{q}}\)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {405},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/405},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuLYD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuSKW07,
  author       = {Jingwei Liu and
                  Rong Sun and
                  Weidong Kou and
                  Xinmei Wang},
  title        = {Efficient ID-based Signature Without Trusted {PKG}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {135},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/135},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuSKW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuT07,
  author       = {Yi{-}Ru Liu and
                  Wen{-}Guey Tzeng},
  title        = {Public Key Broadcast Encryption with Low Number of Keys and Constant
                  Decryption Time (Version 2)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {167},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/167},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuWHWHMS07,
  author       = {Dennis Y. W. Liu and
                  Duncan S. Wong and
                  Xinyi Huang and
                  Guilin Wang and
                  Qiong Huang and
                  Yi Mu and
                  Willy Susilo},
  title        = {Nominative Signature: Application, Security Model and Construction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {69},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/069},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuWHWHMS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Logachev07,
  author       = {O. A. Logachev},
  title        = {On Perfectly Balanced Boolean Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {22},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/022},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Logachev07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Logachev07a,
  author       = {Oleg A. Logachev},
  title        = {Locally Invertible Boolean Mappings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {307},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/307},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Logachev07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuLHL07a,
  author       = {Xianhui Lu and
                  Xuejia Lai and
                  Dake He and
                  Guomin Li},
  title        = {Weak adaptive chosen ciphertext secure hybrid encryption scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {447},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/447},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuLHL07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LubiczS07,
  author       = {David Lubicz and
                  Thomas Sirvent},
  title        = {A Tunable Broadcast Encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {329},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/329},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LubiczS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaAL07,
  author       = {Chunbo Ma and
                  Jun Ao and
                  Jianhua Li},
  title        = {Provable password-based tripartite key agreement protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {184},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/184},
  timestamp    = {Sun, 03 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaAL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaAL07a,
  author       = {Chunbo Ma and
                  Jun Ao and
                  Jianhua Li},
  title        = {Scalable Storage Scheme from Forward Key Rotation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {211},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/211},
  timestamp    = {Sun, 03 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaAL07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaAL07b,
  author       = {Chunbo Ma and
                  Jun Ao and
                  Jianhua Li},
  title        = {Group-based Proxy Re-encryption scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {274},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/274},
  timestamp    = {Sun, 03 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaAL07b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaAL07c,
  author       = {Chunbo Ma and
                  Jun Ao and
                  Jianhua Li},
  title        = {Group-oriented encryption secure against collude attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {371},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/371},
  timestamp    = {Sun, 03 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaAL07c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaT07,
  author       = {Di Ma and
                  Gene Tsudik},
  title        = {Forward-Secure Sequential Aggregate Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {52},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/052},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaWZ07,
  author       = {Changshe Ma and
                  Jian Weng and
                  Dong Zheng},
  title        = {Fast Digital Signature Schemes as Secure as Diffie-Hellman Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {19},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/019},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaWZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Madore07,
  author       = {David Madore},
  title        = {ConSum v0: An Experimental Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {157},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/157},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Madore07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Maitra07,
  author       = {Subhamoy Maitra},
  title        = {Balanced Boolean Function on 13-variables having Nonlinearity strictly
                  greater than the Bent Concatenation Bound},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {309},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/309},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Maitra07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaitraP07,
  author       = {Subhamoy Maitra and
                  Goutam Paul},
  title        = {New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes
                  of {RC4}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {261},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/261},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaitraP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Mancillas-LopezCR07,
  author       = {Cuauhtemoc Mancillas{-}L{\'{o}}pez and
                  Debrup Chakraborty and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {437},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/437},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Mancillas-LopezCR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MandalN07,
  author       = {Avradip Mandal and
                  Mridul Nandi},
  title        = {An improved collision probability for {CBC-MAC} and {PMAC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {32},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/032},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MandalN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ManulisS07,
  author       = {Mark Manulis and
                  J{\"{o}}rg Schwenk},
  title        = {Provably Secure Framework for Information Aggregation is Sensor Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {283},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/283},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ManulisS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MashatanS07,
  author       = {Atefeh Mashatan and
                  Douglas R. Stinson},
  title        = {Interactive two-channel message authentication based on interactive-collision
                  Resistant hash functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {12},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/012},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MashatanS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MatsudaKHO07,
  author       = {Seiichi Matsuda and
                  Naoki Kanayama and
                  Florian Hess and
                  Eiji Okamoto},
  title        = {Optimised versions of the Ate and Twisted Ate Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {13},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/013},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MatsudaKHO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Matsuo07,
  author       = {Toshihiko Matsuo},
  title        = {Proxy Re-encryption Systems for Identity-based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {361},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/361},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Matsuo07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaurerR07,
  author       = {Ueli Maurer and
                  Dominik Raub},
  title        = {Black-Box Extension Fields and the Inexistence of Field-Homomorphic
                  One-Way Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {89},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/089},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaurerR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaurerT07,
  author       = {Ueli Maurer and
                  Stefano Tessaro},
  title        = {Domain Extension of Public Random Functions: Beyond the Birthday Barrier},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {229},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/229},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaurerT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Maximov07,
  author       = {Alexander Maximov},
  title        = {Two Linear Distinguishing Attacks on {VMPC} and {RC4A} and Weakness
                  of {RC4} Family of Stream Ciphers (Corrected)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {70},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/070},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Maximov07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaximovB07,
  author       = {Alexander Maximov and
                  Alex Biryukov},
  title        = {Two Trivial Attacks on Trivium},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {21},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/021},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaximovB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/McDonaldCP07,
  author       = {Cameron McDonald and
                  Chris Charnes and
                  Josef Pieprzyk},
  title        = {An Algebraic Analysis of Trivium Ciphers based on the Boolean Satisfiability
                  Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {129},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/129},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/McDonaldCP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/McGrewF07,
  author       = {David A. McGrew and
                  Scott R. Fluhrer},
  title        = {The Security of the Extended Codebook {(XCB)} Mode of Operation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {298},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/298},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/McGrewF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MelchorG07,
  author       = {Carlos Aguilar Melchor and
                  Philippe Gaborit},
  title        = {A Lattice-Based Computationally-Efficient Private Information Retrieval
                  Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {446},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/446},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MelchorG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Mesnager07,
  author       = {Sihem Mesnager},
  title        = {Improving the lower bound on the higher order nonlinearity of Boolean
                  functions with prescribed algebraic immunity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {117},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/117},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Mesnager07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Mikhail07,
  author       = {Mikhail Lobanov},
  title        = {Tight bounds between algebraic immunity and nonlinearities of high
                  orders},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {444},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/444},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Mikhail07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MirV07,
  author       = {Darakhshan J. Mir and
                  Poorvi L. Vora},
  title        = {Related-Key Statistical Cryptanalysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {227},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/227},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MirV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MishraD07,
  author       = {Pradeep Kumar Mishra and
                  Vassil S. Dimitrov},
  title        = {Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar
                  Multiplication Using Multibase Number Representation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {40},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/040},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MishraD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Moh07,
  author       = {Tzuong{-}Tsieng Moh},
  title        = {Two New Examples of {TTM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {144},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/144},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Moh07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MollerR07,
  author       = {Bodo M{\"{o}}ller and
                  Andy Rupp},
  title        = {Faster Multi-Exponentiation through Caching: Accelerating {(EC)DSA}
                  Signature Verification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {470},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/470},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MollerR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoranNS07,
  author       = {Tal Moran and
                  Moni Naor and
                  Gil Segev},
  title        = {Deterministic History-Independent Strategies for Storing Information
                  on Write-Once Memories},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {151},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/151},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoranNS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MossPS07,
  author       = {Andrew Moss and
                  Dan Page and
                  Nigel P. Smart},
  title        = {Executing Modular Exponentiation on a Graphics Accelerator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {187},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/187},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MossPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MurakamiN07,
  author       = {Yasuyuki Murakami and
                  Takeshi Nasako},
  title        = {Knapsack Public-Key Cryptosystem Using Chinese Remainder Theorem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {107},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/107},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MurakamiN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaehrigBS07,
  author       = {Michael Naehrig and
                  Paulo S. L. M. Barreto and
                  Peter Schwabe},
  title        = {On compressible pairings and their computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {429},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/429},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaehrigBS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nagao07,
  author       = {Koh{-}ichi Nagao},
  title        = {Decomposed Attack for the Jacobian of a Hyperelliptic Curve over an
                  Extension Field},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {112},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/112},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nagao07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nam07,
  author       = {Junghyun Nam},
  title        = {Enhancing Security of a Group Key Exchange Protocol for Users with
                  Individual Passwords},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {166},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/166},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nam07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nandi07,
  author       = {Mridul Nandi},
  title        = {A Simple Security Analysis of Hash-CBC and a New Efficient One-Key
                  Online Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {158},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/158},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nandi07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nandi07a,
  author       = {Mridul Nandi},
  title        = {Improved security analysis of {OMAC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {292},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/292},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nandi07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NandiM07,
  author       = {Mridul Nandi and
                  Avradip Mandal},
  title        = {Improved Security Analysis of {PMAC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {31},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/031},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NandiM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NeveT07,
  author       = {Michael Neve and
                  Kris Tiri},
  title        = {On the complexity of side-channel attacks on {AES-256} - methodology
                  and quantitative results on cache attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {318},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/318},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NeveT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nguyen07,
  author       = {Lan Nguyen},
  title        = {Privacy-Protecting Coupon System Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {5},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/005},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nguyen07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nguyen07a,
  author       = {Lan Nguyen},
  title        = {Efficient Dynamic k-Times Anonymous Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {6},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/006},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nguyen07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NieJHD07,
  author       = {Xuyun Nie and
                  Xin Jiang and
                  Lei Hu and
                  Jintai Ding},
  title        = {Cryptanalysis of Two New Instances of {TTM} Cryptosystem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {381},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/381},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NieJHD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nielsen07,
  author       = {Jesper Buus Nielsen},
  title        = {Extending Oblivious Transfers Efficiently - How to get Robustness
                  Almost for Free},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {215},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/215},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nielsen07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nowak07,
  author       = {David Nowak},
  title        = {A Framework for Game-Based Security Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {199},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/199},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nowak07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ONeil07,
  author       = {Sean O'Neil},
  title        = {Algebraic Structure Defectoscopy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {378},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/378},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ONeil07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Okamoto07,
  author       = {Tatsuaki Okamoto},
  title        = {Authenticated Key Exchange and Key Encapsulation Without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {473},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/473},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Okamoto07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OliveiraAMDLD07,
  author       = {Leonardo B. Oliveira and
                  Diego F. Aranha and
                  Eduardo Morais and
                  Felipe Daguano and
                  Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez and
                  Ricardo Dahab},
  title        = {TinyTate: Identity-Based Encryption for Sensor Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {20},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/020},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OliveiraAMDLD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OliveiraSLD07,
  author       = {Leonardo B. Oliveira and
                  Michael Scott and
                  Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez and
                  Ricardo Dahab},
  title        = {TinyPBC: Pairings for Authenticated Identity-Based Non-Interactive
                  Key Distribution in Sensor Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {482},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/482},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OliveiraSLD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Oren07,
  author       = {Yossi Oren},
  title        = {Remote Power Analysis of {RFID} Tags},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {330},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/330},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Oren07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OstrovskyPS07,
  author       = {Rafail Ostrovsky and
                  Omkant Pandey and
                  Amit Sahai},
  title        = {Private Locally Decodable Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {25},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/025},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OstrovskyPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OstrovskyS07,
  author       = {Rafail Ostrovsky and
                  William E. Skeith III},
  title        = {A Survey of Single Database {PIR:} Techniques and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {59},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/059},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OstrovskyS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OstrovskyS07a,
  author       = {Rafail Ostrovsky and
                  William E. Skeith III},
  title        = {Algebraic Lower Bounds for Computing on Encrypted Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {64},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/064},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OstrovskyS07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OstrovskySW07,
  author       = {Rafail Ostrovsky and
                  Amit Sahai and
                  Brent Waters},
  title        = {Attribute-Based Encryption with Non-Monotonic Access Structures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {323},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/323},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OstrovskySW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PandeyPSTV07,
  author       = {Omkant Pandey and
                  Rafael Pass and
                  Amit Sahai and
                  Wei{-}Lung Dustin Tseng and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Precise Concurrent Zero Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {451},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/451},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PandeyPSTV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ParkKLCZ07,
  author       = {Hyun{-}A Park and
                  Bum Han Kim and
                  Dong Hoon Lee and
                  Yon Dohn Chung and
                  Justin Zhan},
  title        = {Secure Similarity Search},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {312},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/312},
  timestamp    = {Fri, 24 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ParkKLCZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatarinNB07,
  author       = {Jacques Patarin and
                  Val{\'{e}}rie Nachef and
                  C{\^{o}}me Berbain},
  title        = {Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {449},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/449},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatarinNB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatersonS07,
  author       = {Kenneth G. Paterson and
                  Sriramkrishnan Srinivasan},
  title        = {On the Relations Between Non-Interactive Key Distribution, Identity-Based
                  Encryption and Trapdoor Discrete Log Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {453},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/453},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatersonS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Paul07,
  author       = {Souradyuti Paul},
  title        = {Cryptanalysis of Stream Ciphers Based on Arrays and Modular Addition},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {54},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/054},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Paul07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PaulM07,
  author       = {Goutam Paul and
                  Subhamoy Maitra},
  title        = {{RC4} State Information at Any Stage Reveals the Secret Key},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {208},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/208},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PaulM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PaulMS07,
  author       = {Goutam Paul and
                  Subhamoy Maitra and
                  Rohit Srivastava},
  title        = {On Non-Randomness of the Permutation after {RC4} Key Scheduling},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {305},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/305},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PaulMS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PeikertVW07,
  author       = {Chris Peikert and
                  Vinod Vaikuntanathan and
                  Brent Waters},
  title        = {A Framework for Efficient and Composable Oblivious Transfer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {348},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/348},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PeikertVW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PeikertW07,
  author       = {Chris Peikert and
                  Brent Waters},
  title        = {Lossy Trapdoor Functions and Their Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {279},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/279},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PeikertW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PetitSPMY07,
  author       = {Christophe Petit and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Olivier Pereira and
                  Tal Malkin and
                  Moti Yung},
  title        = {A Block Cipher based {PRNG} Secure Against Side-Channel Key Recovery},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {356},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/356},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/PetitSPMY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Pometun07,
  author       = {Sergiy Pometun},
  title        = {Generalized Correlation and Higher Order Nonlinearity for Probabilistic
                  Algebraic Attacks Description},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {448},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/448},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Pometun07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PrabhakaranR07,
  author       = {Manoj Prabhakaran and
                  Mike Rosulek},
  title        = {Rerandomizable {RCCA} Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {119},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/119},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PrabhakaranR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PrabhakaranX07,
  author       = {Manoj Prabhakaran and
                  Rui Xue},
  title        = {Statistically Hiding Sets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {349},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/349},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PrabhakaranX07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PszonaS07,
  author       = {Pawel Pszona and
                  Grzegorz Stachowiak},
  title        = {Unlinkable Divisible Digital Cash without Trusted Third Party},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {216},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/216},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PszonaS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/QinWSMW07,
  author       = {Bo Qin and
                  Qianhong Wu and
                  Willy Susilo and
                  Yi Mu and
                  Yumin Wang},
  title        = {Group Decryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {17},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/017},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/QinWSMW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RaddumS07,
  author       = {H{\aa}vard Raddum and
                  Igor A. Semaev},
  title        = {Solving {MRHS} linear equations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {285},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/285},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RaddumS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ravnshoj07,
  author       = {Christian Robenhagen Ravnsh{\o}j},
  title        = {Large Cyclic Subgroups of Jacobians of Hyperelliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {97},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/097},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ravnshoj07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ravnshoj07a,
  author       = {Christian Robenhagen Ravnsh{\o}j},
  title        = {Generators of Jacobians of Hyperelliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {150},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/150},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ravnshoj07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ravnshoj07b,
  author       = {Christian Robenhagen Ravnsh{\o}j},
  title        = {Embedding Degree of Hyperelliptic Curves with Complex Multiplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {175},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/175},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ravnshoj07b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ravnshoj07c,
  author       = {Christian Robenhagen Ravnsh{\o}j},
  title        = {Pairings on Jacobians of Hyperelliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {365},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/365},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ravnshoj07c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ReyhanitabarWS07,
  author       = {Mohammad Reza Reyhanitabar and
                  Shuhong Wang and
                  Reihaneh Safavi{-}Naini},
  title        = {Noninteractive Manual Channel Message Authentication Based On eTCR
                  Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {131},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/131},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ReyhanitabarWS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RistenpartR07,
  author       = {Thomas Ristenpart and
                  Phillip Rogaway},
  title        = {How to Enrich the Message Space of a Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {109},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/109},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RistenpartR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RistenpartY07,
  author       = {Thomas Ristenpart and
                  Scott Yilek},
  title        = {The Power of Proofs-of-Possession: Securing Multiparty Signatures
                  against Rogue-Key Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {264},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/264},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RistenpartY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RoyDDM07,
  author       = {Arnab Roy and
                  Anupam Datta and
                  Ante Derek and
                  John C. Mitchell},
  title        = {Inductive Proof Method for Computational Secrecy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {165},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/165},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RoyDDM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RubinS07,
  author       = {Karl Rubin and
                  Alice Silverberg},
  title        = {Choosing the correct elliptic curve in the {CM} method},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {253},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/253},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RubinS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RuppLBSD07,
  author       = {Andy Rupp and
                  Gregor Leander and
                  Endre Bangerter and
                  Ahmad{-}Reza Sadeghi and
                  Alexander W. Dent},
  title        = {Sufficient Conditions for Intractability over Black-Box Groups: Generic
                  Lower Bounds for Generalized {DL} and {DH} Problems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {360},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/360},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RuppLBSD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Saarinen07,
  author       = {Markku{-}Juhani O. Saarinen},
  title        = {Linearization Attacks Against Syndrome Based Hashes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {295},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/295},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Saarinen07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Saarinen07a,
  author       = {Markku{-}Juhani O. Saarinen},
  title        = {A Meet-in-the-Middle Collision Attack Against the New {FORK-256}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {373},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/373},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Saarinen07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SakaiF07,
  author       = {Ryuichi Sakai and
                  Jun Furukawa},
  title        = {Identity-Based Broadcast Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {217},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/217},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SakaiF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SakalauskasL07,
  author       = {Eligijus Sakalauskas and
                  Kestutis Luksys},
  title        = {Matrix Power S-Box Construction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {214},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/214},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SakalauskasL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Samid07,
  author       = {Gideon Samid},
  title        = {Proposing a Master One-Way Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {412},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/412},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Samid07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SanadhyaS07,
  author       = {Somitra Kumar Sanadhya and
                  Palash Sarkar},
  title        = {New Local Collisions for the {SHA-2} Hash Family},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {352},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/352},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SanadhyaS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Sarkar07,
  author       = {Palash Sarkar},
  title        = {Improving Upon the {TET} Mode of Operation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {317},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/317},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Sarkar07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SarkarM07,
  author       = {Sumanta Sarkar and
                  Subhamoy Maitra},
  title        = {Construction of Rotation Symmetric Boolean Functions with Maximum
                  Algebraic Immunity on Odd Number of Variables},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {290},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/290},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SarkarM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SarkarM07a,
  author       = {Sumanta Sarkar and
                  Subhamoy Maitra},
  title        = {Idempotents in the Neighbourhood of Patterson-Wiedemann Functions
                  having Walsh Spectra Zeros},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {427},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/427},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SarkarM07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SasakiYA07,
  author       = {Yu Sasaki and
                  Go Yamamoto and
                  Kazumaro Aoki},
  title        = {Practical Password Recovery on an {MD5} Challenge and Response},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {101},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/101},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SasakiYA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Scott07,
  author       = {Michael Scott},
  title        = {Optimal Irreducible Polynomials for GF(2\({}^{\mbox{m}}\)) Arithmetic},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {192},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/192},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Scott07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ScottS07,
  author       = {Michael Scott and
                  Piotr Szczechowiak},
  title        = {Optimizing Multiprecision Multiplication for Public Key Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {299},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/299},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ScottS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SekarPP07,
  author       = {Gautham Sekar and
                  Souradyuti Paul and
                  Bart Preneel},
  title        = {Weaknesses in the Pseudorandom Bit Generation Algorithms of the Stream
                  Ciphers TPypy and TPy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {75},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/075},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SekarPP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SekarPP07a,
  author       = {Gautham Sekar and
                  Souradyuti Paul and
                  Bart Preneel},
  title        = {New Weaknesses in the Keystream Generation Algorithms of the Stream
                  Ciphers TPy and Py},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {230},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/230},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SekarPP07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SekarPP07b,
  author       = {Gautham Sekar and
                  Souradyuti Paul and
                  Bart Preneel},
  title        = {New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the
                  TPy6-A and the TPy6-B},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {436},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/436},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SekarPP07b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Semaev07,
  author       = {Igor A. Semaev},
  title        = {On solving sparse algebraic equations over finite fields {II}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {280},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/280},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Semaev07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Shacham07,
  author       = {Hovav Shacham},
  title        = {A Cramer-Shoup Encryption Scheme from the Linear Assumption and from
                  Progressively Weaker Linear Variants},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {74},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/074},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Shacham07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Shacham07a,
  author       = {Hovav Shacham},
  title        = {The {BBG} {HIBE} Has Limited Delegation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {201},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/201},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Shacham07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShahandashtiS07,
  author       = {Siamak Fayyaz Shahandashti and
                  Reihaneh Safavi{-}Naini},
  title        = {Construction of Universal Designated-Verifier Signatures and Identity-Based
                  Signatures from Standard Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {462},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/462},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShahandashtiS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShaoCWL07a,
  author       = {Jun Shao and
                  Zhenfu Cao and
                  Licheng Wang and
                  Rongxing Lu},
  title        = {Efficient Password-based Authenticated Key Exchange without Public
                  Information},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {326},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/326},
  timestamp    = {Tue, 02 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShaoCWL07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShaoCWL07b,
  author       = {Jun Shao and
                  Zhenfu Cao and
                  Licheng Wang and
                  Xiaohui Liang},
  title        = {Proxy Re-Signature Schemes without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {396},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/396},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShaoCWL07b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShpilrainZ07,
  author       = {Vladimir Shpilrain and
                  Gabriel Zapata},
  title        = {Using decision problems in public key cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {147},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/147},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShpilrainZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShrimptonS07,
  author       = {Thomas Shrimpton and
                  Martijn Stam},
  title        = {Building a Collision-Resistant Compression Function from Non-Compressing
                  Primitives},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {409},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/409},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShrimptonS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SkoricKC07,
  author       = {Boris Skoric and
                  Stefan Katzenbeisser and
                  Mehmet Utku Celik},
  title        = {Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {41},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/041},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SkoricKC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Smith07,
  author       = {Warren D. Smith},
  title        = {1. {AES} seems weak. 2. Linear time secure cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {248},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/248},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Smith07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Smith07a,
  author       = {Benjamin A. Smith},
  title        = {Isogenies and the Discrete Logarithm Problem on Jacobians of Genus
                  3 Hyperelliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {428},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/428},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Smith07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SorienteTU07,
  author       = {Claudio Soriente and
                  Gene Tsudik and
                  Ersin Uzun},
  title        = {{HAPADEP:} Human Asisted Pure Audio Device Pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {93},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/093},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SorienteTU07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SorienteTU07a,
  author       = {Claudio Soriente and
                  Gene Tsudik and
                  Ersin Uzun},
  title        = {{BEDA:} Button-Enabled Device Pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {246},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/246},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SorienteTU07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SpeirsM07,
  author       = {William R. Speirs and
                  Ian M. Molloy},
  title        = {Making Large Hash Functions From Small Compression Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {239},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/239},
  timestamp    = {Wed, 02 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SpeirsM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StandaertPAQ07,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Eric Peeters and
                  C{\'{e}}dric Archambeau and
                  Jean{-}Jacques Quisquater},
  title        = {Towards Security Limits in Side-Channel Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {222},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/222},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StandaertPAQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Stinson07,
  author       = {Douglas R. Stinson},
  title        = {Generalized mix functions and orthogonal equitable rectangles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {226},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/226},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Stinson07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StinsonW07,
  author       = {Douglas R. Stinson and
                  Jiang Wu},
  title        = {A Zero-Knowledge Identification and Key Agreement Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {116},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/116},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StinsonW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Strangio07,
  author       = {Maurizio Adriano Strangio},
  title        = {Revisiting an Efficient Elliptic Curve Key Agreement Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {81},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/081},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Strangio07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StudholmeB07,
  author       = {Chris Studholme and
                  Ian F. Blake},
  title        = {Multiparty Computation to Generate Secret Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {353},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/353},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StudholmeB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SuiS07,
  author       = {Jiayuan Sui and
                  Douglas R. Stinson},
  title        = {A Critical Analysis and Improvement of {AACS} Drive-Host Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {420},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/420},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SuiS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SuzukiK07,
  author       = {Kazuhiro Suzuki and
                  Kaoru Kurosawa},
  title        = {How To Find Many Collisions of 3-Pass {HAVAL}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {79},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/079},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SuzukiK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TakahashiF07,
  author       = {Junko Takahashi and
                  Toshinori Fukunaga},
  title        = {Differential Fault Analysis on the {AES} Key Schedule},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {480},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/480},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TakahashiF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TakahashiHK07,
  author       = {Gen Takahashi and
                  Fumitaka Hoshino and
                  Tetsutaro Kobayashi},
  title        = {Efficient GF(3m) Multiplication Algorithm for eta {T} Pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {463},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/463},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TakahashiHK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Tang07,
  author       = {Qiang Tang},
  title        = {On the Security of three Versions of the {WAI} Protocol in Chinese
                  {WLAN} Implementation Plan},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {122},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/122},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Tang07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TangJ07,
  author       = {Qiang Tang and
                  Dongyao Ji},
  title        = {Verifiable Attribute-based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {461},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/461},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TangJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Tao07,
  author       = {Renji Tao},
  title        = {A Note on Automata-based Dynamic Convolutional Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {300},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/300},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Tao07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Tews07,
  author       = {Erik Tews},
  title        = {Attacks on the {WEP} protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {471},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/471},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Tews07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TewsWP07,
  author       = {Erik Tews and
                  Ralf{-}Philipp Weinmann and
                  Andrei Pyshkin},
  title        = {Breaking 104 bit {WEP} in less than 60 seconds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {120},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/120},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TewsWP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TianCJJM07,
  author       = {Yuan Tian and
                  Zhi{-}Yu Chen and
                  Yuee Jin and
                  Feng Jin and
                  Huihui Ma},
  title        = {Some Results on Anonymity in Hybrid Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {130},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/130},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TianCJJM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TrostleP07,
  author       = {Jonathan T. Trostle and
                  Andy Parrish},
  title        = {Efficient Computationally Private Information Retrieval From Anonymity
                  or Trapdoor Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {392},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/392},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TrostleP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TuD07,
  author       = {Ziran Tu and
                  Yingpu Deng},
  title        = {Algebraic Immunity Hierarchy of Boolean Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {259},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/259},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TuD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Unruh07,
  author       = {Dominique Unruh},
  title        = {Random Oracles and Auxiliary Input},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {168},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/168},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Unruh07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ustaoglu07,
  author       = {Berkant Ustaoglu},
  title        = {Obtaining a secure and efficient key agreement protocol from {(H)MQV}
                  and {NAXOS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {123},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/123},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ustaoglu07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Vielhaber07,
  author       = {Michael Vielhaber},
  title        = {Breaking {ONE.FIVIUM} by {AIDA} an Algebraic {IV} Differential Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {413},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/413},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Vielhaber07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Wang07,
  author       = {Meiqin Wang},
  title        = {Differential Cryptanalysis of {PRESENT}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {408},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/408},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Wang07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangC07,
  author       = {Shengbao Wang and
                  Zhenfu Cao},
  title        = {Practical Identity-Based Encryption {(IBE)} in Multiple {PKG} Environments
                  and Its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {100},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/100},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangCCC07,
  author       = {Shengbao Wang and
                  Zhenfu Cao and
                  ZhaoHui Cheng and
                  Kim{-}Kwang Raymond Choo},
  title        = {Perfect Forward Secure Identity-Based Authenticated Key Agreement
                  Protocol in the Escrow Mode},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {313},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/313},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangCCC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangCSW07,
  author       = {Shengbao Wang and
                  Zhenfu Cao and
                  Maurizio Adriano Strangio and
                  Lihua Wang},
  title        = {Cryptanalysis and Improvement of an Elliptic Curve Diffie-Hellman
                  Key Agreement Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {26},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/026},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangCSW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangW07,
  author       = {Wei Wang and
                  Xiaoyun Wang},
  title        = {Improved Impossible Differential Cryptanalysis of {CLEFIA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {466},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/466},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangYH07,
  author       = {Xu An Wang and
                  Xiaoyuan Yang and
                  Yiliang Han},
  title        = {Provable Secure Generalized Signcryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {173},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/173},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangYH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangZ07,
  author       = {Fengjiao Wang and
                  Yuqing Zhang},
  title        = {A New Provably Secure Authentication and Key Agreement Mechanism for
                  {SIP} Using Certificateless Public-key Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {220},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/220},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangZ07a,
  author       = {Fengjiao Wang and
                  Yuqing Zhang},
  title        = {A New Security Model for Cross-Realm {C2C-PAKE} Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {342},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/342},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangZ07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Wei07,
  author       = {Tzer{-}jen Wei},
  title        = {Notions of Efficiency in Simulation Paradigm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {431},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/431},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Wei07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Wojtenko07,
  author       = {Grzegorz Wojtenko},
  title        = {{PRIME} {POINTS} {ON} {ELLIPTIC} {CURVES} {AND} {ITS} {IMPACT} {ON}
                  {ECDLP}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {92},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/092},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Wojtenko07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Wojtenko07a,
  author       = {Grzegorz Wojtenko},
  title        = {A Pollard-like pseudorandom number generator over {EC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {281},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/281},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Wojtenko07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuS07,
  author       = {Jiang Wu and
                  Douglas R. Stinson},
  title        = {Authorship Proof for Textual Document},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {42},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/042},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WuS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuS07a,
  author       = {Jiang Wu and
                  Douglas R. Stinson},
  title        = {An Efficient Identification Protocol and the Knowledge-of-Exponent
                  Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {479},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/479},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WuS07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuZW07,
  author       = {Liufei Wu and
                  Yuqing Zhang and
                  Fengjiao Wang},
  title        = {A New Provably Secure Authentication and Key Agreement Protocol for
                  {SIP} Using {ECC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {219},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/219},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WuZW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuZW07a,
  author       = {Liufei Wu and
                  Yuqing Zhang and
                  Fengjiao Wang},
  title        = {Security Analysis of {WAPI} Authentication and Key Exchange Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {344},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/344},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WuZW07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WyseurMGP07,
  author       = {Brecht Wyseur and
                  Wil Michiels and
                  Paul Gorissen and
                  Bart Preneel},
  title        = {Cryptanalysis of White-Box {DES} Implementations with Arbitrary External
                  Encodings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {104},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/104},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WyseurMGP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Xu07,
  author       = {ZiJie Xu},
  title        = {Dynamic {SHA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {476},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/476},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Xu07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangWHD07,
  author       = {Guomin Yang and
                  Duncan S. Wong and
                  Qiong Huang and
                  Xiaotie Deng},
  title        = {A New Security Definition for Public Key Encryption Schemes and Its
                  Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {319},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/319},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangWHD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YaoYZZ07,
  author       = {Andrew Chi{-}Chih Yao and
                  Frances F. Yao and
                  Yunlei Zhao and
                  Bin B. Zhu},
  title        = {Deniable Internet Key-Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {191},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/191},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YaoYZZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YeWT07,
  author       = {Qingsong Ye and
                  Huaxiong Wang and
                  Christophe Tartary},
  title        = {Privacy-Preserving Distributed Set Intersection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {111},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/111},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YeWT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YiTO07,
  author       = {Xun Yi and
                  Raylin Tso and
                  Eiji Okamoto},
  title        = {ID-Based Group Password-Authenticated Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {469},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/469},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YiTO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YooSK07,
  author       = {Eun Sun Yoo and
                  Koutarou Suzuki and
                  Myung{-}Hwan Kim},
  title        = {Fully Resilient Traitor Tracing Scheme using Key Update},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {293},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/293},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YooSK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YoshitomiTKT07,
  author       = {Motoi Yoshitomi and
                  Tsuyoshi Takagi and
                  Shinsaku Kiyomoto and
                  Toshiaki Tanaka},
  title        = {Efficient Implementation of the Pairing on Mobilephones using {BREW}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {340},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/340},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YoshitomiTKT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YuW07,
  author       = {Hongbo Yu and
                  Xiaoyun Wang},
  title        = {MultiCollision Attack on the Compression Functions of {MD4} and 3-Pass
                  {HAVAL}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {85},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/085},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YuW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Yuan07,
  author       = {Tian Yuan},
  title        = {Some General Results on Chosen-ciphertext Anonymity in Public-key
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {190},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/190},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Yuan07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YuenALS07,
  author       = {Tsz Hon Yuen and
                  Man Ho Au and
                  Joseph K. Liu and
                  Willy Susilo},
  title        = {(Convertible) Undeniable Signatures without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {386},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/386},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YuenALS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YunPL07,
  author       = {Aaram Yun and
                  Je Hong Park and
                  Jooyoung Lee},
  title        = {Lai-Massey Scheme and Quasi-Feistel Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {347},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/347},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YunPL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZengHH07,
  author       = {Guang Zeng and
                  Wenbao Han and
                  Kaicheng He},
  title        = {High Efficiency Feedback Shift Register: sigma-LFSR},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {114},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/114},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZengHH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZengHYJ07,
  author       = {Xiangyong Zeng and
                  Lei Hu and
                  Yang Yang and
                  Wenfeng Jiang},
  title        = {On The Inequivalence Of Ness-Helleseth {APN} Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {379},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/379},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZengHYJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Zhang07,
  author       = {Muxiang Zhang},
  title        = {Analysis of Collusion-Attack Free ID-Based Non-Interactive Key Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {160},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/160},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Zhang07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoZH07,
  author       = {Changan Zhao and
                  Fangguo Zhang and
                  Jiwu Huang},
  title        = {A Note on the Ate Pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {247},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/247},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoZH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhouCZZ07,
  author       = {Jin Zhou and
                  TingMao Chang and
                  YaJuan Zhang and
                  Yuefei Zhu},
  title        = {Universally Composable Key-evolving Signature},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {11},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/011},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhouCZZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhouL07a,
  author       = {Sujing Zhou and
                  Dongdai Lin},
  title        = {An Interesting Member ID-based Group Signature},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {126},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/126},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhouL07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhouL07b,
  author       = {Sujing Zhou and
                  Dongdai Lin},
  title        = {Unlinkable Randomizable Signature and Its Application in Group Signature},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {213},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/213},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhouL07b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhouZZ07,
  author       = {Jin Zhou and
                  YaJuan Zhang and
                  Yuefei Zhu},
  title        = {Security Arguments for a Class of ID-based Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {49},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/049},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhouZZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AuLYW07,
  title        = {Efficient Hierarchical Identity Based Signature in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {68},
  year         = {2007},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2007/068},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AuLYW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Awasthi07,
  title        = {An Improved Remote User Authentication Scheme with Smart Cards using
                  Bilinear Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {418},
  year         = {2007},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2007/418},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Awasthi07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BartheGJB07,
  title        = {Formal Certification of Code-Based Cryptographic Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {314},
  year         = {2007},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2007/314},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BartheGJB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BuchmannDL07,
  title        = {Efficiency Improvement for {NTRU}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {263},
  year         = {2007},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2007/263},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BuchmannDL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BurmesterMM07a,
  title        = {Provably Secure Grouping-proofs for {RFID} tags},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {407},
  year         = {2007},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2007/407},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BurmesterMM07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CastroD07,
  title        = {An Efficient Certificateless Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {196},
  year         = {2007},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2007/196},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CastroD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ClarkT07,
  title        = {Analysis of Local Optima in Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {387},
  year         = {2007},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2007/387},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ClarkT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DingG07,
  title        = {Precise Zero-Knowledge in Concurrent Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {456},
  year         = {2007},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2007/456},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DingG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FengW07a,
  title        = {Fast Point Multiplication on Elliptic Curves of Even Order},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {377},
  year         = {2007},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2007/377},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FengW07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gangopadhyay07,
  title        = {On bent functions with zero second derivatives},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {77},
  year         = {2007},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2007/077},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gangopadhyay07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JuelsK07,
  title        = {PORs: Proofs of Retrievability for Large Files},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {243},
  year         = {2007},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2007/243},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JuelsK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KangTLF07,
  title        = {A Short Signature Scheme in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {398},
  year         = {2007},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2007/398},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KangTLF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiLANAC07,
  title        = {On the security of an image encryption scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {90},
  year         = {2007},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2007/090},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiLANAC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinC07,
  title        = {Cryptanalysis of An Oblivious Polynomial Evaluation Protocol Based
                  On Polynomial Reconstruction Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {2},
  year         = {2007},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2007/002},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuSKW07a,
  title        = {Fair Exchange Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {136},
  year         = {2007},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2007/136},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuSKW07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuLH07,
  title        = {A new paradigm of chosen ciphertext secure public key encryption scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {232},
  year         = {2007},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2007/232},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuLH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuLH07a,
  title        = {MAC-free variant of {KD04}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {481},
  year         = {2007},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2007/481},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuLH07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuLHL07,
  title        = {Efficient chosen ciphertext secure {PKE} scheme with short ciphertext},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {210},
  year         = {2007},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2007/210},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuLHL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuLHL07b,
  title        = {On the hash function of {ODH} assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {468},
  year         = {2007},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2007/468},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuLHL07b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Narayan07,
  title        = {Efficient Identity Based Signature in Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {255},
  year         = {2007},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2007/255},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Narayan07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ONeilGL07,
  title        = {{VEST} Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {16},
  year         = {2007},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2007/016},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ONeilGL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Potlapally07,
  title        = {Verifying Data Integrity with Few Queries to Untrusted Memory},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {27},
  year         = {2007},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2007/027},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Potlapally07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShaoCWL07,
  title        = {Fully Secure Proxy Re-Encryption without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {254},
  year         = {2007},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2007/254},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShaoCWL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Vaya07,
  title        = {Secure multi-party computation on incomplete networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {346},
  year         = {2007},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2007/346},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Vaya07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YuH07,
  title        = {A Hybrid Approach to Concurrent Error Detection for a Compact {ASIC}
                  Implementation of the Advanced Encryption Standard},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {72},
  year         = {2007},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2007/072},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YuH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhouL07,
  title        = {Weakly only Unforgeable Signature and Its Application in Group Signature},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {80},
  year         = {2007},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2007/080},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhouL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics