Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/iacr/iacr2015.bht:"
more than 1000 matches, exporting first 1000 hits only!
@article{DBLP:journals/iacr/0001ACFGHMW15, author = {Muhammad Naveed and Erman Ayday and Ellen Wright Clayton and Jacques Fellay and Carl A. Gunter and Jean{-}Pierre Hubaux and Bradley A. Malin and XiaoFeng Wang}, title = {Privacy in the Genomic Era}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {563}, year = {2015}, url = {http://eprint.iacr.org/2015/563}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001ACFGHMW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001AH15, author = {Shota Yamada and Nuttapong Attrapadung and Goichiro Hanaoka}, title = {Conversions among Several Classes of Predicate Encryption and Their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {431}, year = {2015}, url = {http://eprint.iacr.org/2015/431}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001AH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001FPPS15, author = {Abhishek Banerjee and Georg Fuchsbauer and Chris Peikert and Krzysztof Pietrzak and Sophie Stevens}, title = {Key-Homomorphic Constrained Pseudorandom Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {180}, year = {2015}, url = {http://eprint.iacr.org/2015/180}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001FPPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001JMN15, author = {Jian Guo and J{\'{e}}r{\'{e}}my Jean and Nicky Mouha and Ivica Nikolic}, title = {More Rounds, Less Security?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {484}, year = {2015}, url = {http://eprint.iacr.org/2015/484}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001JMN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001JNQSS15, author = {Jian Guo and J{\'{e}}r{\'{e}}my Jean and Ivica Nikolic and Kexin Qiao and Yu Sasaki and Siang Meng Sim}, title = {Invariant Subspace Attack Against Full Midori64}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1189}, year = {2015}, url = {http://eprint.iacr.org/2015/1189}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001JNQSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001SRGKV15, author = {Zhe Liu and Hwajeong Seo and Sujoy Sinha Roy and Johann Gro{\ss}sch{\"{a}}dl and Howon Kim and Ingrid Verbauwhede}, title = {Efficient Ring-LWE Encryption on 8-bit {AVR} Processors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {410}, year = {2015}, url = {http://eprint.iacr.org/2015/410}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/0001SRGKV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001SWW15, author = {Jian Guo and Yu Sasaki and Lei Wang and Shuang Wu}, title = {Cryptanalysis of HMAC/NMAC-Whirlpool}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {149}, year = {2015}, url = {http://eprint.iacr.org/2015/149}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001SWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001SWWW15, author = {Jian Guo and Yu Sasaki and Lei Wang and Meiqin Wang and Long Wen}, title = {Equivalent Key Recovery Attacks against {HMAC} and {NMAC} with Whirlpool Reduced to 7 Rounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {75}, year = {2015}, url = {http://eprint.iacr.org/2015/075}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001SWWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001WGHV15, author = {Zhe Liu and Husen Wang and Johann Gro{\ss}sch{\"{a}}dl and Zhi Hu and Ingrid Verbauwhede}, title = {{VLSI} Implementation of Double-Base Scalar Multiplication on a Twisted Edwards Curve with an Efficiently Computable Endomorphism}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {421}, year = {2015}, url = {http://eprint.iacr.org/2015/421}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001WGHV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0002H15, author = {Takahiro Matsuda and Goichiro Hanaoka}, title = {Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {118}, year = {2015}, url = {http://eprint.iacr.org/2015/118}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0002H15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0002H15a, author = {Takahiro Matsuda and Goichiro Hanaoka}, title = {An Asymptotically Optimal Method for Converting Bit Encryption to Multi-Bit Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1149}, year = {2015}, url = {http://eprint.iacr.org/2015/1149}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0002H15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbadiBMRS15, author = {Mart{\'{\i}}n Abadi and Dan Boneh and Ilya Mironov and Ananth Raghunathan and Gil Segev}, title = {Message-Locked Encryption for Lock-Dependent Messages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {440}, year = {2015}, url = {http://eprint.iacr.org/2015/440}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbadiBMRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbarzuaMM15, author = {Rodrigo Abarz{\'{u}}a and Santi Mart{\'{\i}}nez and Valeria Mendoza}, title = {Same Value Analysis on Edwards Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {731}, year = {2015}, url = {http://eprint.iacr.org/2015/731}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbarzuaMM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBCP15, author = {Michel Abdalla and Florian Bourse and Angelo De Caro and David Pointcheval}, title = {Simple Functional Encryption Schemes for Inner Products}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {17}, year = {2015}, url = {http://eprint.iacr.org/2015/017}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBCP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBF15, author = {Michel Abdalla and Sonia Bela{\"{\i}}d and Pierre{-}Alain Fouque}, title = {Leakage-Resilient Symmetric Encryption via Re-keying}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {204}, year = {2015}, url = {http://eprint.iacr.org/2015/204}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBP15, author = {Michel Abdalla and Fabrice Benhamouda and David Pointcheval}, title = {Tighter Reductions for Forward-Secure Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {196}, year = {2015}, url = {http://eprint.iacr.org/2015/196}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBP15a, author = {Michel Abdalla and Fabrice Benhamouda and Alain Passel{\`{e}}gue}, title = {An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {554}, year = {2015}, url = {http://eprint.iacr.org/2015/554}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBP15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBP15b, author = {Michel Abdalla and Fabrice Benhamouda and Alain Passel{\`{e}}gue}, title = {Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {867}, year = {2015}, url = {http://eprint.iacr.org/2015/867}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBP15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBPRV15, author = {Michel Abdalla and Sonia Bela{\"{\i}}d and David Pointcheval and Sylvain Ruhault and Damien Vergnaud}, title = {Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1219}, year = {2015}, url = {http://eprint.iacr.org/2015/1219}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBPRV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdelraheemAAAB15, author = {Mohamed Ahmed Abdelraheem and Javad Alizadeh and Hoda AlKhzaimi and Mohammad Reza Aref and Nasour Bagheri and Praveen Gauravaram}, title = {Improved Linear Cryptanalysis of reduced-round {SIMON-32} and {SIMON-48}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {988}, year = {2015}, url = {http://eprint.iacr.org/2015/988}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdelraheemAAAB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdelraheemBBT15, author = {Mohamed Ahmed Abdelraheem and Peter Beelen and Andrey Bogdanov and Elmar Tischhauser}, title = {Twisted Polynomials and Forgery Attacks on {GCM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1224}, year = {2015}, url = {http://eprint.iacr.org/2015/1224}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdelraheemBBT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdolmalekiBBA15, author = {Behzad Abdolmaleki and Hamidreza Bakhshi and Karim Baghery and Mohammad Reza Aref}, title = {Analysis of an {RFID} Authentication Protocol in Accordance with {EPC} Standards}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {980}, year = {2015}, url = {http://eprint.iacr.org/2015/980}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdolmalekiBBA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbeDKNO15, author = {Masayuki Abe and Bernardo David and Markulf Kohlweiss and Ryo Nishimaki and Miyako Ohkubo}, title = {Tagged One-Time Signatures: Tight Security and Optimal Tag Size}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {311}, year = {2015}, url = {http://eprint.iacr.org/2015/311}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbeDKNO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbeKOT15, author = {Masayuki Abe and Markulf Kohlweiss and Miyako Ohkubo and Mehdi Tibouchi}, title = {Fully Structure-Preserving Signatures and Shrinking Commitments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {76}, year = {2015}, url = {http://eprint.iacr.org/2015/076}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbeKOT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbusalahFP15, author = {Hamza Abusalah and Georg Fuchsbauer and Krzysztof Pietrzak}, title = {Offline Witness Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {838}, year = {2015}, url = {http://eprint.iacr.org/2015/838}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbusalahFP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AchenbachMR15, author = {Dirk Achenbach and J{\"{o}}rn M{\"{u}}ller{-}Quade and Jochen Rill}, title = {Universally Composable Firewall Architectures using Trusted Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {99}, year = {2015}, url = {http://eprint.iacr.org/2015/099}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AchenbachMR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AdhikariMORSX15, author = {Avishek Adhikari and Kirill Morozov and Satoshi Obana and Partha Sarathi Roy and Kouichi Sakurai and Rui Xu}, title = {Efficient Threshold Secret Sharing Schemes Secure against Rushing Cheaters}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1115}, year = {2015}, url = {http://eprint.iacr.org/2015/1115}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AdhikariMORSX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AerabiAFGNV15, author = {Ehsan Aerabi and A. Elhadi Amirouche and Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and David Naccache and Jean Vuillemin}, title = {The Conjoined Microprocessor}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {974}, year = {2015}, url = {http://eprint.iacr.org/2015/974}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AerabiAFGNV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AfsharMPR15, author = {Arash Afshar and Payman Mohassel and Benny Pinkas and Ben Riva}, title = {Non-Interactive Secure Computation Based on Cut-and-Choose}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {282}, year = {2015}, url = {http://eprint.iacr.org/2015/282}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AfsharMPR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AggarwalA0MPP15, author = {Divesh Aggarwal and Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran}, title = {Optimal Computational Split-state Non-malleable Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1063}, year = {2015}, url = {http://eprint.iacr.org/2015/1063}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AggarwalA0MPP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AggarwalG15, author = {Divesh Aggarwal and Alexander Golovnev}, title = {A Note on Lower Bounds for Non-interactive Message Authentication Using Weak Keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {324}, year = {2015}, url = {http://eprint.iacr.org/2015/324}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AggarwalG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AggarwalHL15, author = {Divesh Aggarwal and Kaave Hosseini and Shachar Lovett}, title = {Affine-malleable Extractors, Spectrum Doubling, and Application to Privacy Amplification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1094}, year = {2015}, url = {http://eprint.iacr.org/2015/1094}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AggarwalHL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AggarwalKO15, author = {Divesh Aggarwal and Tomasz Kazana and Maciej Obremski}, title = {Inception Makes Non-malleable Codes Stronger}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1013}, year = {2015}, url = {http://eprint.iacr.org/2015/1013}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AggarwalKO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgievichGKNPRST15, author = {Sergey Agievich and Anastasiya Gorodilova and Nikolay Kolomeec and Svetla Nikova and Bart Preneel and Vincent Rijmen and George Shushuev and Natalia N. Tokareva and Valeriya Vitkup}, title = {Problems, solutions and experience of the first international student's Olympiad in cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {534}, year = {2015}, url = {http://eprint.iacr.org/2015/534}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgievichGKNPRST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalC15, author = {Shashank Agrawal and Melissa Chase}, title = {A study of Pair Encodings: Predicate Encryption in prime order groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {413}, year = {2015}, url = {http://eprint.iacr.org/2015/413}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalCGS15, author = {Megha Agrawal and Donghoon Chang and Mohona Ghosh and Somitra Kumar Sanadhya}, title = {Collision Attack on 4-branch, Type-2 {GFN} based Hash Functions using Sliced Biclique Cryptanalysis Technique}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {234}, year = {2015}, url = {http://eprint.iacr.org/2015/234}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalCGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalCS15, author = {Megha Agrawal and Donghoon Chang and Somitra Kumar Sanadhya}, title = {A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {331}, year = {2015}, url = {http://eprint.iacr.org/2015/331}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalPD15, author = {Sarita Agrawal and Jay Patel and Manik Lal Das}, title = {Pairing Based Mutual Healing in Wireless Sensor Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {538}, year = {2015}, url = {http://eprint.iacr.org/2015/538}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalPD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AhmadianRSA15, author = {Zahra Ahmadian and Shahram Rasoolzadeh and Mahmoud Salmasizadeh and Mohammad Reza Aref}, title = {Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of {SIMON} and {KATAN}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {40}, year = {2015}, url = {http://eprint.iacr.org/2015/040}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AhmadianRSA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AkinS15, author = {Ihsan Haluk Akin and Berk Sunar}, title = {On the Difficulty of Securing Web Applications using CryptDB}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {82}, year = {2015}, url = {http://eprint.iacr.org/2015/082}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AkinS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AkinyeleGH15, author = {Joseph A. Akinyele and Christina Garman and Susan Hohenberger}, title = {Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {290}, year = {2015}, url = {http://eprint.iacr.org/2015/290}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AkinyeleGH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AkshimaCGGS15, author = {Akshima and Donghoon Chang and Mohona Ghosh and Aarushi Goel and Somitra Kumar Sanadhya}, title = {Single Key Recovery Attacks on 9-round Kalyna-128/256 and Kalyna-256/512}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1227}, year = {2015}, url = {http://eprint.iacr.org/2015/1227}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AkshimaCGGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlSabahG15, author = {Mashael AlSabah and Ian Goldberg}, title = {Performance and Security Improvements for Tor: {A} Survey}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {235}, year = {2015}, url = {http://eprint.iacr.org/2015/235}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlSabahG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlTawyAY15, author = {Riham AlTawy and Ahmed Abdelkhalek and Amr M. Youssef}, title = {A Meet-in-the-Middle Attack on Reduced-Round Kalyna-b/2b}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {762}, year = {2015}, url = {http://eprint.iacr.org/2015/762}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlTawyAY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlTawyDY15, author = {Riham AlTawy and Onur Duman and Amr M. Youssef}, title = {Fault Analysis of Kuznyechik}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {347}, year = {2015}, url = {http://eprint.iacr.org/2015/347}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlTawyDY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlTawyY15, author = {Riham AlTawy and Amr M. Youssef}, title = {Meet in the Middle Attacks on Reduced Round Kuznyechik}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {96}, year = {2015}, url = {http://eprint.iacr.org/2015/096}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlTawyY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Alawatugoda15, author = {Janaka Alawatugoda}, title = {Generic Transformation of a CCA2-Secure Public-Key Encryption Scheme to an eCK-Secure Key Exchange Protocol in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1248}, year = {2015}, url = {http://eprint.iacr.org/2015/1248}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Alawatugoda15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlawatugodaBS15, author = {Janaka Alawatugoda and Colin Boyd and Douglas Stebila}, title = {Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {335}, year = {2015}, url = {http://eprint.iacr.org/2015/335}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AlawatugodaBS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbrechtFHLP15, author = {Martin R. Albrecht and Pooya Farshim and Dennis Hofheinz and Enrique Larraia and Kenneth G. Paterson}, title = {Multilinear Maps from Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {780}, year = {2015}, url = {http://eprint.iacr.org/2015/780}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbrechtFHLP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbrechtP15, author = {Martin R. Albrecht and Kenneth G. Paterson}, title = {Lucky Microseconds: {A} Timing Attack on Amazon's s2n Implementation of {TLS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1129}, year = {2015}, url = {http://eprint.iacr.org/2015/1129}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbrechtP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbrechtPS15, author = {Martin R. Albrecht and Rachel Player and Sam Scott}, title = {On the concrete hardness of Learning with Errors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {46}, year = {2015}, url = {http://eprint.iacr.org/2015/046}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbrechtPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AldermanJCC15, author = {James Alderman and Christian Janson and Carlos Cid and Jason Crampton}, title = {Hybrid Publicly Verifiable Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {320}, year = {2015}, url = {http://eprint.iacr.org/2015/320}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AldermanJCC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AldermanJMR15, author = {James Alderman and Christian Janson and Keith M. Martin and Sarah Louise Renwick}, title = {Extended Functionality in Verifiable Searchable Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {975}, year = {2015}, url = {http://eprint.iacr.org/2015/975}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AldermanJMR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlendalKm15, author = {Gunnar Alendal and Christian Kison and modg}, title = {got {HW} crypto? On the (in)security of a Self-Encrypting Drive series}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1002}, year = {2015}, url = {http://eprint.iacr.org/2015/1002}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlendalKm15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlkimBBD15, author = {Erdem Alkim and Nina Bindel and Johannes Buchmann and {\"{O}}zg{\"{u}}r Dagdelen}, title = {{TESLA:} Tightly-Secure Efficient Signatures from Standard Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {755}, year = {2015}, url = {http://eprint.iacr.org/2015/755}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AlkimBBD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlkimDPS15, author = {Erdem Alkim and L{\'{e}}o Ducas and Thomas P{\"{o}}ppelmann and Peter Schwabe}, title = {Post-quantum key exchange - a new hope}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1092}, year = {2015}, url = {http://eprint.iacr.org/2015/1092}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlkimDPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AllanBFPY15, author = {Thomas Allan and Billy Bob Brumley and Katrina Falkner and Joop van de Pol and Yuval Yarom}, title = {Amplifying Side Channels Through Performance Degradation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1141}, year = {2015}, url = {http://eprint.iacr.org/2015/1141}, timestamp = {Mon, 17 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AllanBFPY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AllibertFGKTR15, author = {Julien Allibert and Benoit Feix and Georges Gagnerot and Ismael Kane and Hugues Thiebeauld and Tiana Razafindralambo}, title = {Chicken or the Egg - Computational Data Attacks or Physical Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1086}, year = {2015}, url = {http://eprint.iacr.org/2015/1086}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AllibertFGKTR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlmeidaBBD15, author = {Jos{\'{e}} Bacelar Almeida and Manuel Barbosa and Gilles Barthe and Fran{\c{c}}ois Dupressoir}, title = {Verifiable side-channel security of cryptographic implementations: constant-time {MEE-CBC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1241}, year = {2015}, url = {http://eprint.iacr.org/2015/1241}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlmeidaBBD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AmeriAMS15, author = {Mohammad Hassan Ameri and Maryam Rajabzadeh Asaar and Javad Mohajeri and Mahmoud Salmasizadeh}, title = {A Generic Construction for Verifiable Attribute-based Keyword Search Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {915}, year = {2015}, url = {http://eprint.iacr.org/2015/915}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AmeriAMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AminB15, author = {Ruhul Amin and G. P. Biswas}, title = {Cryptanalysis of a Markov Chain Based User Authentication Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {656}, year = {2015}, url = {http://eprint.iacr.org/2015/656}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AminB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Anandakumar15, author = {N. Nalla Anandakumar}, title = {{SCA} Resistance Analysis of {MAC-PHOTON}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {197}, year = {2015}, url = {http://eprint.iacr.org/2015/197}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Anandakumar15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnanthCCLL15, author = {Prabhanjan Ananth and Yu{-}Chi Chen and Kai{-}Min Chung and Huijia Lin and Wei{-}Kai Lin}, title = {Delegating {RAM} Computations with Adaptive Soundness and Privacy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1082}, year = {2015}, url = {http://eprint.iacr.org/2015/1082}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnanthCCLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnanthJ15, author = {Prabhanjan Ananth and Abhishek Jain}, title = {Indistinguishability Obfuscation from Compact Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {173}, year = {2015}, url = {http://eprint.iacr.org/2015/173}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnanthJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnanthJS15, author = {Prabhanjan Ananth and Abhishek Jain and Amit Sahai}, title = {Achieving Compactness Generically: Indistinguishability Obfuscation from Non-Compact Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {730}, year = {2015}, url = {http://eprint.iacr.org/2015/730}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnanthJS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnanthJS15a, author = {Prabhanjan Ananth and Abhishek Jain and Amit Sahai}, title = {Indistinguishability Obfuscation with Constant Size Overhead}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1023}, year = {2015}, url = {http://eprint.iacr.org/2015/1023}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnanthJS15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnanthJS15b, author = {Prabhanjan Ananth and Abhishek Jain and Amit Sahai}, title = {Patchable Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1084}, year = {2015}, url = {http://eprint.iacr.org/2015/1084}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnanthJS15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnanthS15, author = {Prabhanjan Ananth and Amit Sahai}, title = {Functional Encryption for Turing Machines}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {776}, year = {2015}, url = {http://eprint.iacr.org/2015/776}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnanthS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AndreevaBM15, author = {Elena Andreeva and Andrey Bogdanov and Bart Mennink}, title = {Towards Understanding the Known-Key Security of Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {222}, year = {2015}, url = {http://eprint.iacr.org/2015/222}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AndreevaBM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AndreevaBPS15, author = {Elena Andreeva and Guy Barwell and Dan Page and Martijn Stam}, title = {Turning Online Ciphers Off}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {485}, year = {2015}, url = {http://eprint.iacr.org/2015/485}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AndreevaBPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AndrychowiczMP15, author = {Marcin Andrychowicz and Daniel Masny and Edoardo Persichetti}, title = {Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {317}, year = {2015}, url = {http://eprint.iacr.org/2015/317}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AndrychowiczMP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnkeleKR15, author = {Ralph Ankele and Stefan K{\"{o}}lbl and Christian Rechberger}, title = {State-recovery analysis of Spritz}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {828}, year = {2015}, url = {http://eprint.iacr.org/2015/828}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnkeleKR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Anokhin15, author = {Mikhail Anokhin}, title = {Pseudo-Free Families of Finite Computational Elementary Abelian p-Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1127}, year = {2015}, url = {http://eprint.iacr.org/2015/1127}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Anokhin15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AonoHPW15, author = {Yoshinori Aono and Takuya Hayashi and Le Trieu Phong and Lihua Wang}, title = {Fast and Secure Linear Regression and Biometric Authentication with Security Update}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {692}, year = {2015}, url = {http://eprint.iacr.org/2015/692}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AonoHPW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AonoPW15, author = {Yoshinori Aono and Le Trieu Phong and Lihua Wang}, title = {Hardness Estimation of {LWE} via Band Pruning}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1026}, year = {2015}, url = {http://eprint.iacr.org/2015/1026}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AonoPW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ApececheaES15, author = {Gorka Irazoqui Apecechea and Thomas Eisenbarth and Berk Sunar}, title = {Systematic Reverse Engineering of Cache Slice Selection in Intel Processors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {690}, year = {2015}, url = {http://eprint.iacr.org/2015/690}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ApececheaES15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AponFL15, author = {Daniel Apon and Xiong Fan and Feng{-}Hao Liu}, title = {Bi-Deniable Inner Product Encryption from {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {993}, year = {2015}, url = {http://eprint.iacr.org/2015/993}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AponFL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Applebaum15, author = {Benny Applebaum}, title = {The Cryptographic Hardness of Random Local Functions - Survey}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {165}, year = {2015}, url = {http://eprint.iacr.org/2015/165}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Applebaum15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ApplebaumAB15, author = {Benny Applebaum and Jonathan Avron and Christina Brzuska}, title = {Arithmetic Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {336}, year = {2015}, url = {http://eprint.iacr.org/2015/336}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ApplebaumAB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ApplebaumB15, author = {Benny Applebaum and Zvika Brakerski}, title = {Obfuscating Circuits via Composite-Order Graded Encoding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {25}, year = {2015}, url = {http://eprint.iacr.org/2015/025}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ApplebaumB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ApplebaumR15, author = {Benny Applebaum and Pavel Raykov}, title = {From Private Simultaneous Messages to Zero-Information Arthur-Merlin Protocols and Back}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1046}, year = {2015}, url = {http://eprint.iacr.org/2015/1046}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ApplebaumR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArabaciKSU15, author = {{\"{O}}znur Arabaci and Mehmet Sabir Kiraz and Isa Sertkaya and Osmanbey Uzunkol}, title = {More Efficient Secure Outsourcing Methods for Bilinear Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {960}, year = {2015}, url = {http://eprint.iacr.org/2015/960}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArabaciKSU15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArcherBPP15, author = {David W. Archer and Dan Bogdanov and Benny Pinkas and Pille Pullonen}, title = {Maturity and Performance of Programmable Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1039}, year = {2015}, url = {http://eprint.iacr.org/2015/1039}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArcherBPP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArmknechtBCGJRS15, author = {Frederik Armknecht and Colin Boyd and Christopher Carr and Kristian Gj{\o}steen and Angela J{\"{a}}schke and Christian A. Reuter and Martin Strand}, title = {A Guide to Fully Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1192}, year = {2015}, url = {http://eprint.iacr.org/2015/1192}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArmknechtBCGJRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArmknechtM15, author = {Frederik Armknecht and Vasily Mikhalev}, title = {On Lightweight Stream Ciphers with Shorter Internal States}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {131}, year = {2015}, url = {http://eprint.iacr.org/2015/131}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArmknechtM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AsaarSA15, author = {Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh and Mohammad Reza Aref}, title = {A Provably Secure Short Signature Scheme from Coding Theory}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {948}, year = {2015}, url = {http://eprint.iacr.org/2015/948}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AsaarSA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AsgharK15, author = {Hassan Jameel Asghar and Mohamed Ali K{\^{a}}afar}, title = {When are Identification Protocols with Sparse Challenges Safe? The Case of the Coskun and Herley Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1231}, year = {2015}, url = {http://eprint.iacr.org/2015/1231}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AsgharK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AsharovL0Z15, author = {Gilad Asharov and Yehuda Lindell and Thomas Schneider and Michael Zohner}, title = {More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {61}, year = {2015}, url = {http://eprint.iacr.org/2015/061}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AsharovL0Z15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AsharovS15, author = {Gilad Asharov and Gil Segev}, title = {Limits on the Power of Indistinguishability Obfuscation and Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {341}, year = {2015}, url = {http://eprint.iacr.org/2015/341}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AsharovS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AsharovS15a, author = {Gilad Asharov and Gil Segev}, title = {On Constructing One-Way Permutations from Indistinguishability Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {752}, year = {2015}, url = {http://eprint.iacr.org/2015/752}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AsharovS15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ashur15, author = {Tomer Ashur}, title = {Improved Linear Trails for the Block Cipher Simon}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {285}, year = {2015}, url = {http://eprint.iacr.org/2015/285}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ashur15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AshurM15, author = {Tomer Ashur and Bart Mennink}, title = {Trivial Nonce-Misusing Attack on Pure {OMD}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {175}, year = {2015}, url = {http://eprint.iacr.org/2015/175}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AshurM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseFK15, author = {Giuseppe Ateniese and Antonio Faonio and Seny Kamara}, title = {Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {920}, year = {2015}, url = {http://eprint.iacr.org/2015/920}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseFK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseMV15, author = {Giuseppe Ateniese and Bernardo Magri and Daniele Venturi}, title = {Subversion-Resilient Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {517}, year = {2015}, url = {http://eprint.iacr.org/2015/517}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseMV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Attrapadung015, author = {Nuttapong Attrapadung and Shota Yamada}, title = {Duality in {ABE:} Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {157}, year = {2015}, url = {http://eprint.iacr.org/2015/157}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Attrapadung015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Attrapadung15, author = {Nuttapong Attrapadung}, title = {Dual System Encryption Framework in Prime-Order Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {390}, year = {2015}, url = {http://eprint.iacr.org/2015/390}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Attrapadung15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AttrapadungH015, author = {Nuttapong Attrapadung and Goichiro Hanaoka and Shota Yamada}, title = {A Framework for Identity-Based Encryption with Almost Tight Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {566}, year = {2015}, url = {http://eprint.iacr.org/2015/566}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AttrapadungH015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AubelBN15, author = {Pol Van Aubel and Daniel J. Bernstein and Ruben Niederhagen}, title = {Investigating {SRAM} PUFs in large CPUs and GPUs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {760}, year = {2015}, url = {http://eprint.iacr.org/2015/760}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AubelBN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AumassonJN15, author = {Jean{-}Philippe Aumasson and Philipp Jovanovic and Samuel Neves}, title = {{NORX8} and {NORX16:} Authenticated Encryption for Low-End Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1154}, year = {2015}, url = {http://eprint.iacr.org/2015/1154}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AumassonJN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AysuGMSY15, author = {Aydin Aysu and Ege Gulcan and Daisuke Moriyama and Patrick Schaumont and Moti Yung}, title = {End-to-end Design of a PUF-based Privacy Preserving Authentication Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {937}, year = {2015}, url = {http://eprint.iacr.org/2015/937}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AysuGMSY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AysuS15, author = {Aydin Aysu and Patrick Schaumont}, title = {Precomputation Methods for Faster and Greener Post-Quantum Cryptography on Emerging Embedded Platforms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {288}, year = {2015}, url = {http://eprint.iacr.org/2015/288}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AysuS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AzarGP15, author = {Pablo Azar and Shafi Goldwasser and Sunoo Park}, title = {How to Incentivize Data-Driven Collaboration Among Competing Parties}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {178}, year = {2015}, url = {http://eprint.iacr.org/2015/178}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AzarGP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Azarderakhsh0SK15, author = {Reza Azarderakhsh and Zhe Liu and Hwajeong Seo and Howon Kim}, title = {{NEON} PQCryto: Fast and Parallel Ring-LWE Encryption on {ARM} {NEON} Architecture}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1081}, year = {2015}, url = {http://eprint.iacr.org/2015/1081}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Azarderakhsh0SK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaderJLS15, author = {Christoph Bader and Tibor Jager and Yong Li and Sven Sch{\"{a}}ge}, title = {On the Impossibility of Tight Cryptographic Reductions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {374}, year = {2015}, url = {http://eprint.iacr.org/2015/374}, timestamp = {Thu, 16 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaderJLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Badertscher0MRT15, author = {Christian Badertscher and Christian Matt and Ueli Maurer and Phillip Rogaway and Bj{\"{o}}rn Tackmann}, title = {Augmented Secure Channels and the Goal of the {TLS} 1.3 Record Layer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {394}, year = {2015}, url = {http://eprint.iacr.org/2015/394}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Badertscher0MRT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Badertscher0MRT15a, author = {Christian Badertscher and Christian Matt and Ueli Maurer and Phillip Rogaway and Bj{\"{o}}rn Tackmann}, title = {Robust Authenticated Encryption and the Limits of Symmetric Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {893}, year = {2015}, url = {http://eprint.iacr.org/2015/893}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Badertscher0MRT15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Badrinarayanan015, author = {Saikrishna Badrinarayanan and Divya Gupta and Abhishek Jain and Amit Sahai}, title = {Multi-Input Functional Encryption for Unbounded Arity Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1136}, year = {2015}, url = {http://eprint.iacr.org/2015/1136}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Badrinarayanan015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayananM15, author = {Saikrishna Badrinarayanan and Eric Miles and Amit Sahai and Mark Zhandry}, title = {Post-Zeroizing Obfuscation: The case of Evasive Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {167}, year = {2015}, url = {http://eprint.iacr.org/2015/167}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayananM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bagheri15, author = {Nasour Bagheri}, title = {Linear Cryptanalysis of Reduced-Round {SIMECK} Variants}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {716}, year = {2015}, url = {http://eprint.iacr.org/2015/716}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bagheri15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BagheriSJ15, author = {Nasour Bagheri and Masoumeh Safkhani and Hoda Jannati}, title = {Security Analysis of Niu et al. Authentication and Ownership Management Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {615}, year = {2015}, url = {http://eprint.iacr.org/2015/615}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BagheriSJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaiLLSS15, author = {Shi Bai and Adeline Langlois and Tancr{\`{e}}de Lepoint and Damien Stehl{\'{e}} and Ron Steinfeld}, title = {Improved security proofs in lattice-based cryptography: using the R{\'{e}}nyi divergence rather than the statistical distance}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {483}, year = {2015}, url = {http://eprint.iacr.org/2015/483}, timestamp = {Tue, 30 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaiLLSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaigneresDFGLR15, author = {Thomas Baign{\`{e}}res and C{\'{e}}cile Delerabl{\'{e}}e and Matthieu Finiasz and Louis Goubin and Tancr{\`{e}}de Lepoint and Matthieu Rivain}, title = {Trap Me If You Can - Million Dollar Curve}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1249}, year = {2015}, url = {http://eprint.iacr.org/2015/1249}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaigneresDFGLR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaksiMS15, author = {Anubhab Baksi and Subhamoy Maitra and Santanu Sarkar}, title = {New Distinguishers for Reduced Round Trivium and Trivia-SC using Cube Testers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {223}, year = {2015}, url = {http://eprint.iacr.org/2015/223}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaksiMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BalaschFG15, author = {Josep Balasch and Sebastian Faust and Benedikt Gierlichs}, title = {Inner Product Masking Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {105}, year = {2015}, url = {http://eprint.iacr.org/2015/105}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BalaschFG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BalaschGRV15, author = {Josep Balasch and Benedikt Gierlichs and Oscar Reparaz and Ingrid Verbauwhede}, title = {DPA, Bitslicing and Masking at 1 GHz}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {727}, year = {2015}, url = {http://eprint.iacr.org/2015/727}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BalaschGRV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaldimtsiK0Z15, author = {Foteini Baldimtsi and Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang}, title = {Indistinguishable Proofs of Work or Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1230}, year = {2015}, url = {http://eprint.iacr.org/2015/1230}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaldimtsiK0Z15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BanciuOW15, author = {Valentina Banciu and Elisabeth Oswald and Carolyn Whitnall}, title = {Reliable Information Extraction for Single Trace Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {45}, year = {2015}, url = {http://eprint.iacr.org/2015/045}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BanciuOW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BanciuOW15a, author = {Valentina Banciu and Elisabeth Oswald and Carolyn Whitnall}, title = {Exploring the Resilience of Some Lightweight Ciphers Against Pro led Single Trace Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {161}, year = {2015}, url = {http://eprint.iacr.org/2015/161}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BanciuOW15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Banik15, author = {Subhadeep Banik}, title = {Some results on Sprout}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {327}, year = {2015}, url = {http://eprint.iacr.org/2015/327}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Banik15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BanikBISHAR15, author = {Subhadeep Banik and Andrey Bogdanov and Takanori Isobe and Kyoji Shibutani and Harunaga Hiwatari and Toru Akishita and Francesco Regazzoni}, title = {Midori: {A} Block Cipher for Low Energy (Extended Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1142}, year = {2015}, url = {http://eprint.iacr.org/2015/1142}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BanikBISHAR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BanikBR15, author = {Subhadeep Banik and Andrey Bogdanov and Francesco Regazzoni}, title = {Exploring Energy Efficiency of Lightweight Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {847}, year = {2015}, url = {http://eprint.iacr.org/2015/847}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BanikBR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BansalCS15, author = {Tarun Kumar Bansal and Donghoon Chang and Somitra Kumar Sanadhya}, title = {Sponge based {CCA2} secure asymmetric encryption for arbitrary length message}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {330}, year = {2015}, url = {http://eprint.iacr.org/2015/330}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BansalCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BansarkhaniB15, author = {Rachid El Bansarkhani and Johannes Buchmann}, title = {High Performance Lattice-based CCA-secure Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {42}, year = {2015}, url = {http://eprint.iacr.org/2015/042}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BansarkhaniB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaoLL15, author = {Zhenzhen Bao and Peng Luo and Dongdai Lin}, title = {Bitsliced Implementations of the PRINCE, {LED} and {RECTANGLE} Block Ciphers on {AVR} 8-bit Microcontrollers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1118}, year = {2015}, url = {http://eprint.iacr.org/2015/1118}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaoLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bar-On15, author = {Achiya Bar{-}On}, title = {Improved Higher-Order Differential Attacks on {MISTY1}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {367}, year = {2015}, url = {http://eprint.iacr.org/2015/367}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bar-On15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bar-On15a, author = {Achiya Bar{-}On}, title = {A 2\({}^{\mbox{70}}\) Attack on the Full {MISTY1}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {746}, year = {2015}, url = {http://eprint.iacr.org/2015/746}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bar-On15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Barbulescu15, author = {Razvan Barbulescu}, title = {An appendix for a recent paper of Kim}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1076}, year = {2015}, url = {http://eprint.iacr.org/2015/1076}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Barbulescu15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarbulescuGK15, author = {Razvan Barbulescu and Pierrick Gaudry and Thorsten Kleinjung}, title = {The Tower Number Field Sieve}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {505}, year = {2015}, url = {http://eprint.iacr.org/2015/505}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarbulescuGK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaronDLO15, author = {Joshua Baron and Karim El Defrawy and Joshua Lampkins and Rafail Ostrovsky}, title = {Communication-Optimal Proactive Secret Sharing for Dynamic Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {304}, year = {2015}, url = {http://eprint.iacr.org/2015/304}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaronDLO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarretoCMNGZ15, author = {Paulo S. L. M. Barreto and Craig Costello and Rafael Misoczki and Michael Naehrig and C. C. F. Pereira Geovandro and Gustavo H. M. Zanon}, title = {Subgroup security in pairing-based cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {247}, year = {2015}, url = {http://eprint.iacr.org/2015/247}, timestamp = {Fri, 06 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarretoCMNGZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BartheBDFG15, author = {Gilles Barthe and Sonia Bela{\"{\i}}d and Fran{\c{c}}ois Dupressoir and Pierre{-}Alain Fouque and Benjamin Gr{\'{e}}goire}, title = {Compositional Verification of Higher-Order Masking: Application to a Verifying Masking Compiler}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {506}, year = {2015}, url = {http://eprint.iacr.org/2015/506}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BartheBDFG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BartheBDFGS15, author = {Gilles Barthe and Sonia Bela{\"{\i}}d and Fran{\c{c}}ois Dupressoir and Pierre{-}Alain Fouque and Benjamin Gr{\'{e}}goire and Pierre{-}Yves Strub}, title = {Verified Proofs of Higher-Order Masking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {60}, year = {2015}, url = {http://eprint.iacr.org/2015/060}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BartheBDFGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BartheCLS15, author = {Gilles Barthe and Juan Manuel Crespo and Yassine Lakhnech and Benedikt Schmidt}, title = {Mind the Gap: Modular Machine-checked Proofs of One-Round Key Exchange Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {74}, year = {2015}, url = {http://eprint.iacr.org/2015/074}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BartheCLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BartheFFSST15, author = {Gilles Barthe and Edvard Fagerholm and Dario Fiore and Andre Scedrov and Benedikt Schmidt and Mehdi Tibouchi}, title = {Strongly-Optimal Structure Preserving Signatures from Type {II} Pairings: Synthesis and Lower Bounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {19}, year = {2015}, url = {http://eprint.iacr.org/2015/019}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BartheFFSST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarwellPS15, author = {Guy Barwell and Dan Page and Martijn Stam}, title = {Rogue Decryption Failures: Reconciling {AE} Robustness Notions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {895}, year = {2015}, url = {http://eprint.iacr.org/2015/895}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarwellPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BattistelloG15, author = {Alberto Battistello and Christophe Giraud}, title = {Fault Cryptanalysis of {CHES} 2014 Symmetric Infective Countermeasure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {500}, year = {2015}, url = {http://eprint.iacr.org/2015/500}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BattistelloG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BayerG15, author = {Stephanie Bayer and Jens Groth}, title = {Zero-knowledge Argument for Polynomial Evaluation with Application to Blacklists}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {195}, year = {2015}, url = {http://eprint.iacr.org/2015/195}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BayerG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaysalS15, author = {Adnan Baysal and Suhap Sahin}, title = {RoadRunneR: {A} Small And Fast Bitslice Block Cipher For Low Cost 8-bit Processors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {906}, year = {2015}, url = {http://eprint.iacr.org/2015/906}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaysalS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeaulieuSSTWW15, author = {Ray Beaulieu and Douglas Shors and Jason Smith and Stefan Treatman{-}Clark and Bryan Weeks and Louis Wingers}, title = {{SIMON} and {SPECK:} Block Ciphers for the Internet of Things}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {585}, year = {2015}, url = {http://eprint.iacr.org/2015/585}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeaulieuSSTWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeckerDGL15, author = {Anja Becker and L{\'{e}}o Ducas and Nicolas Gama and Thijs Laarhoven}, title = {New directions in nearest neighbor searching with applications to lattice sieving}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1128}, year = {2015}, url = {http://eprint.iacr.org/2015/1128}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeckerDGL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeckerGJ15, author = {Anja Becker and Nicolas Gama and Antoine Joux}, title = {Speeding-up lattice sieving without increasing the memory, using sub-quadratic nearest neighbor search}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {522}, year = {2015}, url = {http://eprint.iacr.org/2015/522}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeckerGJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeckerL15, author = {Anja Becker and Thijs Laarhoven}, title = {Efficient (ideal) lattice sieving using cross-polytope {LSH}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {823}, year = {2015}, url = {http://eprint.iacr.org/2015/823}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeckerL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BegelforMV15, author = {Evgeni Begelfor and Stephen D. Miller and Ramarathnam Venkatesan}, title = {Non-Abelian Analogs of Lattice Rounding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {24}, year = {2015}, url = {http://eprint.iacr.org/2015/024}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BegelforMV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeierleJLLR15, author = {Christof Beierle and Philipp Jovanovic and Martin M. Lauridsen and Gregor Leander and Christian Rechberger}, title = {Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {212}, year = {2015}, url = {http://eprint.iacr.org/2015/212}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeierleJLLR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BelaidCFGKP15, author = {Sonia Bela{\"{\i}}d and Jean{-}S{\'{e}}bastien Coron and Pierre{-}Alain Fouque and Beno{\^{\i}}t G{\'{e}}rard and Jean{-}Gabriel Kammerer and Emmanuel Prouff}, title = {Improved Side-Channel Analysis of Finite-Field Multiplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {542}, year = {2015}, url = {http://eprint.iacr.org/2015/542}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BelaidCFGKP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareJK15, author = {Mihir Bellare and Joseph Jaeger and Daniel Kane}, title = {Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {808}, year = {2015}, url = {http://eprint.iacr.org/2015/808}, timestamp = {Tue, 09 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareJK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareK15, author = {Mihir Bellare and Sriram Keelveedhi}, title = {Interactive Message-Locked Encryption and Secure Deduplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {52}, year = {2015}, url = {http://eprint.iacr.org/2015/052}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareL15, author = {Mihir Bellare and Anna Lysyanskaya}, title = {Symmetric and Dual PRFs from Standard Assumptions: {A} Generic Validation of an {HMAC} Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1198}, year = {2015}, url = {http://eprint.iacr.org/2015/1198}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareS15, author = {Mihir Bellare and Igors Stepanovs}, title = {Point-Function Obfuscation: {A} Framework and Generic Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {703}, year = {2015}, url = {http://eprint.iacr.org/2015/703}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareS15a, author = {Mihir Bellare and Douglas Stebila}, title = {Double-Authentication-Preventing Signatures from Trapdoor Identification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1157}, year = {2015}, url = {http://eprint.iacr.org/2015/1157}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareS15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareST15, author = {Mihir Bellare and Igors Stepanovs and Stefano Tessaro}, title = {Contention in Cryptoland: Obfuscation, Leakage and {UCE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {487}, year = {2015}, url = {http://eprint.iacr.org/2015/487}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ben-SassonBDIR15, author = {Eli Ben{-}Sasson and Iddo Bentov and Ivan Damg{\aa}rd and Yuval Ishai and Noga Ron{-}Zewi}, title = {On Public Key Encryption from Noisy Codewords}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {572}, year = {2015}, url = {http://eprint.iacr.org/2015/572}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ben-SassonBDIR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ben-ZviBT15, author = {Adi Ben{-}Zvi and Simon R. Blackburn and Boaz Tsaban}, title = {A Practical Cryptanalysis of the Algebraic Eraser}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1102}, year = {2015}, url = {http://eprint.iacr.org/2015/1102}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ben-ZviBT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenadjilaCD15, author = {Ryad Benadjila and Thomas Calderon and Marion Daubignard}, title = {CamlCrush: {A} PKCS{\textbackslash}{\#}11 Filtering Proxy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {63}, year = {2015}, url = {http://eprint.iacr.org/2015/063}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenadjilaCD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenhamoudaBCPV15, author = {Fabrice Benhamouda and Olivier Blazy and C{\'{e}}line Chevalier and David Pointcheval and Damien Vergnaud}, title = {New Techniques for SPHFs and Efficient One-Round {PAKE} Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {188}, year = {2015}, url = {http://eprint.iacr.org/2015/188}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenhamoudaBCPV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenhamoudaCPW15, author = {Fabrice Benhamouda and Geoffroy Couteau and David Pointcheval and Hoeteck Wee}, title = {Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {246}, year = {2015}, url = {http://eprint.iacr.org/2015/246}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenhamoudaCPW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeninTT15, author = {Almog Benin and Sivan Toledo and Eran Tromer}, title = {Secure Association for the Internet of Things}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {940}, year = {2015}, url = {http://eprint.iacr.org/2015/940}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeninTT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BergsmaJS15, author = {Florian Bergsma and Tibor Jager and J{\"{o}}rg Schwenk}, title = {One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {15}, year = {2015}, url = {http://eprint.iacr.org/2015/015}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BergsmaJS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernhardCGPW15, author = {David Bernhard and V{\'{e}}ronique Cortier and David Galindo and Olivier Pereira and Bogdan Warinschi}, title = {A comprehensive analysis of game-based ballot privacy definitions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {255}, year = {2015}, url = {http://eprint.iacr.org/2015/255}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernhardCGPW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernhardFW15, author = {David Bernhard and Marc Fischlin and Bogdan Warinschi}, title = {Adaptive Proofs of Knowledge in the Random Oracle Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {648}, year = {2015}, url = {http://eprint.iacr.org/2015/648}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernhardFW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernhardFW15a, author = {David Bernhard and Marc Fischlin and Bogdan Warinschi}, title = {On the Hardness of Proving CCA-security of Signed ElGamal}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {649}, year = {2015}, url = {http://eprint.iacr.org/2015/649}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernhardFW15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernhardW15, author = {David Bernhard and Bogdan Warinschi}, title = {On Limitations of the Fiat{\-} - Shamir Transformation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {712}, year = {2015}, url = {http://eprint.iacr.org/2015/712}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernhardW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bernstein15, author = {Daniel J. Bernstein}, title = {Multi-user Schnorr security, revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {996}, year = {2015}, url = {http://eprint.iacr.org/2015/996}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bernstein15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinCKL15, author = {Daniel J. Bernstein and Chitchanok Chuengsatiansup and David Kohel and Tanja Lange}, title = {Twisted Hessian curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {781}, year = {2015}, url = {http://eprint.iacr.org/2015/781}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinCKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinCS15, author = {Daniel J. Bernstein and Tung Chou and Peter Schwabe}, title = {McBits: fast constant-time code-based cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {610}, year = {2015}, url = {http://eprint.iacr.org/2015/610}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinHLN15, author = {Daniel J. Bernstein and Andreas H{\"{u}}lsing and Tanja Lange and Ruben Niederhagen}, title = {Bad directions in cryptographic hash functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {151}, year = {2015}, url = {http://eprint.iacr.org/2015/151}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinHLN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinJLSY15, author = {Daniel J. Bernstein and Simon Josefsson and Tanja Lange and Peter Schwabe and Bo{-}Yin Yang}, title = {EdDSA for more curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {677}, year = {2015}, url = {http://eprint.iacr.org/2015/677}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinJLSY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinLN15, author = {Daniel J. Bernstein and Tanja Lange and Ruben Niederhagen}, title = {Dual {EC:} {A} Standardized Back Door}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {767}, year = {2015}, url = {http://eprint.iacr.org/2015/767}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinLN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinLV15, author = {Daniel J. Bernstein and Tanja Lange and Christine van Vredendaal}, title = {Tighter, faster, simpler side-channel security evaluations beyond computing power}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {221}, year = {2015}, url = {http://eprint.iacr.org/2015/221}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinLV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BertoniDPA15, author = {Guido Bertoni and Joan Daemen and Micha{\"{e}}l Peeters and Gilles Van Assche}, title = {Keccak}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {389}, year = {2015}, url = {http://eprint.iacr.org/2015/389}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BertoniDPA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhargavaM15, author = {Mudit Bhargava and Ken Mai}, title = {A High Reliability {PUF} Using Hot Carrier Injection Based Response Reinforcement}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {427}, year = {2015}, url = {http://eprint.iacr.org/2015/427}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BhargavaM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhatSI15, author = {Varsha Bhat and Harsimran Singh and S. R. S. Iyengar}, title = {Secure Multi-party Graph Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {817}, year = {2015}, url = {http://eprint.iacr.org/2015/817}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BhatSI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhattacharyaM15, author = {Sarani Bhattacharya and Debdeep Mukhopadhyay}, title = {Who watches the watchmen? : Utilizing Performance Monitors for Compromising keys of {RSA} on Intel Platforms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {621}, year = {2015}, url = {http://eprint.iacr.org/2015/621}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BhattacharyaM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhaumikN15, author = {Ritam Bhaumik and Mridul Nandi}, title = {Revisiting Turning Online Cipher Off}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {813}, year = {2015}, url = {http://eprint.iacr.org/2015/813}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BhaumikN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhaumikN15a, author = {Ritam Bhaumik and Mridul Nandi}, title = {An Inverse-free Single-Keyed Tweakable Enciphering Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1148}, year = {2015}, url = {http://eprint.iacr.org/2015/1148}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BhaumikN15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BibakK0T15, author = {Khodakhast Bibak and Bruce M. Kapron and S. Venkatesh and L{\'{a}}szl{\'{o}} T{\'{o}}th}, title = {On an almost-universal hash function family with applications to authentication and secrecy codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1187}, year = {2015}, url = {http://eprint.iacr.org/2015/1187}, timestamp = {Fri, 14 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BibakK0T15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BibakK0TT15, author = {Khodakhast Bibak and Bruce M. Kapron and S. Venkatesh and Roberto Tauraso and L{\'{a}}szl{\'{o}} T{\'{o}}th}, title = {Restricted linear congruences}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1186}, year = {2015}, url = {http://eprint.iacr.org/2015/1186}, timestamp = {Fri, 14 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BibakK0TT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BigouT15, author = {Karim Bigou and Arnaud Tisserand}, title = {Improving Modular Inversion in {RNS} using the Plus-Minus Method}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {193}, year = {2015}, url = {http://eprint.iacr.org/2015/193}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BigouT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BilginBKMW15, author = {Beg{\"{u}}l Bilgin and Andrey Bogdanov and Miroslav Knezevic and Florian Mendel and Qingju Wang}, title = {{FIDES:} Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {424}, year = {2015}, url = {http://eprint.iacr.org/2015/424}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BilginBKMW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BiryukovDK15, author = {Alex Biryukov and Daniel Dinu and Dmitry Khovratovich}, title = {Fast and Tradeoff-Resilient Memory-Hard Functions for Cryptocurrencies and Password Hashing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {430}, year = {2015}, url = {http://eprint.iacr.org/2015/430}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BiryukovDK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BiryukovDP15, author = {Alex Biryukov and Patrick Derbez and L{\'{e}}o Perrin}, title = {Differential Analysis and Meet-in-the-Middle Attack against Round-Reduced {TWINE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {240}, year = {2015}, url = {http://eprint.iacr.org/2015/240}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BiryukovDP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BiryukovK15, author = {Alex Biryukov and Dmitry Khovratovich}, title = {Tradeoff Cryptanalysis of Memory-Hard Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {227}, year = {2015}, url = {http://eprint.iacr.org/2015/227}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BiryukovK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BiryukovK15a, author = {Alex Biryukov and Dmitry Khovratovich}, title = {Decomposition attack on {SASASASAS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {646}, year = {2015}, url = {http://eprint.iacr.org/2015/646}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BiryukovK15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BiryukovK15b, author = {Alex Biryukov and Dmitry Khovratovich}, title = {Asymmetric proof-of-work based on the Generalized Birthday problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {946}, year = {2015}, url = {http://eprint.iacr.org/2015/946}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BiryukovK15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BiryukovLP15, author = {Alex Biryukov and Ga{\"{e}}tan Leurent and L{\'{e}}o Perrin}, title = {Cryptanalysis of Feistel Networks with Secret Round Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {723}, year = {2015}, url = {http://eprint.iacr.org/2015/723}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BiryukovLP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BiryukovN15, author = {Alex Biryukov and Ivica Nikolic}, title = {Complementing Feistel Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {426}, year = {2015}, url = {http://eprint.iacr.org/2015/426}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BiryukovN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BiryukovP15, author = {Alex Biryukov and L{\'{e}}o Perrin}, title = {On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {976}, year = {2015}, url = {http://eprint.iacr.org/2015/976}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BiryukovP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BiryukovPU15, author = {Alex Biryukov and L{\'{e}}o Perrin and Aleksei Udovenko}, title = {The Secret Structure of the S-Box of Streebog, Kuznechik and Stribob}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {812}, year = {2015}, url = {http://eprint.iacr.org/2015/812}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BiryukovPU15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BishopHW15, author = {Allison Bishop and Susan Hohenberger and Brent Waters}, title = {New Circular Security Counterexamples from Decision Linear and Learning with Errors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {715}, year = {2015}, url = {http://eprint.iacr.org/2015/715}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BishopHW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BishopJK15, author = {Allison Bishop and Abhishek Jain and Lucas Kowalczyk}, title = {Function-Hiding Inner Product Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {672}, year = {2015}, url = {http://eprint.iacr.org/2015/672}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BishopJK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BishopPRW15, author = {Allison Bishop and Valerio Pastro and Rajmohan Rajaraman and Daniel Wichs}, title = {Essentially Optimal Robust Secret Sharing with Maximal Corruptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1032}, year = {2015}, url = {http://eprint.iacr.org/2015/1032}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BishopPRW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BitanskyG0PVW15, author = {Nir Bitansky and Shafi Goldwasser and Abhishek Jain and Omer Paneth and Vinod Vaikuntanathan and Brent Waters}, title = {Time-Lock Puzzles from Randomized Encodings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {514}, year = {2015}, url = {http://eprint.iacr.org/2015/514}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BitanskyG0PVW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BitanskyGLPT15, author = {Nir Bitansky and Sanjam Garg and Huijia Lin and Rafael Pass and Sidharth Telang}, title = {Succinct Randomized Encodings and their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {356}, year = {2015}, url = {http://eprint.iacr.org/2015/356}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BitanskyGLPT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BitanskyP15, author = {Nir Bitansky and Omer Paneth}, title = {On Non-Black-Box Simulation and the Impossibility of Approximate Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {369}, year = {2015}, url = {http://eprint.iacr.org/2015/369}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BitanskyP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BitanskyPW15, author = {Nir Bitansky and Omer Paneth and Daniel Wichs}, title = {Perfect Structure on the Edge of Chaos}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {126}, year = {2015}, url = {http://eprint.iacr.org/2015/126}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BitanskyPW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BitanskyV15, author = {Nir Bitansky and Vinod Vaikuntanathan}, title = {Indistinguishability Obfuscation from Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {163}, year = {2015}, url = {http://eprint.iacr.org/2015/163}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BitanskyV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BitanskyV15a, author = {Nir Bitansky and Vinod Vaikuntanathan}, title = {Indistinguishability Obfuscation: from Approximate to Exact}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {704}, year = {2015}, url = {http://eprint.iacr.org/2015/704}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BitanskyV15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BitanskyV15b, author = {Nir Bitansky and Vinod Vaikuntanathan}, title = {A Note on Perfect Correctness by Derandomization}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1130}, year = {2015}, url = {http://eprint.iacr.org/2015/1130}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BitanskyV15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlantonB15, author = {Marina Blanton and Fattaneh Bayatbabolghani}, title = {Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {422}, year = {2015}, url = {http://eprint.iacr.org/2015/422}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlantonB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlazyC15, author = {Olivier Blazy and C{\'{e}}line Chevalier}, title = {Generic Construction of UC-Secure Oblivious Transfer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {560}, year = {2015}, url = {http://eprint.iacr.org/2015/560}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlazyC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlazyCV15, author = {Olivier Blazy and C{\'{e}}line Chevalier and Damien Vergnaud}, title = {Non-Interactive Zero-Knowledge Proofs of Non-Membership}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {72}, year = {2015}, url = {http://eprint.iacr.org/2015/072}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlazyCV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlazyCV15a, author = {Olivier Blazy and C{\'{e}}line Chevalier and Damien Vergnaud}, title = {Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1144}, year = {2015}, url = {http://eprint.iacr.org/2015/1144}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlazyCV15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlazyK15, author = {Olivier Blazy and Saqib A. Kakvi}, title = {Group Signatures Without q-Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {858}, year = {2015}, url = {http://eprint.iacr.org/2015/858}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlazyK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlockiBD15, author = {Jeremiah Blocki and Manuel Blum and Anupam Datta}, title = {Naturally Rehearsing Passwords}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {166}, year = {2015}, url = {http://eprint.iacr.org/2015/166}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlockiBD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlondeauBV15, author = {C{\'{e}}line Blondeau and Asl{\'{\i}} Bay and Serge Vaudenay}, title = {Protecting against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {380}, year = {2015}, url = {http://eprint.iacr.org/2015/380}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlondeauBV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlondeauM15, author = {C{\'{e}}line Blondeau and Marine Minier}, title = {Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks using the Matrix Method}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {141}, year = {2015}, url = {http://eprint.iacr.org/2015/141}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlondeauM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlondeauN15, author = {C{\'{e}}line Blondeau and Kaisa Nyberg}, title = {New Links Between Differential and Linear Cryptanalysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {183}, year = {2015}, url = {http://eprint.iacr.org/2015/183}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlondeauN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlondeauN15a, author = {C{\'{e}}line Blondeau and Kaisa Nyberg}, title = {Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {184}, year = {2015}, url = {http://eprint.iacr.org/2015/184}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlondeauN15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlondeauN15b, author = {C{\'{e}}line Blondeau and Kaisa Nyberg}, title = {Joint Data and Key Distribution of the Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity Estimates of Multiple/Multidimensional Linear and Truncated Differential Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {935}, year = {2015}, url = {http://eprint.iacr.org/2015/935}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlondeauN15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlondeauPW15, author = {C{\'{e}}line Blondeau and Thomas Peyrin and Lei Wang}, title = {Known-key Distinguisher on Full {PRESENT}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {575}, year = {2015}, url = {http://eprint.iacr.org/2015/575}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlondeauPW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bock15, author = {Hanno B{\"{o}}ck}, title = {A look at the {PGP} ecosystem through the key server data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {262}, year = {2015}, url = {http://eprint.iacr.org/2015/262}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bock15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BogdanovGMRR15, author = {Andrej Bogdanov and Siyao Guo and Daniel Masny and Silas Richelson and Alon Rosen}, title = {On the Hardness of Learning with Rounding over Small Modulus}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {769}, year = {2015}, url = {http://eprint.iacr.org/2015/769}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BogdanovGMRR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BogdanovKKRST15, author = {Dan Bogdanov and Liina Kamm and Baldur Kubo and Reimo Rebane and Ville Sokk and Riivo Talviste}, title = {Students and Taxes: a Privacy-Preserving Social Study Using Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1159}, year = {2015}, url = {http://eprint.iacr.org/2015/1159}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BogdanovKKRST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BogdanovKMTW15, author = {Andrey Bogdanov and Ilya Kizhvatov and Kamran Manzoor and Elmar Tischhauser and Marc Witteman}, title = {Fast and Memory-Efficient Key Recovery in Side-Channel Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {795}, year = {2015}, url = {http://eprint.iacr.org/2015/795}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BogdanovKMTW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BogdanovL15, author = {Andrej Bogdanov and Chin Ho Lee}, title = {Homomorphic evaluation requires depth}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1044}, year = {2015}, url = {http://eprint.iacr.org/2015/1044}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BogdanovL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BogosTV15, author = {Sonia Bogos and Florian Tram{\`{e}}r and Serge Vaudenay}, title = {On Solving Lpn using {BKW} and Variants}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {49}, year = {2015}, url = {http://eprint.iacr.org/2015/049}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BogosTV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoldyrevaDPS15, author = {Alexandra Boldyreva and Jean Paul Degabriele and Kenneth G. Paterson and Martijn Stam}, title = {Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {59}, year = {2015}, url = {http://eprint.iacr.org/2015/059}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoldyrevaDPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoldyrevaKLW15, author = {Alexandra Boldyreva and Taesoo Kim and Richard J. Lipton and Bogdan Warinschi}, title = {Towards Provably-Secure Remote Memory Attestation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {729}, year = {2015}, url = {http://eprint.iacr.org/2015/729}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoldyrevaKLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehLMR15, author = {Dan Boneh and Kevin Lewi and Hart William Montgomery and Ananth Raghunathan}, title = {Key Homomorphic PRFs and Their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {220}, year = {2015}, url = {http://eprint.iacr.org/2015/220}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehLMR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehLW15, author = {Dan Boneh and Kevin Lewi and David J. Wu}, title = {Constraining Pseudorandom Functions Privately}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1167}, year = {2015}, url = {http://eprint.iacr.org/2015/1167}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonneauCG15, author = {Joseph Bonneau and Jeremy Clark and Steven Goldfeder}, title = {On Bitcoin as a public randomness source}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1015}, year = {2015}, url = {http://eprint.iacr.org/2015/1015}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonneauCG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonneauMCNKF15, author = {Joseph Bonneau and Andrew Miller and Jeremy Clark and Arvind Narayanan and Joshua A. Kroll and Edward W. Felten}, title = {Research Perspectives and Challenges for Bitcoin and Cryptocurrencies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {261}, year = {2015}, url = {http://eprint.iacr.org/2015/261}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonneauMCNKF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BootleCCGGP15, author = {Jonathan Bootle and Andrea Cerulli and Pyrros Chaidos and Essam Ghadafi and Jens Groth and Christophe Petit}, title = {Short Accountable Ring Signatures Based on {DDH}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {643}, year = {2015}, url = {http://eprint.iacr.org/2015/643}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BootleCCGGP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosHMT15, author = {Joppe W. Bos and Charles Hubain and Wil Michiels and Philippe Teuwen}, title = {Differential Computation Analysis: Hiding your White-Box Designs is Not Enough}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {753}, year = {2015}, url = {http://eprint.iacr.org/2015/753}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosHMT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoseDR15, author = {Priyanka Bose and Dipanjan Das and C. Pandu Rangan}, title = {Constant Size Ring Signature Without Random Oracle}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {164}, year = {2015}, url = {http://eprint.iacr.org/2015/164}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoseDR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BottinelliB15, author = {Paul Bottinelli and Joppe W. Bos}, title = {Computational Aspects of Correlation Power Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {260}, year = {2015}, url = {http://eprint.iacr.org/2015/260}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BottinelliB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoureanuMV15, author = {Ioana Boureanu and Aikaterini Mitrokotsa and Serge Vaudenay}, title = {Towards Secure Distance Bounding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {208}, year = {2015}, url = {http://eprint.iacr.org/2015/208}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoureanuMV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoydHMS15, author = {Colin Boyd and Britta Hale and Stig Frode Mj{\o}lsnes and Douglas Stebila}, title = {From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to {TLS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1150}, year = {2015}, url = {http://eprint.iacr.org/2015/1150}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoydHMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyleN15, author = {Elette Boyle and Moni Naor}, title = {Is There an Oblivious {RAM} Lower Bound?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {863}, year = {2015}, url = {http://eprint.iacr.org/2015/863}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyleN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiGHLST15, author = {Zvika Brakerski and Craig Gentry and Shai Halevi and Tancr{\`{e}}de Lepoint and Amit Sahai and Mehdi Tibouchi}, title = {Cryptanalysis of the Quadratic Zero-Testing of {GGH}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {845}, year = {2015}, url = {http://eprint.iacr.org/2015/845}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiGHLST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiKS15, author = {Zvika Brakerski and Ilan Komargodski and Gil Segev}, title = {From Single-Input to Multi-Input Functional Encryption in the Private-Key Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {158}, year = {2015}, url = {http://eprint.iacr.org/2015/158}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiS15, author = {Zvika Brakerski and Gil Segev}, title = {Hierarchical Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1011}, year = {2015}, url = {http://eprint.iacr.org/2015/1011}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiV15, author = {Zvika Brakerski and Vinod Vaikuntanathan}, title = {Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions Or: How to Secretly Embed a Circuit in Your {PRF}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {32}, year = {2015}, url = {http://eprint.iacr.org/2015/032}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Brandao15, author = {Lu{\'{\i}}s T. A. N. Brand{\~{a}}o}, title = {Very-efficient simulatable flipping of many coins into a well}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {640}, year = {2015}, url = {http://eprint.iacr.org/2015/640}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Brandao15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrinciKMRB15, author = {Riadh Brinci and Walid Khmiri and Mefteh Mbarek and Abdellatif Ben Rabaa and Ammar Bouall{\`{e}}gue}, title = {Efficient Hardware Design for Computing Pairings Using Few {FPGA} In-built DSPs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {116}, year = {2015}, url = {http://eprint.iacr.org/2015/116}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrinciKMRB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BroadbentJ15, author = {Anne Broadbent and Stacey Jeffery}, title = {Quantum homomorphic encryption for circuits of low T-gate complexity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {551}, year = {2015}, url = {http://eprint.iacr.org/2015/551}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BroadbentJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BroadbentS15, author = {Anne Broadbent and Christian Schaffner}, title = {Quantum Cryptography Beyond Quantum Key Distribution}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1242}, year = {2015}, url = {http://eprint.iacr.org/2015/1242}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BroadbentS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Brown15, author = {Daniel R. L. Brown}, title = {Short Schnorr signatures require a hash function with more than just random-prefix resistance}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {169}, year = {2015}, url = {http://eprint.iacr.org/2015/169}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Brown15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Brown15a, author = {Daniel R. L. Brown}, title = {Bounds on surmising remixed keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {375}, year = {2015}, url = {http://eprint.iacr.org/2015/375}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Brown15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Brown15b, author = {Daniel R. L. Brown}, title = {A flaw in a theorem about Schnorr signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {509}, year = {2015}, url = {http://eprint.iacr.org/2015/509}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Brown15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Brown15c, author = {Daniel R. L. Brown}, title = {Alternative cubics' rules with an algebraic appeal}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {544}, year = {2015}, url = {http://eprint.iacr.org/2015/544}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Brown15c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Brumley15, author = {Billy Bob Brumley}, title = {Faster software for fast endomorphisms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {36}, year = {2015}, url = {http://eprint.iacr.org/2015/036}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Brumley15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BruneauGHR15, author = {Nicolas Bruneau and Sylvain Guilley and Annelie Heuser and Olivier Rioul}, title = {Masks will Fall Off - Higher-Order Optimal Distinguishers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {452}, year = {2015}, url = {http://eprint.iacr.org/2015/452}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BruneauGHR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BruneauGNT15, author = {Nicolas Bruneau and Sylvain Guilley and Zakaria Najm and Yannick Teglia}, title = {Multi-Variate High-Order Attacks of Shuffled Tables Recomputation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {837}, year = {2015}, url = {http://eprint.iacr.org/2015/837}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BruneauGNT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrzuskaM15, author = {Christina Brzuska and Arno Mittelbach}, title = {Universal Computational Extractors and the Superfluous Padding Assumption for Indistinguishability Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {581}, year = {2015}, url = {http://eprint.iacr.org/2015/581}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrzuskaM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BuhrowRSGD15, author = {Benjamin Buhrow and Paul Riemer and Mike Shea and Barry K. Gilbert and Erik S. Daniel}, title = {Block Cipher Speed and Energy Efficiency Records on the {MSP430:} System Design Trade-Offs for 16-bit Embedded Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {11}, year = {2015}, url = {http://eprint.iacr.org/2015/011}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BuhrowRSGD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BunZ15, author = {Mark Bun and Mark Zhandry}, title = {Order-Revealing Encryption and the Hardness of Private Learning}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {417}, year = {2015}, url = {http://eprint.iacr.org/2015/417}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BunZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BurraLNNOOSS15, author = {Sai Sheshank Burra and Enrique Larraia and Jesper Buus Nielsen and Peter Sebastian Nordholt and Claudio Orlandi and Emmanuela Orsini and Peter Scholl and Nigel P. Smart}, title = {High Performance Multi-Party Computation for Binary Circuits Based on Oblivious Transfer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {472}, year = {2015}, url = {http://eprint.iacr.org/2015/472}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BurraLNNOOSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bursuc15, author = {Sergiu Bursuc}, title = {Secure two-party computation in applied pi-calculus: models and verification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {782}, year = {2015}, url = {http://eprint.iacr.org/2015/782}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bursuc15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BussiDMD15, author = {Khushboo Bussi and Dhananjoy Dey and Prasanna Raghaw Mishra and B. K. Dass}, title = {{MGR} {HASH} {FUNCTION}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {856}, year = {2015}, url = {http://eprint.iacr.org/2015/856}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BussiDMD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CDM15, author = {Prakruti C and Sashank Dara and V. N. Muralidhara}, title = {Efficient Format Preserving Encrypted Databases}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {219}, year = {2015}, url = {http://eprint.iacr.org/2015/219}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CDM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CabarcasDGLW15, author = {Daniel Cabarcas and Denise Demirel and Florian G{\"{o}}pfert and Jean Lancrenon and Thomas Wunderer}, title = {An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {628}, year = {2015}, url = {http://eprint.iacr.org/2015/628}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CabarcasDGLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CamenischDHK15, author = {Jan Camenisch and Maria Dubovitskaya and Kristiyan Haralambiev and Markulf Kohlweiss}, title = {Composable {\&} Modular Anonymous Credentials: Definitions and Practical Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {580}, year = {2015}, url = {http://eprint.iacr.org/2015/580}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CamenischDHK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CamenischDL15, author = {Jan Camenisch and Manu Drijvers and Anja Lehmann}, title = {Universally Composable Direct Anonymous Attestation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1246}, year = {2015}, url = {http://eprint.iacr.org/2015/1246}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CamenischDL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CamenischEN15, author = {Jan Camenisch and Robert R. Enderlein and Gregory Neven}, title = {Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {6}, year = {2015}, url = {http://eprint.iacr.org/2015/006}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CamenischEN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CamenischLNS15, author = {Jan Camenisch and Anja Lehmann and Gregory Neven and Kai Samelin}, title = {Virtual Smart Cards: How to Sign with a Password and a Server}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1101}, year = {2015}, url = {http://eprint.iacr.org/2015/1101}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CamenischLNS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanardO15, author = {S{\'{e}}bastien Canard and Baptiste Olivier}, title = {Differential Privacy in distribution and instance-based noise mechanisms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {701}, year = {2015}, url = {http://eprint.iacr.org/2015/701}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanardO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanardPS15, author = {S{\'{e}}bastien Canard and David Pointcheval and Olivier Sanders}, title = {Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {278}, year = {2015}, url = {http://eprint.iacr.org/2015/278}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanardPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanardPST15, author = {S{\'{e}}bastien Canard and David Pointcheval and Olivier Sanders and Jacques Traor{\'{e}}}, title = {Scalable Divisible E-cash}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {300}, year = {2015}, url = {http://eprint.iacr.org/2015/300}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanardPST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanardT15, author = {S{\'{e}}bastien Canard and Viet Cuong Trinh}, title = {Private Ciphertext-Policy Attribute-based Encryption Schemes With Constant-Size Ciphertext Supporting {CNF} Access Policy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {891}, year = {2015}, url = {http://eprint.iacr.org/2015/891}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanardT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiCHR15, author = {Ran Canetti and Yilei Chen and Justin Holmgren and Mariana Raykova}, title = {Succinct Adaptive Garbled {RAM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1074}, year = {2015}, url = {http://eprint.iacr.org/2015/1074}, timestamp = {Wed, 23 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiCHR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiCR15, author = {Ran Canetti and Yilei Chen and Leonid Reyzin}, title = {On the Correlation Intractability of Obfuscated Pseudorandom Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {334}, year = {2015}, url = {http://eprint.iacr.org/2015/334}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiCR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiG015, author = {Ran Canetti and Vipul Goyal and Abhishek Jain}, title = {Concurrent Secure Computation with Optimal Query Complexity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {559}, year = {2015}, url = {http://eprint.iacr.org/2015/559}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiG015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiH15, author = {Ran Canetti and Justin Holmgren}, title = {Fully Succinct Garbled {RAM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {388}, year = {2015}, url = {http://eprint.iacr.org/2015/388}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiKP15, author = {Ran Canetti and Yael Tauman Kalai and Omer Paneth}, title = {On Obfuscation with Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {48}, year = {2015}, url = {http://eprint.iacr.org/2015/048}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiKP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanteautCFLNPS15, author = {Anne Canteaut and Sergiu Carpov and Caroline Fontaine and Tancr{\`{e}}de Lepoint and Mar{\'{\i}}a Naya{-}Plasencia and Pascal Paillier and Renaud Sirdey}, title = {How to Compress Homomorphic Ciphertexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {113}, year = {2015}, url = {http://eprint.iacr.org/2015/113}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanteautCFLNPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanteautDL15, author = {Anne Canteaut and S{\'{e}}bastien Duval and Ga{\"{e}}tan Leurent}, title = {Construction of Lightweight S-Boxes using Feistel and {MISTY} structures (Full Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {711}, year = {2015}, url = {http://eprint.iacr.org/2015/711}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanteautDL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanteautLN15, author = {Anne Canteaut and Virginie Lallemand and Mar{\'{\i}}a Naya{-}Plasencia}, title = {Related-Key Attack on Full-Round {PICARO}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {754}, year = {2015}, url = {http://eprint.iacr.org/2015/754}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanteautLN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanteautR15, author = {Anne Canteaut and Jo{\"{e}}lle Rou{\'{e}}}, title = {On the behaviors of affine equivalent Sboxes regarding differential and linear attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {85}, year = {2015}, url = {http://eprint.iacr.org/2015/085}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanteautR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CaoC15, author = {Zhengjun Cao and Zhenfu Cao}, title = {Comment on Quantum Cryptography - Which is More Important, Signal Security, Information Security or Communication Reliability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1251}, year = {2015}, url = {http://eprint.iacr.org/2015/1251}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CaoC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CaoCL15, author = {Zhengjun Cao and Zhenfu Cao and Lihua Liu}, title = {Comment on Demonstrations of Shor's Algorithm in the Past Decades}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1207}, year = {2015}, url = {http://eprint.iacr.org/2015/1207}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CaoCL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CaoL15, author = {Zhengjun Cao and Lihua Liu}, title = {On the Disadvantages of Pairing-based Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {84}, year = {2015}, url = {http://eprint.iacr.org/2015/084}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CaoL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CaoL15a, author = {Zhengjun Cao and Lihua Liu}, title = {A Note on the Lindell-Waisbard Private Web Search Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {299}, year = {2015}, url = {http://eprint.iacr.org/2015/299}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CaoL15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CaoL15b, author = {Zhengjun Cao and Lihua Liu}, title = {Comment on "Realization of a scalable Shor algorithm"}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1133}, year = {2015}, url = {http://eprint.iacr.org/2015/1133}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CaoL15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Carlet15, author = {Claude Carlet}, title = {More {PS} and H-like bent functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {168}, year = {2015}, url = {http://eprint.iacr.org/2015/168}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Carlet15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletG15, author = {Claude Carlet and Sylvain Guilley}, title = {Complementary Dual Codes for Counter-measures to Side-Channel Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {603}, year = {2015}, url = {http://eprint.iacr.org/2015/603}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarmonSW15, author = {Elad Carmon and Jean{-}Pierre Seifert and Avishai Wool}, title = {Simple Photonic Emission Attack with Reduced Data Complexity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1206}, year = {2015}, url = {http://eprint.iacr.org/2015/1206}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarmonSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CaroIO15, author = {Angelo De Caro and Vincenzo Iovino and Adam O'Neill}, title = {Deniable Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1205}, year = {2015}, url = {http://eprint.iacr.org/2015/1205}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CaroIO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarpovS15, author = {Sergiu Carpov and Renaud Sirdey}, title = {A compression method for homomorphic ciphertexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1199}, year = {2015}, url = {http://eprint.iacr.org/2015/1199}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarpovS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CashKT15, author = {David Cash and Eike Kiltz and Stefano Tessaro}, title = {Two-Round Man-in-the-Middle Security from {LPN}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1220}, year = {2015}, url = {http://eprint.iacr.org/2015/1220}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CashKT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CastagnosL15, author = {Guilhem Castagnos and Fabien Laguillaumie}, title = {Linearly Homomorphic Encryption from {DDH}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {47}, year = {2015}, url = {http://eprint.iacr.org/2015/047}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CastagnosL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CatalanoF15, author = {Dario Catalano and Dario Fiore}, title = {Practical Homomorphic MACs for Arithmetic Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {194}, year = {2015}, url = {http://eprint.iacr.org/2015/194}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CatalanoF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CatalanoFGN15, author = {Dario Catalano and Dario Fiore and Rosario Gennaro and Luca Nizzardo}, title = {Generalizing Homomorphic MACs for Arithmetic Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {396}, year = {2015}, url = {http://eprint.iacr.org/2015/396}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CatalanoFGN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CatalanoFN15, author = {Dario Catalano and Dario Fiore and Luca Nizzardo}, title = {Programmable Hash Functions go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {826}, year = {2015}, url = {http://eprint.iacr.org/2015/826}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CatalanoFN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CavalloCKS15, author = {Bren Cavallo and Giovanni Di Crescenzo and Delaram Kahrobaei and Vladimir Shpilrain}, title = {Efficient and Secure Delegation of Group Exponentiation to a Single Server}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {206}, year = {2015}, url = {http://eprint.iacr.org/2015/206}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CavalloCKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CenkH15, author = {Murat Cenk and M. Anwar Hasan}, title = {Some New Results on Binary Polynomial Multiplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {94}, year = {2015}, url = {http://eprint.iacr.org/2015/094}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CenkH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CetinDDS15, author = {Gizem S. {\c{C}}etin and Wei Dai and Yarkin Dor{\"{o}}z and Berk Sunar}, title = {Homomorphic Autocomplete}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1194}, year = {2015}, url = {http://eprint.iacr.org/2015/1194}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CetinDDS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CetinDSM15, author = {Gizem S. {\c{C}}etin and Yarkin Dor{\"{o}}z and Berk Sunar and William J. Martin}, title = {An Investigation of Complex Operations with Word-Size Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1195}, year = {2015}, url = {http://eprint.iacr.org/2015/1195}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CetinDSM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CetinDSS15, author = {Gizem S. {\c{C}}etin and Yarkin Dor{\"{o}}z and Berk Sunar and Erkay Savas}, title = {Low Depth Circuits for Efficient Homomorphic Sorting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {274}, year = {2015}, url = {http://eprint.iacr.org/2015/274}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CetinDSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChakrabortiCHN15, author = {Avik Chakraborti and Anupam Chattopadhyay and Muhammad Hassan and Mridul Nandi}, title = {TriviA: {A} Fast and Secure Authenticated Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {590}, year = {2015}, url = {http://eprint.iacr.org/2015/590}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChakrabortiCHN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chakraborty15, author = {Sumit Chakraborty}, title = {Security Intelligence for Broadcast : Threat Analytics}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {332}, year = {2015}, url = {http://eprint.iacr.org/2015/332}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Chakraborty15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chakraborty15a, author = {Sumit Chakraborty}, title = {Financial Cryptography: Discriminatory Pricing Mechanism}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {370}, year = {2015}, url = {http://eprint.iacr.org/2015/370}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Chakraborty15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chakraborty15b, author = {Sumit Chakraborty}, title = {Financial Cryptography: Algorithmic Mechanisms for a Hedonic Game}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {381}, year = {2015}, url = {http://eprint.iacr.org/2015/381}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Chakraborty15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chakraborty15c, author = {Sumit Chakraborty}, title = {Secure Multi-party Computation: How to Solve the Problem between Security Intelligence {\&} Business Intelligence}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {804}, year = {2015}, url = {http://eprint.iacr.org/2015/804}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Chakraborty15c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChakrabortyMM15, author = {Abhishek Chakraborty and Bodhisatwa Mazumdar and Debdeep Mukhopadhyay}, title = {Combined Side-Channel and Fault Analysis Attack on Protected Grain Family of Stream Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {602}, year = {2015}, url = {http://eprint.iacr.org/2015/602}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChakrabortyMM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChakrabortyMS15, author = {Debrup Chakraborty and Cuauhtemoc Mancillas{-}L{\'{o}}pez and Palash Sarkar}, title = {Disk Encryption: Do We Need to Preserve Length?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {594}, year = {2015}, url = {http://eprint.iacr.org/2015/594}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChakrabortyMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChakrabortyRR15a, author = {Suvradip Chakraborty and Srinivasan Raghuraman and C. Pandu Rangan}, title = {Efficient, Pairing-Free, One Round Attribute-Based Authenticated Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {520}, year = {2015}, url = {http://eprint.iacr.org/2015/520}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChakrabortyRR15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChandranCLNX15, author = {Nishanth Chandran and Melissa Chase and Feng{-}Hao Liu and Ryo Nishimaki and Keita Xagawa}, title = {Re-encryption, functional re-encryption, and multi-hop re-encryption: {A} framework for achieving obfuscation-based security and instantiations from lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {491}, year = {2015}, url = {http://eprint.iacr.org/2015/491}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChandranCLNX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChandranGJS15, author = {Nishanth Chandran and Vipul Goyal and Aayush Jain and Amit Sahai}, title = {Functional Encryption: Decentralised and Delegatable}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1017}, year = {2015}, url = {http://eprint.iacr.org/2015/1017}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChandranGJS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChandranGMPU15, author = {Nishanth Chandran and Vipul Goyal and Pratyay Mukherjee and Omkant Pandey and Jalaj Upadhyay}, title = {Block-wise Non-Malleable Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {129}, year = {2015}, url = {http://eprint.iacr.org/2015/129}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChandranGMPU15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChandranKR15, author = {Nishanth Chandran and Bhavana Kanukurthi and Srinivasan Raghuraman}, title = {Information-theoretic Local Non-malleable Codes and their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1056}, year = {2015}, url = {http://eprint.iacr.org/2015/1056}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChandranKR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChandranRV15, author = {Nishanth Chandran and Srinivasan Raghuraman and Dhinakaran Vinayagamurthy}, title = {Reducing Multilinear Map Levels in Constrained PRFs and {ABE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {829}, year = {2015}, url = {http://eprint.iacr.org/2015/829}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChandranRV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChangJMS15, author = {Donghoon Chang and Arpan Jati and Sweta Mishra and Somitra Kumar Sanadhya}, title = {Rig: {A} simple, secure and flexible design for Password Hashing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {9}, year = {2015}, url = {http://eprint.iacr.org/2015/009}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChangJMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChangJMS15a, author = {Donghoon Chang and Arpan Jati and Sweta Mishra and Somitra Kumar Sanadhya}, title = {Performance Analysis of Some Password Hashing Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {139}, year = {2015}, url = {http://eprint.iacr.org/2015/139}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChangJMS15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CharpinMS15, author = {Pascale Charpin and Sihem Mesnager and Sumanta Sarkar}, title = {Dickson Polynomials that are Involutions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {434}, year = {2015}, url = {http://eprint.iacr.org/2015/434}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CharpinMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChatterjeeBJR15, author = {Rahul Chatterjee and Joseph Bonneau and Ari Juels and Thomas Ristenpart}, title = {Cracking-Resistant Password Vaults using Natural Language Encoders}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {788}, year = {2015}, url = {http://eprint.iacr.org/2015/788}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChatterjeeBJR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChatterjeeS15, author = {Ayantika Chatterjee and Indranil Sengupta}, title = {{FURISC:} {FHE} Encrypted {URISC} Design}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {699}, year = {2015}, url = {http://eprint.iacr.org/2015/699}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChatterjeeS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChatterjeeS15a, author = {Ayantika Chatterjee and Indranil Sengupta}, title = {Searching and Sorting of Fully Homomorphic Encrypted Data on Cloud}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {981}, year = {2015}, url = {http://eprint.iacr.org/2015/981}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChatterjeeS15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaudhariD15, author = {Payal Chaudhari and Manik Lal Das}, title = {Privacy-preserving Attribute Based Searchable Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {899}, year = {2015}, url = {http://eprint.iacr.org/2015/899}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaudhariD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenCCLLZ15, author = {Yu{-}Chi Chen and Sherman S. M. Chow and Kai{-}Min Chung and Russell W. F. Lai and Wei{-}Kai Lin and Hong{-}Sheng Zhou}, title = {Computation-Trace Indistinguishability Obfuscation and its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {406}, year = {2015}, url = {http://eprint.iacr.org/2015/406}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenCCLLZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenEMS15, author = {Cong Chen and Thomas Eisenbarth and Ingo von Maurich and Rainer Steinwandt}, title = {Masking Large Keys in Hardware: {A} Masked Implementation of McEliece}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {924}, year = {2015}, url = {http://eprint.iacr.org/2015/924}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenEMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenGW15, author = {Jie Chen and Romain Gay and Hoeteck Wee}, title = {Improved Dual System {ABE} in Prime-Order Groups via Predicate Encodings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {409}, year = {2015}, url = {http://eprint.iacr.org/2015/409}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenGW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenHZ15, author = {Binglong Chen and Chuangqiang Hu and Chang{-}An Zhao}, title = {A Note on Scalar Multiplication Using Division Polynomials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {284}, year = {2015}, url = {http://eprint.iacr.org/2015/284}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenHZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenITE15, author = {Cong Chen and Mehmet Sinan Inci and Mostafa Taha and Thomas Eisenbarth}, title = {SpecTre: {A} Tiny Side-Channel Resistant Speck Core for FPGAs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {691}, year = {2015}, url = {http://eprint.iacr.org/2015/691}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenITE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenLS15, author = {Hao Chen and Kristin E. Lauter and Katherine E. Stange}, title = {Attacks on Search {RLWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {971}, year = {2015}, url = {http://eprint.iacr.org/2015/971}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenLT15, author = {Binyi Chen and Huijia Lin and Stefano Tessaro}, title = {Oblivious Parallel {RAM:} Improved Efficiency and Generic Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1053}, year = {2015}, url = {http://eprint.iacr.org/2015/1053}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenLT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenQZDC15, author = {Yu Chen and Baodong Qin and Jiang Zhang and Yi Deng and Sherman S. M. Chow}, title = {Non-Malleable Functions and Their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1253}, year = {2015}, url = {http://eprint.iacr.org/2015/1253}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenQZDC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenST15, author = {Yi{-}Ruei Chen and Shiuan{-}Tzuo Shen and Wen{-}Guey Tzeng}, title = {Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over Zp}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {947}, year = {2015}, url = {http://eprint.iacr.org/2015/947}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenW15, author = {Huaifeng Chen and Xiaoyun Wang}, title = {Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-guessing Techniques}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {666}, year = {2015}, url = {http://eprint.iacr.org/2015/666}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenWW15, author = {Zhan Chen and Ning Wang and Xiaoyun Wang}, title = {Impossible Differential Cryptanalysis of Reduced Round {SIMON}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {286}, year = {2015}, url = {http://eprint.iacr.org/2015/286}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenZ15, author = {Binglong Chen and Chang{-}An Zhao}, title = {An Improvment of the Elliptic Net Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {276}, year = {2015}, url = {http://eprint.iacr.org/2015/276}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenalT15, author = {Massimo Chenal and Qiang Tang}, title = {Key Recovery Attack against an NTRU-type Somewhat Homomorphic Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {83}, year = {2015}, url = {http://eprint.iacr.org/2015/083}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenalT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenetteLWW15, author = {Nathan Chenette and Kevin Lewi and Stephen A. Weis and David J. Wu}, title = {Practical Order-Revealing Encryption with Limited Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1125}, year = {2015}, url = {http://eprint.iacr.org/2015/1125}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenetteLWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChengZ15, author = {Shantian Cheng and Juanyang Zhang}, title = {Adaptive-ID Secure Revocable Identity-Based Encryption from Lattices via Subset Difference Method}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {98}, year = {2015}, url = {http://eprint.iacr.org/2015/098}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChengZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CheonKL15, author = {Jung Hee Cheon and Miran Kim and Kristin E. Lauter}, title = {Homomorphic Computation of Edit Distance}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {132}, year = {2015}, url = {http://eprint.iacr.org/2015/132}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CheonKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CheonL15, author = {Jung Hee Cheon and Changmin Lee}, title = {Cryptanalysis of the multilinear map on the ideal lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {461}, year = {2015}, url = {http://eprint.iacr.org/2015/461}, timestamp = {Fri, 26 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CheonL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CheonLR15, author = {Jung Hee Cheon and Changmin Lee and Hansol Ryu}, title = {Cryptanalysis of the New {CLT} Multilinear Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {934}, year = {2015}, url = {http://eprint.iacr.org/2015/934}, timestamp = {Fri, 26 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CheonLR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Cheraghchi15, author = {Mahdi Cheraghchi}, title = {Nearly Optimal Robust Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {951}, year = {2015}, url = {http://eprint.iacr.org/2015/951}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Cheraghchi15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChiCKK15, author = {Dong Pyo Chi and Jeong Woon Choi and Jeong San Kim and Taewan Kim}, title = {Lattice Based Cryptography for Beginners}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {938}, year = {2015}, url = {http://eprint.iacr.org/2015/938}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChiCKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChiappettaSY15, author = {Marco Chiappetta and Erkay Savas and Cemal Yilmaz}, title = {Real time detection of cache-based side-channel attacks using Hardware Performance Counters}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1034}, year = {2015}, url = {http://eprint.iacr.org/2015/1034}, timestamp = {Wed, 21 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChiappettaSY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChiesaTV15, author = {Alessandro Chiesa and Eran Tromer and Madars Virza}, title = {Cluster Computing in Zero Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {377}, year = {2015}, url = {http://eprint.iacr.org/2015/377}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChiesaTV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoiCHK15, author = {Kyu Young Choi and Jihoon Cho and Jung Yeon Hwang and Taekyoung Kwon}, title = {Constructing Efficient {PAKE} Protocols from Identity-Based {KEM/DEM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {606}, year = {2015}, url = {http://eprint.iacr.org/2015/606}, timestamp = {Thu, 12 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChoiCHK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoiKKC15, author = {Seung Geol Choi and Jonathan Katz and Ranjit Kumaresan and Carlos Cid}, title = {Multi-Client Non-Interactive Verifiable Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {190}, year = {2015}, url = {http://eprint.iacr.org/2015/190}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoiKKC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chou15, author = {Tung Chou}, title = {Sandy2x: New Curve25519 Speed Records}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {943}, year = {2015}, url = {http://eprint.iacr.org/2015/943}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Chou15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChouO15, author = {Tung Chou and Claudio Orlandi}, title = {The Simplest Protocol for Oblivious Transfer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {267}, year = {2015}, url = {http://eprint.iacr.org/2015/267}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChouO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoudhuryOPS15, author = {Ashish Choudhury and Emmanuela Orsini and Arpita Patra and Nigel P. Smart}, title = {Linear Overhead Robust {MPC} with Honest Majority Using Preprocessing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {705}, year = {2015}, url = {http://eprint.iacr.org/2015/705}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoudhuryOPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChungCS15, author = {Ping Ngai Chung and Craig Costello and Benjamin Smith}, title = {Fast, uniform, and compact scalar multiplication for elliptic curves and genus 2 Jacobians with applications to signature schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {983}, year = {2015}, url = {http://eprint.iacr.org/2015/983}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChungCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChungKZ15, author = {Kai{-}Min Chung and Jonathan Katz and Hong{-}Sheng Zhou}, title = {Functional Encryption from (Small) Hardwae Tokens}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {153}, year = {2015}, url = {http://eprint.iacr.org/2015/153}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChungKZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChungP15, author = {Kai{-}Min Chung and Rafael Pass}, title = {Tight Parallel Repetition Theorems for Public-Coin Arguments using KL-divergence}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {31}, year = {2015}, url = {http://eprint.iacr.org/2015/031}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChungP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CiampiPSSV15, author = {Michele Ciampi and Giuseppe Persiano and Alessandra Scafuro and Luisa Siniscalchi and Ivan Visconti}, title = {Improved {OR} Composition of Sigma-Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {810}, year = {2015}, url = {http://eprint.iacr.org/2015/810}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CiampiPSSV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CiampiPSV15, author = {Michele Ciampi and Giuseppe Persiano and Luisa Siniscalchi and Ivan Visconti}, title = {A Transform for {NIZK} Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {770}, year = {2015}, url = {http://eprint.iacr.org/2015/770}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CiampiPSV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CioranescoKNC15, author = {Jean{-}Michel Cioranesco and Roman Korkikian and David Naccache and Rodrigo Portella do Canto}, title = {Buying {AES} Design Resistance with Speed and Energy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {786}, year = {2015}, url = {http://eprint.iacr.org/2015/786}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CioranescoKNC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ClavierFW15, author = {Christophe Clavier and Julien Francq and Antoine Wurcker}, title = {Study of a Parity Check Based Fault-Detection Countermeasure for the {AES} Key Schedule}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {877}, year = {2015}, url = {http://eprint.iacr.org/2015/877}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ClavierFW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CogliatiLS15, author = {Benoit Cogliati and Rodolphe Lampe and Yannick Seurin}, title = {Tweaking Even-Mansour Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {539}, year = {2015}, url = {http://eprint.iacr.org/2015/539}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CogliatiLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CogliatiS15, author = {Benoit Cogliati and Yannick Seurin}, title = {On the Provable Security of the Iterated Even-Mansour Cipher against Related-Key and Chosen-Key Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {69}, year = {2015}, url = {http://eprint.iacr.org/2015/069}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CogliatiS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CogliatiS15a, author = {Benoit Cogliati and Yannick Seurin}, title = {Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {851}, year = {2015}, url = {http://eprint.iacr.org/2015/851}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CogliatiS15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Cohen15, author = {Ran Cohen}, title = {Asynchronous Secure Multiparty Computation in Constant Time}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1238}, year = {2015}, url = {http://eprint.iacr.org/2015/1238}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Cohen15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CohenGV15, author = {Aloni Cohen and Shafi Goldwasser and Vinod Vaikuntanathan}, title = {Aggregatable Pseudorandom Functions and Connections to Learning}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {38}, year = {2015}, url = {http://eprint.iacr.org/2015/038}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CohenGV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CohenH15, author = {Aloni Cohen and Justin Holmgren}, title = {Multilinear Pseudorandom Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {125}, year = {2015}, url = {http://eprint.iacr.org/2015/125}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CohenH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CohenHNVW15, author = {Aloni Cohen and Justin Holmgren and Ryo Nishimaki and Vinod Vaikuntanathan and Daniel Wichs}, title = {Watermarking Cryptographic Capabilities}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1096}, year = {2015}, url = {http://eprint.iacr.org/2015/1096}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CohenHNVW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CohenHOR15, author = {Ran Cohen and Iftach Haitner and Eran Omri and Lior Rotem}, title = {Characterization of Secure Multiparty Computation Without Broadcast}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {846}, year = {2015}, url = {http://eprint.iacr.org/2015/846}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CohenHOR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CohenHV15, author = {Aloni Cohen and Justin Holmgren and Vinod Vaikuntanathan}, title = {Publicly Verifiable Software Watermarking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {373}, year = {2015}, url = {http://eprint.iacr.org/2015/373}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CohenHV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Contini15, author = {Scott Contini}, title = {Method to Protect Passwords in Databases for Web Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {387}, year = {2015}, url = {http://eprint.iacr.org/2015/387}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Contini15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CorettiDTV15, author = {Sandro Coretti and Yevgeniy Dodis and Bj{\"{o}}rn Tackmann and Daniele Venturi}, title = {Non-Malleable Encryption: Simpler, Shorter, Stronger}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {772}, year = {2015}, url = {http://eprint.iacr.org/2015/772}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CorettiDTV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Coron15, author = {Jean{-}S{\'{e}}bastien Coron}, title = {Cryptanalysis of {GGH15} Multilinear Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1037}, year = {2015}, url = {http://eprint.iacr.org/2015/1037}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Coron15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronFRZ15, author = {Jean{-}S{\'{e}}bastien Coron and Jean{-}Charles Faug{\`{e}}re and Gu{\'{e}}na{\"{e}}l Renault and Rina Zeitoun}, title = {Factoring N=p\({}^{\mbox{r}}\) q\({}^{\mbox{s}}\) for Large r and s}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {71}, year = {2015}, url = {http://eprint.iacr.org/2015/071}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronFRZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronGHLMM0ST15, author = {Jean{-}S{\'{e}}bastien Coron and Craig Gentry and Shai Halevi and Tancr{\`{e}}de Lepoint and Hemanta K. Maji and Eric Miles and Mariana Raykova and Amit Sahai and Mehdi Tibouchi}, title = {Zeroizing Without Low-Level Zeroes: New {MMAP} Attacks and Their Limitations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {596}, year = {2015}, url = {http://eprint.iacr.org/2015/596}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronGHLMM0ST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronLT15, author = {Jean{-}S{\'{e}}bastien Coron and Tancr{\`{e}}de Lepoint and Mehdi Tibouchi}, title = {New Multilinear Maps over the Integers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {162}, year = {2015}, url = {http://eprint.iacr.org/2015/162}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronLT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronPRR15, author = {Jean{-}S{\'{e}}bastien Coron and Emmanuel Prouff and Matthieu Rivain and Thomas Roche}, title = {Higher-Order Side Channel Security and Mask Refreshing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {359}, year = {2015}, url = {http://eprint.iacr.org/2015/359}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronPRR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CortierEKMW15, author = {V{\'{e}}ronique Cortier and Fabienne Eigner and Steve Kremer and Matteo Maffei and Cyrille Wiedling}, title = {Type-Based Verification of Electronic Voting Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {39}, year = {2015}, url = {http://eprint.iacr.org/2015/039}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CortierEKMW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CortierFG15, author = {V{\'{e}}ronique Cortier and Georg Fuchsbauer and David Galindo}, title = {BeleniosRF: {A} Strongly Receipt-Free Electronic Voting Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {629}, year = {2015}, url = {http://eprint.iacr.org/2015/629}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CortierFG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CostacheS15, author = {Anamaria Costache and Nigel P. Smart}, title = {Which Ring Based Somewhat Homomorphic Encryption Scheme is Best?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {889}, year = {2015}, url = {http://eprint.iacr.org/2015/889}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CostacheS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CostanLD15, author = {Victor Costan and Ilia A. Lebedev and Srinivas Devadas}, title = {Sanctum: Minimal {RISC} Extensions for Isolated Execution}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {564}, year = {2015}, url = {http://eprint.iacr.org/2015/564}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CostanLD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CostelloL15, author = {Craig Costello and Patrick Longa}, title = {FourQ: four-dimensional decompositions on a Q-curve over the Mersenne prime}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {565}, year = {2015}, url = {http://eprint.iacr.org/2015/565}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CostelloL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CouteauPP15, author = {Geoffroy Couteau and Thomas Peters and David Pointcheval}, title = {Encryption Switching Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {990}, year = {2015}, url = {http://eprint.iacr.org/2015/990}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CouteauPP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CouteauPP15a, author = {Geoffroy Couteau and Thomas Peters and David Pointcheval}, title = {Secure Distributed Computation on Private Inputs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1196}, year = {2015}, url = {http://eprint.iacr.org/2015/1196}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CouteauPP15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerDDFS15, author = {Ronald Cramer and Ivan Bjerre Damg{\aa}rd and Nico D{\"{o}}ttling and Serge Fehr and Gabriele Spini}, title = {Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1089}, year = {2015}, url = {http://eprint.iacr.org/2015/1089}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerDDFS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerDK15, author = {Ronald Cramer and Ivan Damg{\aa}rd and Marcel Keller}, title = {On the Amortized Complexity of Zero-knowledge Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {446}, year = {2015}, url = {http://eprint.iacr.org/2015/446}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerDK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerDPR15, author = {Ronald Cramer and L{\'{e}}o Ducas and Chris Peikert and Oded Regev}, title = {Recovering Short Generators of Principal Ideals in Cyclotomic Rings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {313}, year = {2015}, url = {http://eprint.iacr.org/2015/313}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerDPR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CrepeauK15, author = {Claude Cr{\'{e}}peau and Raza Ali Kazmi}, title = {Oblivious Transfer from weakly Random Self-Reducible Public-Key Cryptosystem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {362}, year = {2015}, url = {http://eprint.iacr.org/2015/362}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CrepeauK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CrepeauK15a, author = {Claude Cr{\'{e}}peau and Raza Ali Kazmi}, title = {Zero-Knowledge Interactive Proof Systems for New Lattice Problems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {969}, year = {2015}, url = {http://eprint.iacr.org/2015/969}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CrepeauK15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CrockettP15, author = {Eric Crockett and Chris Peikert}, title = {{\(\Lambda\)} {\(\circ\)} {\(\lambda\)}: {A} Functional Library for Lattice Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1134}, year = {2015}, url = {http://eprint.iacr.org/2015/1134}, timestamp = {Thu, 02 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CrockettP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DArcoES15, author = {Paolo D'Arco and Navid Nasr Esfahani and Douglas R. Stinson}, title = {All or Nothing at All}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {998}, year = {2015}, url = {http://eprint.iacr.org/2015/998}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DArcoES15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledFK15, author = {Dana Dachman{-}Soled and Nils Fleischhacker and Jonathan Katz and Anna Lysyanskaya and Dominique Schr{\"{o}}der}, title = {Feasibility and Infeasibility of Secure Computation with Malicious PUFs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {405}, year = {2015}, url = {http://eprint.iacr.org/2015/405}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledFK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledKT15, author = {Dana Dachman{-}Soled and Jonathan Katz and Aishwarya Thiruvengadam}, title = {10-Round Feistel is Indifferentiable from an Ideal Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {876}, year = {2015}, url = {http://eprint.iacr.org/2015/876}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledKT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledLPSV15, author = {Dana Dachman{-}Soled and Chang Liu and Charalampos Papamanthou and Elaine Shi and Uzi Vishkin}, title = {Oblivious Network {RAM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {73}, year = {2015}, url = {http://eprint.iacr.org/2015/073}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledLPSV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DagherBBCB15, author = {Gaby G. Dagher and Benedikt B{\"{u}}nz and Joseph Bonneau and Jeremy Clark and Dan Boneh}, title = {Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1008}, year = {2015}, url = {http://eprint.iacr.org/2015/1008}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DagherBBCB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DahabGM15, author = {Ricardo Dahab and Steven D. Galbraith and Eduardo Morais}, title = {Adaptive key recovery attacks on NTRU-based somewhat homomorphic encryption schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {127}, year = {2015}, url = {http://eprint.iacr.org/2015/127}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DahabGM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaiDS15, author = {Wei Dai and Yarkin Dor{\"{o}}z and Berk Sunar}, title = {Accelerating {SWHE} based PIRs using GPUs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {462}, year = {2015}, url = {http://eprint.iacr.org/2015/462}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DaiDS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaiS15, author = {Wei Dai and Berk Sunar}, title = {cuHE: {A} Homomorphic Encryption Accelerator Library}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {818}, year = {2015}, url = {http://eprint.iacr.org/2015/818}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DaiS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaiS15a, author = {Yuanxi Dai and John P. Steinberger}, title = {Feistel Networks: Indifferentiability at 10 Rounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {874}, year = {2015}, url = {http://eprint.iacr.org/2015/874}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DaiS15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaiS15b, author = {Yuanxi Dai and John P. Steinberger}, title = {Feistel Networks: Indifferentiability at 8 Rounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1069}, year = {2015}, url = {http://eprint.iacr.org/2015/1069}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DaiS15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardDNNT15, author = {Ivan Damg{\aa}rd and Kasper Damg{\aa}rd and Kurt Nielsen and Peter Sebastian Nordholt and Tomas Toft}, title = {Confidential Benchmarking based on Multiparty Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1006}, year = {2015}, url = {http://eprint.iacr.org/2015/1006}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardDNNT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardN15, author = {Ivan Damg{\aa}rd and Jesper Buus Nielsen}, title = {Unconditionally Secure Computation with Reduced Interaction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {630}, year = {2015}, url = {http://eprint.iacr.org/2015/630}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardNP15, author = {Ivan Damg{\aa}rd and Jesper Buus Nielsen and Antigoni Polychroniadou}, title = {On the Communication required for Unconditionally Secure Multiplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1097}, year = {2015}, url = {http://eprint.iacr.org/2015/1097}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardNP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardZ15, author = {Ivan Damg{\aa}rd and Rasmus Winther Zakarias}, title = {Fast Oblivious {AES{\textbackslash}{\textbackslash}A} dedicated application of the MiniMac protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {989}, year = {2015}, url = {http://eprint.iacr.org/2015/989}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DanezisM15, author = {George Danezis and Sarah Meiklejohn}, title = {Centrally Banked Cryptocurrencies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {502}, year = {2015}, url = {http://eprint.iacr.org/2015/502}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DanezisM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DangTDN15, author = {Thuong T. Dang and Tri T. Ton and Van H. Dang and Thuc Dinh Nguyen}, title = {{SOME} {REMARKS} {ON} {THE} {LOGARITHMIC} {SIGNATURES} {OF} {FINITE} {ABELIAN} {GROUPS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {962}, year = {2015}, url = {http://eprint.iacr.org/2015/962}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DangTDN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DangerGHMN15, author = {Jean{-}Luc Danger and Sylvain Guilley and Philippe Hoogvorst and C{\'{e}}dric Murdica and David Naccache}, title = {Improving the Big Mac Attack on Elliptic Curve Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {819}, year = {2015}, url = {http://eprint.iacr.org/2015/819}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DangerGHMN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DasMM15, author = {Sourav Das and Subhamoy Maitra and Willi Meier}, title = {Higher Order Differential Analysis of {NORX}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {186}, year = {2015}, url = {http://eprint.iacr.org/2015/186}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DasMM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DasRM15, author = {Poulami Das and Debapriya Basu Roy and Debdeep Mukhopadhyay}, title = {Exploiting the Order of Multiplier Operands: {A} Low Cost Approach for {HCCA} Resistance}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {925}, year = {2015}, url = {http://eprint.iacr.org/2015/925}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DasRM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DataPP15, author = {Deepesh Data and Manoj Prabhakaran and Vinod M. Prabhakaran}, title = {On the Communication Complexity of Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {391}, year = {2015}, url = {http://eprint.iacr.org/2015/391}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DataPP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DattaDM15, author = {Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay}, title = {Fully Secure Unbounded Revocable Attribute-Based Encryption in Prime Order Bilinear Groups via Subset Difference Method}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {293}, year = {2015}, url = {http://eprint.iacr.org/2015/293}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DattaDM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DattaDM15a, author = {Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay}, title = {General Circuit Realizing Compact Revocable Attribute-Based Encryption from Multilinear Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {884}, year = {2015}, url = {http://eprint.iacr.org/2015/884}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DattaDM15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DattaDM15b, author = {Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay}, title = {Functional Signcryption: Notion, Construction, and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {913}, year = {2015}, url = {http://eprint.iacr.org/2015/913}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DattaDM15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DattaDM15c, author = {Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay}, title = {Compact Attribute-Based Encryption and Signcryption for General Circuits from Multilinear Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1188}, year = {2015}, url = {http://eprint.iacr.org/2015/1188}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DattaDM15c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DattaDM15d, author = {Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay}, title = {Functional Encryption for Inner Product with Full Function Privacy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1255}, year = {2015}, url = {http://eprint.iacr.org/2015/1255}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DattaDM15d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DavidNRT15, author = {Bernardo David and Ryo Nishimaki and Samuel Ranellucci and Alain Tapp}, title = {Generalizing Efficient Multiparty Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {135}, year = {2015}, url = {http://eprint.iacr.org/2015/135}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DavidNRT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DavidW15, author = {Liron David and Avishai Wool}, title = {A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-Dimensional Side-Channel Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1236}, year = {2015}, url = {http://eprint.iacr.org/2015/1236}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DavidW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DegabrieleFP15, author = {Jean Paul Degabriele and Pooya Farshim and Bertram Poettering}, title = {A More Cautious Approach to Security Against Mass Surveillance}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {748}, year = {2015}, url = {http://eprint.iacr.org/2015/748}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DegabrieleFP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DehnaviRS15, author = {Seyed Mojtaba Dehnavi and Akbar Mahmoodi Rishakani and M. R. Mirzaee Shamsabad}, title = {Characterization of {MDS} mappings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {2}, year = {2015}, url = {http://eprint.iacr.org/2015/002}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DehnaviRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DehnaviRS15a, author = {Seyed Mojtaba Dehnavi and Akbar Mahmoodi Rishakani and M. R. Mirzaee Shamsabad}, title = {A More Explicit Formula for Linear Probabilities of Modular Addition Modulo a Power of Two}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {26}, year = {2015}, url = {http://eprint.iacr.org/2015/026}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DehnaviRS15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DehnaviRS15b, author = {Seyed Mojtaba Dehnavi and Akbar Mahmoodi Rishakani and M. R. Mirzaee Shamsabad}, title = {Bitwise Linear Mappings with Good Cryptographic Properties and Efficient Implementation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {225}, year = {2015}, url = {http://eprint.iacr.org/2015/225}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DehnaviRS15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DehnaviRSP15, author = {Seyed Mojtaba Dehnavi and Akbar Mahmoodi Rishakani and M. R. Mirzaee Shamsabad and Einollah Pasha}, title = {Generalization of Statistical Criteria for Sboxes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {93}, year = {2015}, url = {http://eprint.iacr.org/2015/093}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DehnaviRSP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DehnaviSRD15, author = {Seyed Mojtaba Dehnavi and M. R. Mirzaee Shamsabad and Akbar Mahmoodi Rishakani and Yousef Fekri Dabanloo}, title = {Efficient {MDS} Diffusion Layers Through Decomposition of Matrices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {775}, year = {2015}, url = {http://eprint.iacr.org/2015/775}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DehnaviSRD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DelmolinoAKMS15, author = {Kevin Delmolino and Mitchell Arnett and Ahmed E. Kosba and Andrew Miller and Elaine Shi}, title = {Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {460}, year = {2015}, url = {http://eprint.iacr.org/2015/460}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DelmolinoAKMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DelvauxGVHY15, author = {Jeroen Delvaux and Dawu Gu and Ingrid Verbauwhede and Matthias Hiller and Meng{-}Day (Mandel) Yu}, title = {Secure Sketch Metamorphosis: Tight Unified Bounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {854}, year = {2015}, url = {http://eprint.iacr.org/2015/854}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DelvauxGVHY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DemayGMT15, author = {Gr{\'{e}}gory Demay and Peter Gazi and Ueli Maurer and Bj{\"{o}}rn Tackmann}, title = {Query-Complexity Amplification for Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {315}, year = {2015}, url = {http://eprint.iacr.org/2015/315}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DemayGMT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DemirelL15, author = {Denise Demirel and Jean Lancrenon}, title = {How to Securely Prolong the Computational Bindingness of Pedersen Commitments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {584}, year = {2015}, url = {http://eprint.iacr.org/2015/584}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DemirelL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DerbezF15, author = {Patrick Derbez and Pierre{-}Alain Fouque}, title = {Exhausting Demirci-Sel{\c{c}}uk Meet-in-the-Middle Attacks against Reduced-Round {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {259}, year = {2015}, url = {http://eprint.iacr.org/2015/259}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DerbezF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DerbezP15, author = {Patrick Derbez and L{\'{e}}o Perrin}, title = {Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced {PRINCE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {239}, year = {2015}, url = {http://eprint.iacr.org/2015/239}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DerbezP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DerlerHS15, author = {David Derler and Christian Hanser and Daniel Slamanig}, title = {Revisiting Cryptographic Accumulators, Additional Properties and Relations to other Primitives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {87}, year = {2015}, url = {http://eprint.iacr.org/2015/087}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DerlerHS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DerlerPSS15, author = {David Derler and Henrich Christopher P{\"{o}}hls and Kai Samelin and Daniel Slamanig}, title = {A General Framework for Redactable Signatures and New Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1059}, year = {2015}, url = {http://eprint.iacr.org/2015/1059}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DerlerPSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DerlerS15, author = {David Derler and Daniel Slamanig}, title = {Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box Construction of Strongly Private Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {843}, year = {2015}, url = {http://eprint.iacr.org/2015/843}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DerlerS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DerlerS15a, author = {David Derler and Daniel Slamanig}, title = {Practical Witness Encryption for Algebraic Languages And How to Reply an Unknown Whistleblower}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1073}, year = {2015}, url = {http://eprint.iacr.org/2015/1073}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DerlerS15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DevadasDFR15, author = {Srinivas Devadas and Marten van Dijk and Christopher W. Fletcher and Ling Ren}, title = {Onion {ORAM:} {A} Constant Bandwidth and Constant Client Storage {ORAM} (without {FHE} or {SWHE)}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {5}, year = {2015}, url = {http://eprint.iacr.org/2015/005}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DevadasDFR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DiazAR15, author = {Jesus Diaz and David Arroyo and Francisco de Borja Rodr{\'{\i}}guez}, title = {libgroupsig: An extensible {C} library for group signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1146}, year = {2015}, url = {http://eprint.iacr.org/2015/1146}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DiazAR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dichtl15, author = {Markus Dichtl}, title = {Fibonacci Ring Oscillators as True Random Number Generators - {A} Security Risk}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {270}, year = {2015}, url = {http://eprint.iacr.org/2015/270}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dichtl15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Diehl15, author = {William Diehl}, title = {Implementation of the {SCREAM} Tweakable Block Cipher in {MSP430} Assembly Language}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {761}, year = {2015}, url = {http://eprint.iacr.org/2015/761}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Diehl15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DinUWA15, author = {Nizamud Din and Arif Iqbal Umar and Abdul Waheed and Noor Ul Amin}, title = {An Efficient Multi-Message Multi-Receiver Signcryption Scheme with Forward Secrecy on Elliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {655}, year = {2015}, url = {http://eprint.iacr.org/2015/655}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DinUWA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DingCE15, author = {A. Adam Ding and Cong Chen and Thomas Eisenbarth}, title = {Simpler, Faster, and More Robust T-test Based Leakage Detection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1215}, year = {2015}, url = {http://eprint.iacr.org/2015/1215}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DingCE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DingKOTT15, author = {Jintai Ding and Momonari Kudo and Shinya Okumura and Tsuyoshi Takagi and Chengdong Tao}, title = {Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted {LLL} reduction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1229}, year = {2015}, url = {http://eprint.iacr.org/2015/1229}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DingKOTT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DingMU15, author = {Jintai Ding and Alexei Miasnikov and Alexander Ushakov}, title = {A Linear Attack on a Key Exchange Protocol Using Extensions of Matrix Semigroups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {18}, year = {2015}, url = {http://eprint.iacr.org/2015/018}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DingMU15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DinuCKPGB15, author = {Daniel Dinu and Yann Le Corre and Dmitry Khovratovich and L{\'{e}}o Perrin and Johann Gro{\ss}sch{\"{a}}dl and Alex Biryukov}, title = {Triathlon of Lightweight Block Ciphers for the Internet of Things}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {209}, year = {2015}, url = {http://eprint.iacr.org/2015/209}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DinuCKPGB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DinurDGS15, author = {Itai Dinur and Orr Dunkelman and Masha Gutman and Adi Shamir}, title = {Improved Top-Down Techniques in Differential Cryptanalysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {268}, year = {2015}, url = {http://eprint.iacr.org/2015/268}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DinurDGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DinurDKL15, author = {Itai Dinur and Orr Dunkelman and Thorsten Kranz and Gregor Leander}, title = {Decomposing the {ASASA} Block Cipher Construction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {507}, year = {2015}, url = {http://eprint.iacr.org/2015/507}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DinurDKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DinurDKS15, author = {Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {New Attacks on Feistel Structures with Improved Memory Complexities}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {146}, year = {2015}, url = {http://eprint.iacr.org/2015/146}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DinurDKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DinurLMW15, author = {Itai Dinur and Yunwen Liu and Willi Meier and Qingju Wang}, title = {Optimized Interpolation Attacks on LowMC}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {418}, year = {2015}, url = {http://eprint.iacr.org/2015/418}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DinurLMW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DmukhDM15, author = {Andrey Dmukh and Denis Dygin and Grigory B. Marshalko}, title = {A lightweight-friendly modifcation of {GOST} block cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {65}, year = {2015}, url = {http://eprint.iacr.org/2015/065}, timestamp = {Thu, 19 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DmukhDM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEM15, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, title = {Related-Key Forgeries for Pr{\o}st-OTR}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {91}, year = {2015}, url = {http://eprint.iacr.org/2015/091}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEM15a, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, title = {Forgery Attacks on round-reduced {ICEPOLE-128}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {392}, year = {2015}, url = {http://eprint.iacr.org/2015/392}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEM15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEM15b, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, title = {Higher-order cryptanalysis of LowMC}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {407}, year = {2015}, url = {http://eprint.iacr.org/2015/407}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEM15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEM15c, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, title = {Analysis of the Kupyna-256 Hash Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {956}, year = {2015}, url = {http://eprint.iacr.org/2015/956}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEM15c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEM15d, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, title = {Heuristic Tool for Linear Cryptanalysis with Applications to {CAESAR} Candidates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1200}, year = {2015}, url = {http://eprint.iacr.org/2015/1200}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEM15d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEMM15, author = {Christoph Dobraunig and Maria Eichlseder and Stefan Mangard and Florian Mendel}, title = {On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {33}, year = {2015}, url = {http://eprint.iacr.org/2015/033}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEMM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEMS15, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Martin Schl{\"{a}}ffer}, title = {Cryptanalysis of Ascon}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {30}, year = {2015}, url = {http://eprint.iacr.org/2015/030}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisLSS15, author = {Yevgeniy Dodis and Tianren Liu and Martijn Stam and John P. Steinberger}, title = {Indifferentiability of Confusion-Diffusion Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {680}, year = {2015}, url = {http://eprint.iacr.org/2015/680}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisLSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisMS15, author = {Yevgeniy Dodis and Ilya Mironov and Noah Stephens{-}Davidowitz}, title = {Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {548}, year = {2015}, url = {http://eprint.iacr.org/2015/548}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DolevL15, author = {Shlomi Dolev and Yin Li}, title = {Secret Shared Random Access Machine}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {292}, year = {2015}, url = {http://eprint.iacr.org/2015/292}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DolevL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DongK15, author = {Changyu Dong and Franziskus Kiefer}, title = {Secure Set-based Policy Checking and Its Application to Password Registration}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {945}, year = {2015}, url = {http://eprint.iacr.org/2015/945}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DongK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DongLJW15, author = {Xiaoyang Dong and Leibo Li and Keting Jia and Xiaoyun Wang}, title = {Improved Attacks on Reduced-Round Camellia-128/192/256}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {896}, year = {2015}, url = {http://eprint.iacr.org/2015/896}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DongLJW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DorozSC15, author = {Yarkin Dor{\"{o}}z and Berk Sunar and Gizem S. {\c{C}}etin}, title = {On-the-fly Homomorphic Batching/Unbatching}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1197}, year = {2015}, url = {http://eprint.iacr.org/2015/1197}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DorozSC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dottling15, author = {Nico D{\"{o}}ttling}, title = {Low Noise {LPN:} {KDM} Secure Public Key Encryption and Sample Amplification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {13}, year = {2015}, url = {http://eprint.iacr.org/2015/013}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dottling15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingS15, author = {Nico D{\"{o}}ttling and Dominique Schr{\"{o}}der}, title = {Efficient Pseudorandom Functions via On-the-Fly Adaptation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1185}, year = {2015}, url = {http://eprint.iacr.org/2015/1185}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DowlingFGS15, author = {Benjamin Dowling and Marc Fischlin and Felix G{\"{u}}nther and Douglas Stebila}, title = {A Cryptographic Analysis of the {TLS} 1.3 Handshake Protocol Candidates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {914}, year = {2015}, url = {http://eprint.iacr.org/2015/914}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DowlingFGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DowlingS15, author = {Benjamin Dowling and Douglas Stebila}, title = {Modelling ciphersuite and version negotiation in the {TLS} protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {652}, year = {2015}, url = {http://eprint.iacr.org/2015/652}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DowlingS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DowlingSZ15, author = {Benjamin Dowling and Douglas Stebila and Greg Zaverucha}, title = {Authenticated Network Time Synchronization}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {171}, year = {2015}, url = {http://eprint.iacr.org/2015/171}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DowlingSZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DowsleyLN15, author = {Rafael Dowsley and Felipe Lacerda and Anderson C. A. Nascimento}, title = {Commitment and Oblivious Transfer in the Bounded Storage Model with Errors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {952}, year = {2015}, url = {http://eprint.iacr.org/2015/952}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DowsleyLN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DowsleyMN15, author = {Rafael Dowsley and J{\"{o}}rn M{\"{u}}ller{-}Quade and Tobias Nilges}, title = {Weakening the Isolation Assumption of Tamper-proof Hardware Tokens}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {104}, year = {2015}, url = {http://eprint.iacr.org/2015/104}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DowsleyMN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuWZZ15, author = {Yusong Du and Baodian Wei and Fangguo Zhang and Huang Zhang}, title = {On the (Fast) Algebraic Immunity of Boolean Power Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {435}, year = {2015}, url = {http://eprint.iacr.org/2015/435}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuWZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuWZZ15a, author = {Yusong Du and Baodian Wei and Fangguo Zhang and Huang Zhang}, title = {On the Resistance of Prime-variable Rotation Symmetric Boolean Functions against Fast Algebraic Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {436}, year = {2015}, url = {http://eprint.iacr.org/2015/436}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuWZZ15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DubrovaH15, author = {Elena Dubrova and Martin Hell}, title = {Espresso: {A} Stream Cipher for 5G Wireless Communication Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {241}, year = {2015}, url = {http://eprint.iacr.org/2015/241}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DubrovaH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DubrovaNCFS15, author = {Elena Dubrova and Mats N{\"{a}}slund and Gunnar Carlsson and John Fornehed and Ben J. M. Smeets}, title = {Remotely Managed Logic Built-In Self-Test for Secure {M2M} Communications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {185}, year = {2015}, url = {http://eprint.iacr.org/2015/185}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DubrovaNCFS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DubrovaNSL15, author = {Elena Dubrova and Mats N{\"{a}}slund and G{\"{o}}ran Selander and Fredrik Lindqvist}, title = {Cryptographically Secure {CRC} for Lightweight Message Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {35}, year = {2015}, url = {http://eprint.iacr.org/2015/035}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DubrovaNSL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DubrovaNSL15a, author = {Elena Dubrova and Mats N{\"{a}}slund and G{\"{o}}ran Selander and Fredrik Lindqvist}, title = {Lightweight CRC-based Message Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1138}, year = {2015}, url = {http://eprint.iacr.org/2015/1138}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DubrovaNSL15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DucFS15, author = {Alexandre Duc and Sebastian Faust and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Making Masking Security Proofs Concrete Or How to Evaluate the Security of any Leaking Device}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {119}, year = {2015}, url = {http://eprint.iacr.org/2015/119}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DucFS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DucTV15, author = {Alexandre Duc and Florian Tram{\`{e}}r and Serge Vaudenay}, title = {Better Algorithms for {LWE} and {LWR}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {56}, year = {2015}, url = {http://eprint.iacr.org/2015/056}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DucTV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DucasP15a, author = {L{\'{e}}o Ducas and Thomas Prest}, title = {Fast Fourier Orthogonalization}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1014}, year = {2015}, url = {http://eprint.iacr.org/2015/1014}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DucasP15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DugardinPNBDGCT15, author = {Margaux Dugardin and Louiza Papachristodoulou and Zakaria Najm and Lejla Batina and Jean{-}Luc Danger and Sylvain Guilley and Jean{-}Christophe Courr{\`{e}}ge and Carine Therond}, title = {Dismantling real-world {ECC} with Horizontal and Vertical Template Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1001}, year = {2015}, url = {http://eprint.iacr.org/2015/1001}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DugardinPNBDGCT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DullHHHPSS15, author = {Michael D{\"{u}}ll and Bj{\"{o}}rn Haase and Gesine Hinterw{\"{a}}lder and Michael Hutter and Christof Paar and Ana Helena S{\'{a}}nchez and Peter Schwabe}, title = {High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {343}, year = {2015}, url = {http://eprint.iacr.org/2015/343}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DullHHHPSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuquesneG15, author = {Sylvain Duquesne and Loubna Ghammam}, title = {Memory-saving computation of the pairing fi nal exponentiation on {BN} curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {192}, year = {2015}, url = {http://eprint.iacr.org/2015/192}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuquesneG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuquesneMHR15, author = {Sylvain Duquesne and Nadia El Mrabet and Safia Haloui and Franck Rondepierre}, title = {Choosing and generating parameters for low level pairing implementation on {BN} curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1212}, year = {2015}, url = {http://eprint.iacr.org/2015/1212}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuquesneMHR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DurnogaDKZ15, author = {Konrad Durnoga and Stefan Dziembowski and Tomasz Kazana and Michal Zajac}, title = {One Time Programs with Limited Memory}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {238}, year = {2015}, url = {http://eprint.iacr.org/2015/238}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DurnogaDKZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DurnogaKZZ15, author = {Konrad Durnoga and Tomasz Kazana and Michal Zajac and Maciej Zdanowicz}, title = {Leakage-Resilient Cryptography with Key Derived from Sensitive Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {228}, year = {2015}, url = {http://eprint.iacr.org/2015/228}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DurnogaKZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DurvauxS15, author = {Fran{\c{c}}ois Durvaux and Fran{\c{c}}ois{-}Xavier Standaert}, title = {From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {536}, year = {2015}, url = {http://eprint.iacr.org/2015/536}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DurvauxS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DurvauxS15a, author = {Fran{\c{c}}ois Durvaux and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Towards Easy Leakage Certification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {537}, year = {2015}, url = {http://eprint.iacr.org/2015/537}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DurvauxS15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dutta15, author = {Pranjal Dutta}, title = {Modular Inversion Hidden Number Problem- {A} Lattice Approach}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1140}, year = {2015}, url = {http://eprint.iacr.org/2015/1140}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dutta15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuttaP15a, author = {Avijit Dutta and Goutam Paul}, title = {Lifting the Security of {NI-MAC} Beyond Birthday Bound}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1016}, year = {2015}, url = {http://eprint.iacr.org/2015/1016}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuttaP15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DworkinP15, author = {Morris Dworkin and Ray A. Perlner}, title = {Analysis of {VAES3} {(FF2)}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {306}, year = {2015}, url = {http://eprint.iacr.org/2015/306}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DworkinP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DykaBWL15, author = {Zoya Dyka and Thomas Basmer and Christian Wittke and Peter Langend{\"{o}}rfer}, title = {Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {442}, year = {2015}, url = {http://eprint.iacr.org/2015/442}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DykaBWL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EatonS15, author = {Edward Eaton and Fang Song}, title = {Making Existential-Unforgeable Signatures Strongly Unforgeable in the Quantum Random-Oracle Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {878}, year = {2015}, url = {http://eprint.iacr.org/2015/878}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EatonS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EgeEB15, author = {Baris Ege and Thomas Eisenbarth and Lejla Batina}, title = {Near Collision Side Channel Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {511}, year = {2015}, url = {http://eprint.iacr.org/2015/511}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EgeEB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EisenbarthMS15, author = {Thomas Eisenbarth and Aaron Meyerowitz and Rainer Steinwandt}, title = {On the security margin of {MAC} striping}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {89}, year = {2015}, url = {http://eprint.iacr.org/2015/089}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EisenbarthMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ekera15, author = {Martin Eker{\aa}}, title = {Computing information on domain parameters from public keys selected uniformly at random}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {879}, year = {2015}, url = {http://eprint.iacr.org/2015/879}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ekera15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EliasLOS15, author = {Yara Elias and Kristin E. Lauter and Ekin Ozman and Katherine E. Stange}, title = {Provably weak instances of Ring-LWE}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {106}, year = {2015}, url = {http://eprint.iacr.org/2015/106}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EliasLOS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EliasLOS15a, author = {Yara Elias and Kristin E. Lauter and Ekin Ozman and Katherine E. Stange}, title = {Ring-LWE Cryptography for the Number Theorist}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {758}, year = {2015}, url = {http://eprint.iacr.org/2015/758}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EliasLOS15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ElkhiyaouiOM15, author = {Kaoutar Elkhiyaoui and Melek {\"{O}}nen and Refik Molva}, title = {Online-Offline Homomorphic Signatures for Polynomial Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {954}, year = {2015}, url = {http://eprint.iacr.org/2015/954}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ElkhiyaouiOM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EmmadiGNS15, author = {Nitesh Emmadi and Praveen Gauravaram and Harika Narumanchi and Habeeb Syed}, title = {Updates on Sorting of Fully Homomorphic Encrypted Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {995}, year = {2015}, url = {http://eprint.iacr.org/2015/995}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EmmadiGNS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EsginK15, author = {Muhammed F. Esgin and Orhun Kara}, title = {Practical Cryptanalysis of Full Sprout with {TMD} Tradeoff Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {289}, year = {2015}, url = {http://eprint.iacr.org/2015/289}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EsginK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EsginKU15, author = {Muhammed F. Esgin and Mehmet S. Kiraz and Osmanbey Uzunkol}, title = {A New Partial Key Exposure Attack on Multi-power {RSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {642}, year = {2015}, url = {http://eprint.iacr.org/2015/642}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EsginKU15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EspitauFK15, author = {Thomas Espitau and Pierre{-}Alain Fouque and Pierre Karpman}, title = {Higher-Order Differential Meet-in-The-Middle Preimage Attacks on {SHA-1} and {BLAKE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {515}, year = {2015}, url = {http://eprint.iacr.org/2015/515}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EspitauFK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EtemadK15, author = {Mohammad Etemad and Alptekin K{\"{u}}p{\c{c}}{\"{u}}}, title = {Database Outsourcing with Hierarchical Authenticated Data Structures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {351}, year = {2015}, url = {http://eprint.iacr.org/2015/351}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EtemadK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EtemadK15a, author = {Mohammad Etemad and Alptekin K{\"{u}}p{\c{c}}{\"{u}}}, title = {Efficient Key Authentication Service for Secure End-to-end Communications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {833}, year = {2015}, url = {http://eprint.iacr.org/2015/833}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EtemadK15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EtemadK15b, author = {Mohammad Etemad and Alptekin K{\"{u}}p{\c{c}}{\"{u}}}, title = {Generic Efficient Dynamic Proofs of Retrievability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {880}, year = {2015}, url = {http://eprint.iacr.org/2015/880}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EtemadK15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EverspaughCSJR15, author = {Adam Everspaugh and Rahul Chatterjee and Samuel Scott and Ari Juels and Thomas Ristenpart}, title = {The Pythia {PRF} Service}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {644}, year = {2015}, url = {http://eprint.iacr.org/2015/644}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EverspaughCSJR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EzermanLLNW15, author = {Martianus Frederic Ezerman and Hyung Tae Lee and San Ling and Khoa Nguyen and Huaxiong Wang}, title = {A Provably Secure Group Signature Scheme from Code-Based Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {479}, year = {2015}, url = {http://eprint.iacr.org/2015/479}, timestamp = {Wed, 21 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/EzermanLLNW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaberJKNRS15, author = {Sky Faber and Stanislaw Jarecki and Hugo Krawczyk and Quan Nguyen and Marcel{-}Catalin Rosu and Michael Steiner}, title = {Rich Queries on Encrypted Data: Beyond Exact Matches}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {927}, year = {2015}, url = {http://eprint.iacr.org/2015/927}, timestamp = {Sat, 23 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaberJKNRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaonioN15, author = {Antonio Faonio and Jesper Buus Nielsen}, title = {Fully Leakage-Resilient Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1151}, year = {2015}, url = {http://eprint.iacr.org/2015/1151}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FaonioN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaonioNV15, author = {Antonio Faonio and Jesper Buus Nielsen and Daniele Venturi}, title = {Predictable Arguments of Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {740}, year = {2015}, url = {http://eprint.iacr.org/2015/740}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FaonioNV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FauskangerS15, author = {Stian Fauskanger and Igor A. Semaev}, title = {Statistical and Algebraic Properties of {DES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {803}, year = {2015}, url = {http://eprint.iacr.org/2015/803}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FauskangerS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustMV15, author = {Sebastian Faust and Daniel Masny and Daniele Venturi}, title = {Chosen-Ciphertext Security from Subset Sum}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1223}, year = {2015}, url = {http://eprint.iacr.org/2015/1223}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaustMV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FauziL15, author = {Prastudy Fauzi and Helger Lipmaa}, title = {Efficient Culpably Sound {NIZK} Shuffle Argument without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1112}, year = {2015}, url = {http://eprint.iacr.org/2015/1112}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FauziL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FehrF15, author = {Serge Fehr and Max Fillinger}, title = {Multi-Prover Commitments Against Non-Signaling Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {501}, year = {2015}, url = {http://eprint.iacr.org/2015/501}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FehrF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FehrF15a, author = {Victoria Fehr and Marc Fischlin}, title = {Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {765}, year = {2015}, url = {http://eprint.iacr.org/2015/765}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FehrF15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FehrK0ZZ15, author = {Serge Fehr and Jonathan Katz and Fang Song and Hong{-}Sheng Zhou and Vassilis Zikas}, title = {Feasibility and Completeness of Cryptographic Tasks in the Quantum World}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {385}, year = {2015}, url = {http://eprint.iacr.org/2015/385}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FehrK0ZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FerradiGMNW15, author = {Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and Diana Maimut and David Naccache and Amaury de Wargny}, title = {Regulating the Pace of von Neumann Correctors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {849}, year = {2015}, url = {http://eprint.iacr.org/2015/849}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FerradiGMNW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FerradiGMNZ15, author = {Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and Diana Maimut and David Naccache and Hang Zhou}, title = {Backtracking-Assisted Multiplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {787}, year = {2015}, url = {http://eprint.iacr.org/2015/787}, timestamp = {Fri, 03 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FerradiGMNZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FerradiGNT15, author = {Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and David Naccache and Assia Tria}, title = {When Organized Crime Applies Academic Results - {A} Forensic Analysis of an In-Card Listening Device}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {963}, year = {2015}, url = {http://eprint.iacr.org/2015/963}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FerradiGNT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FerreiraRLD15, author = {Bernardo Ferreira and Jo{\~{a}}o Rodrigues and Jo{\~{a}}o Leit{\~{a}}o and Henrique Jo{\~{a}}o L. Domingos}, title = {Privacy-Preserving Content-Based Image Retrieval in the Cloud (Extended Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {710}, year = {2015}, url = {http://eprint.iacr.org/2015/710}, timestamp = {Fri, 24 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FerreiraRLD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FindST15, author = {Magnus Gausdal Find and Daniel Smith{-}Tone and Meltem S{\"{o}}nmez Turan}, title = {The Number of Boolean Functions with Multiplicative Complexity 2}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1041}, year = {2015}, url = {http://eprint.iacr.org/2015/1041}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FindST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FischFN15, author = {Ben Fisch and Daniel Freund and Moni Naor}, title = {Secure Physical Computation using Disposable Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {226}, year = {2015}, url = {http://eprint.iacr.org/2015/226}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FischFN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FleischhackerKM15, author = {Nils Fleischhacker and Johannes Krupp and Giulio Malavolta and Jonas Schneider and Dominique Schr{\"{o}}der and Mark Simkin}, title = {Efficient Unlinkable Sanitizable Signatures from Signatures with Rerandomizable Keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {395}, year = {2015}, url = {http://eprint.iacr.org/2015/395}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FleischhackerKM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FletcherNRSS15, author = {Christopher W. Fletcher and Muhammad Naveed and Ling Ren and Elaine Shi and Emil Stefanov}, title = {Bucket {ORAM:} Single Online Roundtrip, Constant Bandwidth Oblivious {RAM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1065}, year = {2015}, url = {http://eprint.iacr.org/2015/1065}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FletcherNRSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FloriPRE15, author = {Jean{-}Pierre Flori and J{\'{e}}r{\^{o}}me Pl{\^{u}}t and Jean{-}Ren{\'{e}} Reinhard and Martin Eker{\aa}}, title = {Diversity and Transparency for {ECC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {659}, year = {2015}, url = {http://eprint.iacr.org/2015/659}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FloriPRE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Fluhrer15, author = {Scott R. Fluhrer}, title = {Quantum Cryptanalysis of {NTRU}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {676}, year = {2015}, url = {http://eprint.iacr.org/2015/676}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Fluhrer15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Fluhrer15a, author = {Scott R. Fluhrer}, title = {Scalar Blinding on Elliptic Curves based on Primes with Special Structure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {801}, year = {2015}, url = {http://eprint.iacr.org/2015/801}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Fluhrer15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ForteRS15, author = {Pasquale Forte and Diego Romano and Giovanni Schmid}, title = {Beyond Bitcoin - Part {I:} {A} critical look at blockchain-based systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1164}, year = {2015}, url = {http://eprint.iacr.org/2015/1164}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ForteRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FouqueGMN15, author = {Pierre{-}Alain Fouque and Sylvain Guilley and C{\'{e}}dric Murdica and David Naccache}, title = {Safe-Errors on {SPA} Protected implementations with the Atomicity Technique}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {794}, year = {2015}, url = {http://eprint.iacr.org/2015/794}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FouqueGMN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FouqueV15, author = {Pierre{-}Alain Fouque and Thomas Vannet}, title = {Improving Key Recovery to 784 and 799 rounds of Trivium using Optimized Cube Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {312}, year = {2015}, url = {http://eprint.iacr.org/2015/312}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FouqueV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FrederiksenJNT15, author = {Tore Kasper Frederiksen and Thomas P. Jakobsen and Jesper Buus Nielsen and Roberto Trifiletti}, title = {TinyLEGO: An Interactive Garbling Scheme for Maliciously Secure Two-party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {309}, year = {2015}, url = {http://eprint.iacr.org/2015/309}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FrederiksenJNT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FrederiksenJNT15a, author = {Tore Kasper Frederiksen and Thomas P. Jakobsen and Jesper Buus Nielsen and Roberto Trifiletti}, title = {On the Complexity of Additively Homomorphic {UC} Commitments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {694}, year = {2015}, url = {http://eprint.iacr.org/2015/694}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FrederiksenJNT15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FrederiksenKOS15, author = {Tore Kasper Frederiksen and Marcel Keller and Emmanuela Orsini and Peter Scholl}, title = {A Unified Approach to {MPC} with Preprocessing using {OT}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {901}, year = {2015}, url = {http://eprint.iacr.org/2015/901}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FrederiksenKOS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FreyreDC15, author = {Pablo Freyre and Nelson D{\'{\i}}az and Oristela Cuellar}, title = {Variations to the Cryptographics Algorithms {AES} and Twofish}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1080}, year = {2015}, url = {http://eprint.iacr.org/2015/1080}, timestamp = {Tue, 21 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FreyreDC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuchsbauerHS15, author = {Georg Fuchsbauer and Christian Hanser and Daniel Slamanig}, title = {Practical Round-Optimal Blind Signatures in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {626}, year = {2015}, url = {http://eprint.iacr.org/2015/626}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuchsbauerHS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuhrLS15, author = {Thomas Fuhr and Ga{\"{e}}tan Leurent and Valentin Suder}, title = {Collision Attacks against {CAESAR} Candidates - Forgery and Key-Recovery against {AEZ} and Marble}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1193}, year = {2015}, url = {http://eprint.iacr.org/2015/1193}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuhrLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FujisakiX15, author = {Eiichiro Fujisaki and Keita Xagawa}, title = {Note on the {RKA} security of Continuously Non-Malleable Key-Derivation Function from {PKC} 2015}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1088}, year = {2015}, url = {http://eprint.iacr.org/2015/1088}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FujisakiX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FullerH15, author = {Benjamin Fuller and Ariel Hamlin}, title = {Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {857}, year = {2015}, url = {http://eprint.iacr.org/2015/857}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FullerH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GagliardoniHS15, author = {Tommaso Gagliardoni and Andreas H{\"{u}}lsing and Christian Schaffner}, title = {Semantic Security and Indistinguishability in the Quantum World}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {355}, year = {2015}, url = {http://eprint.iacr.org/2015/355}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GagliardoniHS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithG15, author = {Steven D. Galbraith and Pierrick Gaudry}, title = {Recent progress on the elliptic curve discrete logarithm problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1022}, year = {2015}, url = {http://eprint.iacr.org/2015/1022}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithS15, author = {Steven D. Galbraith and Barak Shani}, title = {The Multivariate Hidden Number Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {111}, year = {2015}, url = {http://eprint.iacr.org/2015/111}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithWZ15, author = {Steven D. Galbraith and Ping Wang and Fangguo Zhang}, title = {Computing Elliptic Curve Discrete Logarithms with Improved Baby-step Giant-step Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {605}, year = {2015}, url = {http://eprint.iacr.org/2015/605}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithWZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaleaMPT15, author = {Jake Longo and Elke De Mulder and Daniel Page and Michael Tunstall}, title = {SoC it to {EM:} electromagnetic side-channel attacks on a complex system-on-chip}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {561}, year = {2015}, url = {http://eprint.iacr.org/2015/561}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaleaMPT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GanjiTS15, author = {Fatemeh Ganji and Shahin Tajik and Jean{-}Pierre Seifert}, title = {{PAC} Learning of Arbiter PUFs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {378}, year = {2015}, url = {http://eprint.iacr.org/2015/378}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GanjiTS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gao15, author = {Yansong Gao}, title = {Secure Key Exchange Protocol based on Virtual Proof of Reality}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {524}, year = {2015}, url = {http://eprint.iacr.org/2015/524}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gao15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaoRAA15, author = {Yansong Gao and Damith Chinthana Ranasinghe and Said F. Al{-}Sarawi and Derek Abbott}, title = {Secure Goods Supply Chain and Key Exchange with Virtual Proof of Reality}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1239}, year = {2015}, url = {http://eprint.iacr.org/2015/1239}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaoRAA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaoRLAKA15, author = {Yansong Gao and Damith Chinthana Ranasinghe and Gefei Li and Said F. Al{-}Sarawi and Omid Kavehei and Derek Abbott}, title = {A Challenge Obfuscation Method for Thwarting Model Building Attacks on PUFs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {471}, year = {2015}, url = {http://eprint.iacr.org/2015/471}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaoRLAKA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarayKTZ15, author = {Juan A. Garay and Jonathan Katz and Bj{\"{o}}rn Tackmann and Vassilis Zikas}, title = {How Fair is Your Protocol? {A} Utility-based Approach to Protocol Optimality}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {187}, year = {2015}, url = {http://eprint.iacr.org/2015/187}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarayKTZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarayTZ15, author = {Juan A. Garay and Bj{\"{o}}rn Tackmann and Vassilis Zikas}, title = {Fair Distributed Computation of Reactive Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {807}, year = {2015}, url = {http://eprint.iacr.org/2015/807}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarayTZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargLO15, author = {Sanjam Garg and Steve Lu and Rafail Ostrovsky}, title = {Black-Box Garbled {RAM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {307}, year = {2015}, url = {http://eprint.iacr.org/2015/307}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GargLO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargMP15, author = {Sanjam Garg and Payman Mohassel and Charalampos Papamanthou}, title = {{TWORAM:} Round-Optimal Oblivious {RAM} with Applications to Searchable Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1010}, year = {2015}, url = {http://eprint.iacr.org/2015/1010}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargMP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargP15, author = {Sanjam Garg and Omkant Pandey}, title = {Incremental Program Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {997}, year = {2015}, url = {http://eprint.iacr.org/2015/997}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargPS15, author = {Sanjam Garg and Omkant Pandey and Akshayaram Srinivasan}, title = {On the Exact Cryptographic Hardness of Finding a Nash Equilibrium}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1078}, year = {2015}, url = {http://eprint.iacr.org/2015/1078}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gavin15, author = {G{\'{e}}rald Gavin}, title = {A general framework for building noise-free homomorphic cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {821}, year = {2015}, url = {http://eprint.iacr.org/2015/821}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gavin15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GayKW15, author = {Romain Gay and Iordanis Kerenidis and Hoeteck Wee}, title = {Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {665}, year = {2015}, url = {http://eprint.iacr.org/2015/665}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GayKW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaziLSST15, author = {Peter Gazi and Jooyoung Lee and Yannick Seurin and John P. Steinberger and Stefano Tessaro}, title = {Relaxing Full-Codebook Security: {A} Refined Analysis of Key-Length Extension Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {397}, year = {2015}, url = {http://eprint.iacr.org/2015/397}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaziLSST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaziPT15, author = {Peter Gazi and Krzysztof Pietrzak and Stefano Tessaro}, title = {Tight Bounds for Keyed Sponges and Truncated {CBC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {53}, year = {2015}, url = {http://eprint.iacr.org/2015/053}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaziPT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaziPT15a, author = {Peter Gazi and Krzysztof Pietrzak and Stefano Tessaro}, title = {Generic Security of {NMAC} and {HMAC} with Input Whitening}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {881}, year = {2015}, url = {http://eprint.iacr.org/2015/881}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaziPT15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GenkinIPST15, author = {Daniel Genkin and Yuval Ishai and Manoj Prabhakaran and Amit Sahai and Eran Tromer}, title = {Circuits Resilient to Additive Attacks with Applications to Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {154}, year = {2015}, url = {http://eprint.iacr.org/2015/154}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GenkinIPST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GenkinPPT15, author = {Daniel Genkin and Lev Pachmanov and Itamar Pipman and Eran Tromer}, title = {Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {170}, year = {2015}, url = {http://eprint.iacr.org/2015/170}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GenkinPPT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GeorgievaP15, author = {Mariya Georgieva and Fr{\'{e}}d{\'{e}}ric de Portzamparc}, title = {Toward Secure Implementation of McEliece Decryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {271}, year = {2015}, url = {http://eprint.iacr.org/2015/271}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GeorgievaP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GeraudMN15, author = {R{\'{e}}mi G{\'{e}}raud and Diana Maimut and David Naccache}, title = {Double-Speed Barrett Moduli}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {785}, year = {2015}, url = {http://eprint.iacr.org/2015/785}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GeraudMN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GeraudMNCS15, author = {R{\'{e}}mi G{\'{e}}raud and Diana{-}Stefania Maimut and David Naccache and Rodrigo Portella do Canto and Emil Simion}, title = {Applying Cryptographic Acceleration Techniques to Error Correction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {886}, year = {2015}, url = {http://eprint.iacr.org/2015/886}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GeraudMNCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GervaisRKC15, author = {Arthur Gervais and Hubert Ritzdorf and Ghassan O. Karame and Srdjan Capkun}, title = {Tampering with the Delivery of Blocks and Transactions in Bitcoin}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {578}, year = {2015}, url = {http://eprint.iacr.org/2015/578}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GervaisRKC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GervaisRLC15, author = {Arthur Gervais and Hubert Ritzdorf and Mario Lucic and Srdjan Capkun}, title = {Quantifying Location Privacy Leakage from Transaction Prices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {496}, year = {2015}, url = {http://eprint.iacr.org/2015/496}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GervaisRLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ghadafi15, author = {Essam Ghadafi}, title = {Short Structure-Preserving Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {961}, year = {2015}, url = {http://eprint.iacr.org/2015/961}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ghadafi15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhaemMaghamiHM15, author = {Seyed Salman Sajjadi GhaemMaghami and Afrooz Haghbin and Mahtab Mirmohseni}, title = {Traceability Improvements of a New {RFID} Protocol Based On {EPC} {C1G2}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {872}, year = {2015}, url = {http://eprint.iacr.org/2015/872}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GhaemMaghamiHM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhalatyYS15, author = {Nahid Farhady Ghalaty and Bilgiday Yuce and Patrick Schaumont}, title = {Analyzing the Efficiency of Biased-Fault Based Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {663}, year = {2015}, url = {http://eprint.iacr.org/2015/663}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GhalatyYS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhoshGOT15, author = {Esha Ghosh and Michael T. Goodrich and Olga Ohrimenko and Roberto Tamassia}, title = {Fully-Dynamic Verifiable Zero-Knowledge Order Queries for Network Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {283}, year = {2015}, url = {http://eprint.iacr.org/2015/283}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GhoshGOT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhoshK15, author = {Satrajit Ghosh and Aniket Kate}, title = {Post-Quantum Secure Onion Routing (Future Anonymity in Today's Budget)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {8}, year = {2015}, url = {http://eprint.iacr.org/2015/008}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GhoshK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhoshKDV15, author = {Santosh Ghosh and Amit Kumar and Amitabh Das and Ingrid Verbauwhede}, title = {On the Implementation of Unified Arithmetic on Binary Huff Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {423}, year = {2015}, url = {http://eprint.iacr.org/2015/423}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GhoshKDV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhoshOPTT15, author = {Esha Ghosh and Olga Ohrimenko and Dimitrios Papadopoulos and Roberto Tamassia and Nikos Triandopoulos}, title = {Zero-Knowledge Accumulators and Set Operations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {404}, year = {2015}, url = {http://eprint.iacr.org/2015/404}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GhoshOPTT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhoshOT15, author = {Esha Ghosh and Olga Ohrimenko and Roberto Tamassia}, title = {Authenticated Range {\textbackslash}{\&} Closest Point Queries in Zero-Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1183}, year = {2015}, url = {http://eprint.iacr.org/2015/1183}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GhoshOT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GiacomelliOR15, author = {Irene Giacomelli and Ruxandra F. Olimid and Samuel Ranellucci}, title = {Security of Linear Secret-Sharing Schemes against Mass Surveillance}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {683}, year = {2015}, url = {http://eprint.iacr.org/2015/683}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GiacomelliOR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GilbertPT15, author = {Henri Gilbert and J{\'{e}}r{\^{o}}me Pl{\^{u}}t and Joana Treger}, title = {Key-Recovery Attack on the {ASASA} Cryptosystem with Expanding S-boxes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {567}, year = {2015}, url = {http://eprint.iacr.org/2015/567}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GilbertPT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GilboaG15, author = {Shoni Gilboa and Shay Gueron}, title = {Distinguishing a truncated random permutation from a random function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {773}, year = {2015}, url = {http://eprint.iacr.org/2015/773}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GilboaG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GiustolisiIR15, author = {Rosario Giustolisi and Vincenzo Iovino and Peter B. R{\o}nne}, title = {On the Possibility of Non-Interactive E-Voting in the Public-key Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1119}, year = {2015}, url = {http://eprint.iacr.org/2015/1119}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GiustolisiIR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GjosteenL15, author = {Kristian Gj{\o}steen and Anders Smedstuen Lund}, title = {The Norwegian Internet Voting Protocol: {A} new Instantiation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {503}, year = {2015}, url = {http://eprint.iacr.org/2015/503}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GjosteenL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldwasserK15, author = {Shafi Goldwasser and Yael Tauman Kalai}, title = {Cryptographic Assumptions: {A} Position Paper}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {907}, year = {2015}, url = {http://eprint.iacr.org/2015/907}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoldwasserK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldwasserKP15, author = {Shafi Goldwasser and Yael Tauman Kalai and Sunoo Park}, title = {Adaptively Secure Coin-Flipping, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {202}, year = {2015}, url = {http://eprint.iacr.org/2015/202}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoldwasserKP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GongCDCT15, author = {Junqing Gong and Jie Chen and Xiaolei Dong and Zhenfu Cao and Shaohua Tang}, title = {Extended Nested Dual System Groups, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {820}, year = {2015}, url = {http://eprint.iacr.org/2015/820}, timestamp = {Thu, 07 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GongCDCT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GongDCC15, author = {Junqing Gong and Xiaolei Dong and Zhenfu Cao and Jie Chen}, title = {Almost-tight Identity Based Encryption against Selective Opening Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {904}, year = {2015}, url = {http://eprint.iacr.org/2015/904}, timestamp = {Thu, 07 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GongDCC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GonzalezHR15, author = {Alonso Gonz{\'{a}}lez and Alejandro Hevia and Carla R{\`{a}}fols}, title = {{QA-NIZK} Arguments in Asymmetric Groups: New Tools and New Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {910}, year = {2015}, url = {http://eprint.iacr.org/2015/910}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GonzalezHR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gope15, author = {Prosanta Gope}, title = {Integrity-Aware Parallelizable Cipher Feedback Mode for Real-time Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {897}, year = {2015}, url = {http://eprint.iacr.org/2015/897}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gope15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GopularamN15, author = {Bhanu Prakash Gopularam and Nalini N}, title = {Improved Data Confidentiality of Audit Trail Data in Multi-Tenant Cloud}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1175}, year = {2015}, url = {http://eprint.iacr.org/2015/1175}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GopularamN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gor-nikMOP15, author = {Andreas Gornik and Amir Moradi and J{\"{u}}rgen Oehm and Christof Paar}, title = {A Hardware-based Countermeasure to Reduce Side-Channel Leakage - Design, Implementation, and Evaluation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {348}, year = {2015}, url = {http://eprint.iacr.org/2015/348}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gor-nikMOP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GorbunovM15, author = {Sergey Gorbunov and Silvio Micali}, title = {Democoin: {A} Publicly Verifiable and Jointly Serviced Cryptocurrency}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {521}, year = {2015}, url = {http://eprint.iacr.org/2015/521}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GorbunovM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GorbunovVW15, author = {Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee}, title = {Predicate Encryption for Circuits from {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {29}, year = {2015}, url = {http://eprint.iacr.org/2015/029}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GorbunovVW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GordonKLSZ15, author = {S. Dov Gordon and Jonathan Katz and Feng{-}Hao Liu and Elaine Shi and Hong{-}Sheng Zhou}, title = {Multi-Client Verifiable Computation with Stronger Security Guarantees}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {142}, year = {2015}, url = {http://eprint.iacr.org/2015/142}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GordonKLSZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GordonLS15, author = {S. Dov Gordon and Feng{-}Hao Liu and Elaine Shi}, title = {Constant-Round {MPC} with Fairness and Guarantee of Output Delivery}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {371}, year = {2015}, url = {http://eprint.iacr.org/2015/371}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GordonLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GotoS15, author = {Shota Goto and Junji Shikata}, title = {A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {950}, year = {2015}, url = {http://eprint.iacr.org/2015/950}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GotoS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Goyal0015, author = {Vipul Goyal and Divya Gupta and Abhishek Jain}, title = {What Information is Leaked under Concurrent Composition?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {420}, year = {2015}, url = {http://eprint.iacr.org/2015/420}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Goyal0015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Goyal015, author = {Vipul Goyal and Abhishek Jain}, title = {On Concurrently Secure Computation in the Multiple Ideal Query Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {439}, year = {2015}, url = {http://eprint.iacr.org/2015/439}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Goyal015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Goyal0S15, author = {Vipul Goyal and Divya Gupta and Amit Sahai}, title = {Concurrent Secure Computation via Non-Black Box Simulation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1107}, year = {2015}, url = {http://eprint.iacr.org/2015/1107}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Goyal0S15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalJK15, author = {Vipul Goyal and Aayush Jain and Dakshita Khurana}, title = {Witness Signatures and Non-Malleable Multi-Prover Zero-Knowledge Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1095}, year = {2015}, url = {http://eprint.iacr.org/2015/1095}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalJK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalJO15, author = {Vipul Goyal and Aayush Jain and Adam O'Neill}, title = {Multi-Input Functional Encryption with Unbounded-Message Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1113}, year = {2015}, url = {http://eprint.iacr.org/2015/1113}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalJO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalKMPS15, author = {Vipul Goyal and Dakshita Khurana and Ilya Mironov and Omkant Pandey and Amit Sahai}, title = {Do Distributed Differentially-Private Protocols Require Oblivious Transfer?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1090}, year = {2015}, url = {http://eprint.iacr.org/2015/1090}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalKMPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalPR15, author = {Vipul Goyal and Omkant Pandey and Silas Richelson}, title = {Textbook Non-Malleable Commitments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1178}, year = {2015}, url = {http://eprint.iacr.org/2015/1178}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalPR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrangerJMN15, author = {Robert Granger and Philipp Jovanovic and Bart Mennink and Samuel Neves}, title = {Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {999}, year = {2015}, url = {http://eprint.iacr.org/2015/999}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrangerJMN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrangerKZ15, author = {Robert Granger and Thorsten Kleinjung and Jens Zumbr{\"{a}}gel}, title = {On the discrete logarithm problem in finite fields of fixed characteristic}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {685}, year = {2015}, url = {http://eprint.iacr.org/2015/685}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrangerKZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GreenE15, author = {Marc Green and Thomas Eisenbarth}, title = {Strength in Numbers: Threshold {ECDSA} to Protect Keys in the Cloud}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1169}, year = {2015}, url = {http://eprint.iacr.org/2015/1169}, timestamp = {Thu, 23 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GreenE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrossHSS15, author = {Hannes Gro{\ss} and Marko H{\"{o}}lbl and Daniel Slamanig and Raphael Spreitzer}, title = {Privacy-Aware Authentication in the Internet of Things}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1110}, year = {2015}, url = {http://eprint.iacr.org/2015/1110}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrossHSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrossWDE15, author = {Hannes Gro{\ss} and Erich Wenger and Christoph Dobraunig and Christoph Ehrenh{\"{o}}fer}, title = {Suit up! Made-to-Measure Hardware Implementations of Ascon}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {34}, year = {2015}, url = {http://eprint.iacr.org/2015/034}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrossWDE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrossoS15, author = {Vincent Grosso and Fran{\c{c}}ois{-}Xavier Standaert}, title = {ASCA, {SASCA} and {DPA} with Enumeration: Which One Beats the Other and When?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {535}, year = {2015}, url = {http://eprint.iacr.org/2015/535}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrossoS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrossoSF15, author = {Vincent Grosso and Fran{\c{c}}ois{-}Xavier Standaert and Sebastian Faust}, title = {Masking vs. Multiparty Computation: How Large is the Gap for AES?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {492}, year = {2015}, url = {http://eprint.iacr.org/2015/492}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrossoSF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Groth15, author = {Jens Groth}, title = {Efficient Fully Structure-Preserving Signatures for Large Messages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {824}, year = {2015}, url = {http://eprint.iacr.org/2015/824}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Groth15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gu15, author = {Chunsheng Gu}, title = {Multilinear Maps Using Ideal Lattices without Encodings of Zero}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {23}, year = {2015}, url = {http://eprint.iacr.org/2015/023}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gu15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gu15a, author = {Chunsheng Gu}, title = {Ideal Multilinear Maps Based on Ideal Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {269}, year = {2015}, url = {http://eprint.iacr.org/2015/269}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gu15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gu15c, author = {Chunsheng Gu}, title = {New multilinear maps from ideal lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {737}, year = {2015}, url = {http://eprint.iacr.org/2015/737}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gu15c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gu15e, author = {Chunsheng Gu}, title = {Variation of {GGH15} Multilinear Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1245}, year = {2015}, url = {http://eprint.iacr.org/2015/1245}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gu15e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuXZK15, author = {Chun{-}Xiang Gu and Dan Xin and Yonghui Zheng and Yuanji Kang}, title = {Fully Homomorphic Encryption from Ring-LWE{\,:\,}Identity-Based{\unicode{65292}}Arbitrary Cyclotomic{\unicode{65292}}Tighter Parameters}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {78}, year = {2015}, url = {http://eprint.iacr.org/2015/078}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuXZK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GueronL15, author = {Shay Gueron and Yehuda Lindell}, title = {{GCM-SIV:} Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {102}, year = {2015}, url = {http://eprint.iacr.org/2015/102}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GueronL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GueronLNP15, author = {Shay Gueron and Yehuda Lindell and Ariel Nof and Benny Pinkas}, title = {Fast Garbling of Circuits Under Standard Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {751}, year = {2015}, url = {http://eprint.iacr.org/2015/751}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GueronLNP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuerriniIW15, author = {Eleonora Guerrini and Laurent Imbert and Th{\'{e}}o Winterhalter}, title = {Randomizing Scalar Multiplication Using Exact Covering Systems of Congruences}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {475}, year = {2015}, url = {http://eprint.iacr.org/2015/475}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuerriniIW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Guillevic15, author = {Aurore Guillevic}, title = {Computing Individual Discrete Logarithms Faster in GF(p\({}^{\mbox{n)}}\)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {513}, year = {2015}, url = {http://eprint.iacr.org/2015/513}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Guillevic15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GulcanAS15, author = {Ege Gulcan and Aydin Aysu and Patrick Schaumont}, title = {BitCryptor: Bit-Serialized Compact Crypto Engine on Reconfigurable Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {744}, year = {2015}, url = {http://eprint.iacr.org/2015/744}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GulcanAS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoHRV15, author = {Siyao Guo and Pavel Hub{\'{a}}cek and Alon Rosen and Margarita Vald}, title = {Rational Sumchecks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1058}, year = {2015}, url = {http://eprint.iacr.org/2015/1058}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoHRV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoL15, author = {Chun Guo and Dongdai Lin}, title = {A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {861}, year = {2015}, url = {http://eprint.iacr.org/2015/861}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoZX15, author = {Hui Guo and Zhenfeng Zhang and Jing Xu}, title = {Non-Transferable Proxy Re-Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1216}, year = {2015}, url = {http://eprint.iacr.org/2015/1216}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoZX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuptaCSAW15, author = {Trinabh Gupta and Natacha Crooks and Srinath T. V. Setty and Lorenzo Alvisi and Michael Walfish}, title = {Scalable and private media consumption with Popcorn}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {489}, year = {2015}, url = {http://eprint.iacr.org/2015/489}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuptaCSAW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaddadFBN15, author = {Patrick Haddad and Viktor Fischer and Florent Bernard and Jean Nicolai}, title = {A Physical Approach for Stochastic Modeling of TERO-based {TRNG}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {593}, year = {2015}, url = {http://eprint.iacr.org/2015/593}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaddadFBN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaiderAHPJSKD15, author = {Syed Kamran Haider and Masab Ahmad and Farrukh Hijaz and Astha Patni and Ethan Johnson and Matthew Seita and Omer Khan and Marten van Dijk}, title = {{M-MAP:} Multi-Factor Memory Authentication for Secure Embedded Processors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {831}, year = {2015}, url = {http://eprint.iacr.org/2015/831}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaiderAHPJSKD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HajiabadiK15, author = {Mohammad Hajiabadi and Bruce M. Kapron}, title = {Reproducible Circularly-Secure Bit Encryption: Applications and Realizations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {531}, year = {2015}, url = {http://eprint.iacr.org/2015/531}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HajiabadiK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HajiabadiK15a, author = {Mohammad Hajiabadi and Bruce M. Kapron}, title = {Gambling, Computational Information and Encryption Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {870}, year = {2015}, url = {http://eprint.iacr.org/2015/870}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HajiabadiK15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HajiabadiKS15, author = {Mohammad Hajiabadi and Bruce M. Kapron and S. Venkatesh}, title = {On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {741}, year = {2015}, url = {http://eprint.iacr.org/2015/741}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HajiabadiKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleCG15, author = {Britta Hale and Christopher Carr and Danilo Gligoroski}, title = {{CARIBE:} Adapting Traditional {IBE} for the Modern Key-Covetous Appetite}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1035}, year = {2015}, url = {http://eprint.iacr.org/2015/1035}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleCG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleJLS15, author = {Britta Hale and Tibor Jager and Sebastian Lauer and J{\"{o}}rg Schwenk}, title = {Speeding: On Low-Latency Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1214}, year = {2015}, url = {http://eprint.iacr.org/2015/1214}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleJLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Halevi15, author = {Shai Halevi}, title = {Graded Encoding, Variations on a Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {866}, year = {2015}, url = {http://eprint.iacr.org/2015/866}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Halevi15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleviHJ015, author = {Shai Halevi and William Eric Hall and Charanjit S. Jutla and Arnab Roy}, title = {Weak Ideal Functionalities for Designing Random Oracles with Applications to Fugue}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {114}, year = {2015}, url = {http://eprint.iacr.org/2015/114}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleviHJ015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleviIJKR15, author = {Shai Halevi and Yuval Ishai and Abhishek Jain and Eyal Kushilevitz and Tal Rabin}, title = {Secure Multiparty Computation with General Interaction Patterns}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1173}, year = {2015}, url = {http://eprint.iacr.org/2015/1173}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleviIJKR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HallgrenS015, author = {Sean Hallgren and Adam D. Smith and Fang Song}, title = {Classical Cryptographic Protocols in a Quantum World}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {687}, year = {2015}, url = {http://eprint.iacr.org/2015/687}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HallgrenS015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hamann015, author = {Matthias Hamann and Matthias Krause}, title = {Stream Cipher Operation Modes with Improved Security against Generic Collision Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {757}, year = {2015}, url = {http://eprint.iacr.org/2015/757}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hamann015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hamburg15, author = {Mike Hamburg}, title = {Ed448-Goldilocks, a new elliptic curve}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {625}, year = {2015}, url = {http://eprint.iacr.org/2015/625}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hamburg15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hamburg15a, author = {Mike Hamburg}, title = {Decaf: Eliminating cofactors through point compression}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {673}, year = {2015}, url = {http://eprint.iacr.org/2015/673}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hamburg15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HanzlikKK15, author = {Lucjan Hanzlik and Przemyslaw Kubiak and Miroslaw Kutylowski}, title = {Tracing Attacks on U-Prove with Revocation Mechanism}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {108}, year = {2015}, url = {http://eprint.iacr.org/2015/108}, timestamp = {Mon, 23 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HanzlikKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hao15, author = {Yonglin Hao}, title = {A Related-Key Chosen-IV Distinguishing Attack on Full Sprout Stream Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {231}, year = {2015}, url = {http://eprint.iacr.org/2015/231}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hao15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaoYCS15, author = {Feng Hao and Xun Yi and Liqun Chen and Siamak Fayyaz Shahandashti}, title = {The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {80}, year = {2015}, url = {http://eprint.iacr.org/2015/080}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HaoYCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hashimoto15, author = {Yasufumi Hashimoto}, title = {Cryptanalysis of multi-HFE}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1160}, year = {2015}, url = {http://eprint.iacr.org/2015/1160}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hashimoto15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HatzivasilisPM15, author = {George Hatzivasilis and Ioannis Papaefstathiou and Charalampos Manifavas}, title = {Password Hashing Competition - Survey and Benchmark}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {265}, year = {2015}, url = {http://eprint.iacr.org/2015/265}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HatzivasilisPM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HayasakaAKT15, author = {Kenichiro Hayasaka and Kazumaro Aoki and Tetsutaro Kobayashi and Tsuyoshi Takagi}, title = {A construction of 3-dimensional lattice sieve for number field sieve over F{\_}\{pn\}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1179}, year = {2015}, url = {http://eprint.iacr.org/2015/1179}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HayasakaAKT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hazay15, author = {Carmit Hazay}, title = {Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {4}, year = {2015}, url = {http://eprint.iacr.org/2015/004}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hazay15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HazayLP15, author = {Carmit Hazay and Yehuda Lindell and Arpita Patra}, title = {Adaptively Secure Computation with Partial Erasures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {450}, year = {2015}, url = {http://eprint.iacr.org/2015/450}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HazayLP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HazayPV15, author = {Carmit Hazay and Antigoni Polychroniadou and Muthuramakrishnan Venkitasubramaniam}, title = {Round-Optimal Token-Based Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {887}, year = {2015}, url = {http://eprint.iacr.org/2015/887}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HazayPV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HazayPW15, author = {Carmit Hazay and Arpita Patra and Bogdan Warinschi}, title = {Selective Opening Security for Receivers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {860}, year = {2015}, url = {http://eprint.iacr.org/2015/860}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HazayPW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HazayV15, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam}, title = {On Black-Box Complexity of Universally Composable Security in the {CRS} model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {488}, year = {2015}, url = {http://eprint.iacr.org/2015/488}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HazayV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HazayV15a, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam}, title = {What Security can we Achieve in 4-Rounds?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {797}, year = {2015}, url = {http://eprint.iacr.org/2015/797}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HazayV15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeibergPW15, author = {Sven Heiberg and Arnis Parsovs and Jan Willemson}, title = {Log Analysis of Estonian Internet Voting 2013-2015}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1211}, year = {2015}, url = {http://eprint.iacr.org/2015/1211}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeibergPW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeilmanKZG15, author = {Ethan Heilman and Alison Kendler and Aviv Zohar and Sharon Goldberg}, title = {Eclipse Attacks on Bitcoin's Peer-to-Peer Network}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {263}, year = {2015}, url = {http://eprint.iacr.org/2015/263}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeilmanKZG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HemenwayJOSW15, author = {Brett Hemenway and Zahra Jafargholi and Rafail Ostrovsky and Alessandra Scafuro and Daniel Wichs}, title = {Adaptively Secure Garbled Circuits from One-Way Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1250}, year = {2015}, url = {http://eprint.iacr.org/2015/1250}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HemenwayJOSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HemenwayO15, author = {Brett Hemenway and Rafail Ostrovsky}, title = {Building Lossy Trapdoor Functions from Lossy Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {156}, year = {2015}, url = {http://eprint.iacr.org/2015/156}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HemenwayO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HemenwayOR15, author = {Brett Hemenway and Rafail Ostrovsky and Alon Rosen}, title = {Non-committing encryption from {\(\Phi\)}-hiding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {54}, year = {2015}, url = {http://eprint.iacr.org/2015/054}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HemenwayOR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeroldKM15, author = {Gottfried Herold and Elena Kirshanova and Alexander May}, title = {On the Asymptotic Complexity of Solving {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1222}, year = {2015}, url = {http://eprint.iacr.org/2015/1222}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeroldKM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Herranz15, author = {Javier Herranz}, title = {Attribute-Based Versions of Schnorr and ElGamal}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {213}, year = {2015}, url = {http://eprint.iacr.org/2015/213}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Herranz15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HesseHR15, author = {Julia Hesse and Dennis Hofheinz and Andy Rupp}, title = {Reconfigurable Cryptography: {A} flexible approach to long-term security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1047}, year = {2015}, url = {http://eprint.iacr.org/2015/1047}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HesseHR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeuerKP15, author = {Felix Heuer and Eike Kiltz and Krzysztof Pietrzak}, title = {Standard Security Does Imply Security Against Selective Opening for Markov Distributions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {853}, year = {2015}, url = {http://eprint.iacr.org/2015/853}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeuerKP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeyseMG15, author = {Stefan Heyse and Ingo von Maurich and Tim G{\"{u}}neysu}, title = {Smaller Keys for Code-Based Cryptography: {QC-MDPC} McEliece Implementations on Embedded Devices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {425}, year = {2015}, url = {http://eprint.iacr.org/2015/425}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeyseMG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoangKM15, author = {Viet Tung Hoang and Jonathan Katz and Alex J. Malozemoff}, title = {Automated Analysis and Synthesis of Authenticated Encryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {624}, year = {2015}, url = {http://eprint.iacr.org/2015/624}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HoangKM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoangRRV15, author = {Viet Tung Hoang and Reza Reyhanitabar and Phillip Rogaway and Damian Viz{\'{a}}r}, title = {Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {189}, year = {2015}, url = {http://eprint.iacr.org/2015/189}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HoangRRV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoepmanLR15, author = {Jaap{-}Henk Hoepman and Wouter Lueks and Sietse Ringers}, title = {On Linkability and Malleability in Self-blindable Credentials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {842}, year = {2015}, url = {http://eprint.iacr.org/2015/842}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HoepmanLR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoffsteinPSSWZ15, author = {Jeffrey Hoffstein and Jill Pipher and John M. Schanck and Joseph H. Silverman and William Whyte and Zhenfei Zhang}, title = {Choosing Parameters for NTRUEncrypt}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {708}, year = {2015}, url = {http://eprint.iacr.org/2015/708}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HoffsteinPSSWZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoffsteinPSSWZ15a, author = {Jeffrey Hoffstein and Jill Pipher and John M. Schanck and Joseph H. Silverman and William Whyte and Zhenfei Zhang}, title = {DA-Encrypt: Homomorphic Encryption via Non-Archimedean Diophantine Approximation - Preliminary Report}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {844}, year = {2015}, url = {http://eprint.iacr.org/2015/844}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HoffsteinPSSWZ15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hofheinz0M15, author = {Dennis Hofheinz and Christian Matt and Ueli Maurer}, title = {Idealizing Identity-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {862}, year = {2015}, url = {http://eprint.iacr.org/2015/862}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hofheinz0M15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hofheinz15, author = {Dennis Hofheinz}, title = {Algebraic partitioning: Fully compact and (almost) tightly secure cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {499}, year = {2015}, url = {http://eprint.iacr.org/2015/499}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hofheinz15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HofheinzJ15, author = {Dennis Hofheinz and Tibor Jager}, title = {Verifiable Random Functions from Standard Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1048}, year = {2015}, url = {http://eprint.iacr.org/2015/1048}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HofheinzJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HofheinzKS15, author = {Dennis Hofheinz and Jessica Koch and Christoph Striecks}, title = {Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {123}, year = {2015}, url = {http://eprint.iacr.org/2015/123}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HofheinzKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HofheinzRW15, author = {Dennis Hofheinz and Vanishree Rao and Daniel Wichs}, title = {Standard Security Does Not Imply Indistinguishability Under Selective Opening}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {792}, year = {2015}, url = {http://eprint.iacr.org/2015/792}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HofheinzRW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HohenbergerMPS15, author = {Susan Hohenberger and Steven A. Myers and Rafael Pass and Abhi Shelat}, title = {{ANONIZE:} {A} Large-Scale Anonymous Survey System}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {681}, year = {2015}, url = {http://eprint.iacr.org/2015/681}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HohenbergerMPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Holmgren15, author = {Justin Holmgren}, title = {On Necessary Padding with {IO}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {627}, year = {2015}, url = {http://eprint.iacr.org/2015/627}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Holmgren15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HomsirikamolDFF15, author = {Ekawat Homsirikamol and William Diehl and Ahmed Ferozpuri and Farnoud Farahmand and Malik Umar Sharif and Kris Gaj}, title = {{GMU} Hardware {API} for Authenticated Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {669}, year = {2015}, url = {http://eprint.iacr.org/2015/669}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HomsirikamolDFF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HooshmandEA15, author = {Reza Hooshmand and Taraneh Eghlidos and Mohammad Reza Aref}, title = {Improving {GGH} Public Key Scheme Using Low Density Lattice Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {229}, year = {2015}, url = {http://eprint.iacr.org/2015/229}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HooshmandEA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Horvath15, author = {M{\'{a}}t{\'{e}} Horv{\'{a}}th}, title = {Survey on Cryptographic Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {412}, year = {2015}, url = {http://eprint.iacr.org/2015/412}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Horvath15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuJ15, author = {Yupu Hu and Huiwen Jia}, title = {Cryptanalysis of {GGH} Map}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {301}, year = {2015}, url = {http://eprint.iacr.org/2015/301}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuJ15a, author = {Yupu Hu and Huiwen Jia}, title = {A Comment on Gu Map-1}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {448}, year = {2015}, url = {http://eprint.iacr.org/2015/448}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuJ15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuJ15b, author = {Yupu Hu and Huiwen Jia}, title = {An Optimization of Gu Map-1}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {453}, year = {2015}, url = {http://eprint.iacr.org/2015/453}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuJ15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuMR15, author = {Zhangxiang Hu and Payman Mohassel and Mike Rosulek}, title = {Efficient Zero-Knowledge Proofs of Non-Algebraic Statements with Sublinear Amortized Cost}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {497}, year = {2015}, url = {http://eprint.iacr.org/2015/497}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuMR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuangKKKM15, author = {Yan Huang and Jonathan Katz and Vladimir Kolesnikov and Ranjit Kumaresan and Alex J. Malozemoff}, title = {Amortizing Garbled Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {81}, year = {2015}, url = {http://eprint.iacr.org/2015/081}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuangKKKM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuangKY15, author = {Ming{-}Deh A. Huang and Michiel Kosters and Sze Ling Yeo}, title = {Last fall degree, HFE, and Weil descent attacks on {ECDLP}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {573}, year = {2015}, url = {http://eprint.iacr.org/2015/573}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuangKY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuangLMC15, author = {Zhengan Huang and Shengli Liu and Xianping Mao and Kefei Chen}, title = {Non-malleability under Selective Opening Attacks: Implication and Separation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {316}, year = {2015}, url = {http://eprint.iacr.org/2015/316}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuangLMC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuangPST15, author = {Yun{-}Ju Huang and Christophe Petit and Naoyuki Shinohara and Tsuyoshi Takagi}, title = {On Generalized First Fall Degree Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {358}, year = {2015}, url = {http://eprint.iacr.org/2015/358}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HuangPST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuangTW15, author = {Tao Huang and Ivan Tjuawinata and Hongjun Wu}, title = {Differential-Linear Cryptanalysis of {ICEPOLE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {160}, year = {2015}, url = {http://eprint.iacr.org/2015/160}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HuangTW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuangZ15, author = {Yan Huang and Ruiyu Zhu}, title = {Revisiting LEGOs: Optimizations, Analysis, and their Limit}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1038}, year = {2015}, url = {http://eprint.iacr.org/2015/1038}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuangZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HulsingRS15, author = {Andreas H{\"{u}}lsing and Joost Rijneveld and Peter Schwabe}, title = {ARMed {SPHINCS} - Computing a 41KB signature in 16KB of {RAM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1042}, year = {2015}, url = {http://eprint.iacr.org/2015/1042}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HulsingRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HulsingRS15a, author = {Andreas H{\"{u}}lsing and Joost Rijneveld and Fang Song}, title = {Mitigating Multi-Target Attacks in Hash-based Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1256}, year = {2015}, url = {http://eprint.iacr.org/2015/1256}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HulsingRS15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IijimaMC15, author = {Tsutomu Iijima and Fumiyuki Momose and Jinhui Chao}, title = {A classification of elliptic curves with respect to the {GHS} attack in odd characteristic}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {805}, year = {2015}, url = {http://eprint.iacr.org/2015/805}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IijimaMC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/InciGAES15, author = {Mehmet Sinan Inci and Berk G{\"{u}}lmezoglu and Gorka Irazoqui Apecechea and Thomas Eisenbarth and Berk Sunar}, title = {Seriously, get off my cloud! Cross-VM {RSA} Key Recovery in a Public Cloud}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {898}, year = {2015}, url = {http://eprint.iacr.org/2015/898}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/InciGAES15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IndacoLMT15, author = {Marco Indaco and Fabio Lauri and Andrea Miele and Pascal Trotta}, title = {An Efficient Many-Core Architecture for Elliptic Curve Cryptography Security Assessment}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {638}, year = {2015}, url = {http://eprint.iacr.org/2015/638}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IndacoLMT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IovinoTZ15, author = {Vincenzo Iovino and Qiang Tang and Karol Zebrowski}, title = {On the Power of Public-key Functional Encryption with Function Privacy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {470}, year = {2015}, url = {http://eprint.iacr.org/2015/470}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IovinoTZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IovinoZ15, author = {Vincenzo Iovino and Karol Zebrowski}, title = {Mergeable Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {103}, year = {2015}, url = {http://eprint.iacr.org/2015/103}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IovinoZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IrazoquiES15, author = {Gorka Irazoqui and Thomas Eisenbarth and Berk Sunar}, title = {Cross Processor Cache Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1155}, year = {2015}, url = {http://eprint.iacr.org/2015/1155}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IrazoquiES15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IrshadSAFH15, author = {Azeem Irshad and Muhammad Sher and Shahzad Ashraf and Ch. Muhammad Shahzad Faisal and Mahmood Ul Hassan}, title = {Cryptanalysis for Secure and Efficient Smart-Card-Based Remote User Authentication Scheme for Multi-server Environment}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {686}, year = {2015}, url = {http://eprint.iacr.org/2015/686}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IrshadSAFH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiOZ15, author = {Yuval Ishai and Rafail Ostrovsky and Vassilis Zikas}, title = {Secure Multi-Party Computation with Identifiable Abort}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {325}, year = {2015}, url = {http://eprint.iacr.org/2015/325}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiOZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiWY15, author = {Yuval Ishai and Mor Weiss and Guang Yang}, title = {Making the Best of a Leaky Situation: Zero-Knowledge PCPs from Leakage-Resilient Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1055}, year = {2015}, url = {http://eprint.iacr.org/2015/1055}, timestamp = {Mon, 21 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/IshaiWY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshalKLO15, author = {Yuval Ishai and Eyal Kushilevitz and Steve Lu and Rafail Ostrovsky}, title = {Private Large-Scale Databases with Distributed Searchable Symmetric Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1190}, year = {2015}, url = {http://eprint.iacr.org/2015/1190}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/IshalKLO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshidaEHST15, author = {Ai Ishida and Keita Emura and Goichiro Hanaoka and Yusuke Sakai and Keisuke Tanaka}, title = {Group Signature with Deniability: How to Disavow a Signature}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {43}, year = {2015}, url = {http://eprint.iacr.org/2015/043}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshidaEHST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IsobeS15, author = {Takanori Isobe and Kyoji Shibutani}, title = {Generic Key Recovery Attack on Feistel Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {526}, year = {2015}, url = {http://eprint.iacr.org/2015/526}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IsobeS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IsobeS15a, author = {Takanori Isobe and Kyoji Shibutani}, title = {Improved All-Subkeys Recovery Attacks on FOX, {KATAN} and {SHACAL-2} Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {557}, year = {2015}, url = {http://eprint.iacr.org/2015/557}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IsobeS15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JacobMV15, author = {Grasha Jacob and A. Murugan and Irine Viola}, title = {Towards the Generation of a Dynamic Key-Dependent S-Box to Enhance Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {92}, year = {2015}, url = {http://eprint.iacr.org/2015/092}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JacobMV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JakobsenO15, author = {Sune K. Jakobsen and Claudio Orlandi}, title = {How to Bootstrap Anonymous Communication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {130}, year = {2015}, url = {http://eprint.iacr.org/2015/130}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JakobsenO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JakobsenO15a, author = {Jakob Jakobsen and Claudio Orlandi}, title = {On the {CCA} (in)security of MTProto}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1177}, year = {2015}, url = {http://eprint.iacr.org/2015/1177}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JakobsenO15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JareckiKSS15, author = {Stanislaw Jarecki and Hugo Krawczyk and Maliheh Shirvanian and Nitesh Saxena}, title = {Device-Enhanced Password Protocols with Optimal Online-Offline Protection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1099}, year = {2015}, url = {http://eprint.iacr.org/2015/1099}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JareckiKSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JeanN15, author = {J{\'{e}}r{\'{e}}my Jean and Ivica Nikolic}, title = {Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak-f Permutation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {244}, year = {2015}, url = {http://eprint.iacr.org/2015/244}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JeanN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JeanNP15, author = {J{\'{e}}r{\'{e}}my Jean and Mar{\'{\i}}a Naya{-}Plasencia and Thomas Peyrin}, title = {Improved Cryptanalysis of AES-like Permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {279}, year = {2015}, url = {http://eprint.iacr.org/2015/279}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JeanNP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JeanNPWW15, author = {J{\'{e}}r{\'{e}}my Jean and Ivica Nikolic and Thomas Peyrin and Lei Wang and Shuang Wu}, title = {Security Analysis of {PRINCE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {372}, year = {2015}, url = {http://eprint.iacr.org/2015/372}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JeanNPWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JhaN15, author = {Ashwin Jha and Mridul Nandi}, title = {Some Cryptanalytic Results on Zipper Hash and Concatenated Hash}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {973}, year = {2015}, url = {http://eprint.iacr.org/2015/973}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JhaN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JinD15, author = {Chenglu Jin and Marten van Dijk}, title = {Secure and Efficient Initialization and Authentication Protocols for {SHIELD}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {210}, year = {2015}, url = {http://eprint.iacr.org/2015/210}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JinD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JinXBRD15, author = {Chenglu Jin and Xiaolin Xu and Wayne P. Burleson and Ulrich R{\"{u}}hrmair and Marten van Dijk}, title = {PLayPUF: Programmable Logically Erasable PUFs for Forward and Backward Secure Key Management}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1052}, year = {2015}, url = {http://eprint.iacr.org/2015/1052}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JinXBRD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JoseC15, author = {Jimmy Jose and Dipanwita Roy Chowdhury}, title = {Four Neighbourhood Cellular Automata as Better Cryptographic Primitives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {700}, year = {2015}, url = {http://eprint.iacr.org/2015/700}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JoseC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JostLMS15, author = {Christine Jost and Ha Lam and Alexander Maximov and Ben J. M. Smeets}, title = {Encryption Performance Improvements of the Paillier Cryptosystem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {864}, year = {2015}, url = {http://eprint.iacr.org/2015/864}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JostLMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JouxP15, author = {Antoine Joux and C{\'{e}}cile Pierrot}, title = {Nearly Sparse Linear Algebra}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {930}, year = {2015}, url = {http://eprint.iacr.org/2015/930}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JouxP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JovanovicN15, author = {Philipp Jovanovic and Samuel Neves}, title = {Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {428}, year = {2015}, url = {http://eprint.iacr.org/2015/428}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JovanovicN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Jutla15, author = {Charanjit S. Jutla}, title = {Upending Stock Market Structure Using Secure Multi-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {550}, year = {2015}, url = {http://eprint.iacr.org/2015/550}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Jutla15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KabiriradH15, author = {Saeideh Kabirirad and Hamideh Hajiabadi}, title = {Cryptanalysis Of An Authenticated Image Encryption Scheme Based On Chaotic Maps And Memory Cellular Automata}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {326}, year = {2015}, url = {http://eprint.iacr.org/2015/326}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KabiriradH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KalaiP15, author = {Yael Tauman Kalai and Omer Paneth}, title = {Delegating {RAM} Computations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {957}, year = {2015}, url = {http://eprint.iacr.org/2015/957}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KalaiP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kane15, author = {Amadou Moctar Kane}, title = {A revocable anonymity in Tor}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {215}, year = {2015}, url = {http://eprint.iacr.org/2015/215}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kane15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kane15a, author = {Amadou Moctar Kane}, title = {Cryptanalysis of a fair anonymity for the tor network}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {338}, year = {2015}, url = {http://eprint.iacr.org/2015/338}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kane15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kar15, author = {Jayaprakash Kar}, title = {Cryptanalysis of Provably Secure Certi cateless Short Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {933}, year = {2015}, url = {http://eprint.iacr.org/2015/933}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kar15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kar15a, author = {Jayaprakash Kar}, title = {Cryptanalysis and Improvement of Identity-based Proxy Multi-signature scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1051}, year = {2015}, url = {http://eprint.iacr.org/2015/1051}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kar15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Karabina15, author = {Koray Karabina}, title = {Point Decomposition Problem in Binary Elliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {319}, year = {2015}, url = {http://eprint.iacr.org/2015/319}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Karabina15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KarbasiA15, author = {Amir Hassani Karbasi and Reza Ebrahimi Atani}, title = {{ILTRU:} An NTRU-Like Public Key Cryptosystem Over Ideal Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {549}, year = {2015}, url = {http://eprint.iacr.org/2015/549}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KarbasiA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Karpman15, author = {Pierre Karpman}, title = {From Related-Key Distinguishers to Related-Key-Recovery on Even-Mansour Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {134}, year = {2015}, url = {http://eprint.iacr.org/2015/134}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Karpman15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KarpmanPS15, author = {Pierre Karpman and Thomas Peyrin and Marc Stevens}, title = {Practical Free-Start Collision Attacks on 76-step {SHA-1}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {530}, year = {2015}, url = {http://eprint.iacr.org/2015/530}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KarpmanPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KarthikeyanCSR15, author = {Harish Karthikeyan and Suvradip Chakraborty and Kunwar Singh and C. Pandu Rangan}, title = {An Efficient Multiple {PKG} Compatible Identity Based Key Agreement for Vehicular Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1012}, year = {2015}, url = {http://eprint.iacr.org/2015/1012}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KarthikeyanCSR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kasahara15, author = {Masao Kasahara}, title = {New classes of public key cryptosystem {K(XVI)SE(1)PKC} constructed based on Reed-Solomon code over extension field of m=8 and K(XVI)SE(2)PKC, based on binary cyclic code}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {714}, year = {2015}, url = {http://eprint.iacr.org/2015/714}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kasahara15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kasahara15a, author = {Masao Kasahara}, title = {A Simple Scheme, for Strengthening Product-sum Type {PKC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {779}, year = {2015}, url = {http://eprint.iacr.org/2015/779}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kasahara15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KatzTZ15, author = {Jonathan Katz and Aishwarya Thiruvengadam and Hong{-}Sheng Zhou}, title = {Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {280}, year = {2015}, url = {http://eprint.iacr.org/2015/280}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KatzTZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KaulA15, author = {Sonam Devgan Kaul and Amit K. Awasthi}, title = {Cryptanalysis Of Dynamic {ID} Based Remote User Authentication Scheme With Key Agreement}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {490}, year = {2015}, url = {http://eprint.iacr.org/2015/490}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KaulA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KavutM15, author = {Sel{\c{c}}uk Kavut and Subhamoy Maitra}, title = {Patterson-Wiedemann type functions on 21 variables with Nonlinearity greater than Bent Concatenation bound}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1036}, year = {2015}, url = {http://eprint.iacr.org/2015/1036}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KavutM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kazmi15, author = {Raza Ali Kazmi}, title = {Cryptography from Post-Quantum Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {376}, year = {2015}, url = {http://eprint.iacr.org/2015/376}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kazmi15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Keller15, author = {Marcel Keller}, title = {The Oblivious Machine - or: How to Put the {C} into {MPC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {467}, year = {2015}, url = {http://eprint.iacr.org/2015/467}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Keller15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KellerOS15, author = {Marcel Keller and Emmanuela Orsini and Peter Scholl}, title = {Actively Secure {OT} Extension with Optimal Overhead}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {546}, year = {2015}, url = {http://eprint.iacr.org/2015/546}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KellerOS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KelseyMT15, author = {John Kelsey and Kerry A. McKay and Meltem S{\"{o}}nmez Turan}, title = {Predictive Models for Min-Entropy Estimation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {600}, year = {2015}, url = {http://eprint.iacr.org/2015/600}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KelseyMT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KepleyRS15, author = {Shane Kepley and David Russo and Rainer Steinwandt}, title = {Cryptanalysis of a modern rotor machine in a multicast setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {661}, year = {2015}, url = {http://eprint.iacr.org/2015/661}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KepleyRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhazaeiA15, author = {Shahram Khazaei and Siavash Ahmadi}, title = {Ciphertext-only attack on d*d Hill in O(d13\({}^{\mbox{d}}\))}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {802}, year = {2015}, url = {http://eprint.iacr.org/2015/802}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhazaeiA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhovratovichNPS15, author = {Dmitry Khovratovich and Ivica Nikolic and Josef Pieprzyk and Przemyslaw Sokolowski and Ron Steinfeld}, title = {Rotational Cryptanalysis of {ARX} Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {95}, year = {2015}, url = {http://eprint.iacr.org/2015/095}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhovratovichNPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhuranaK15, author = {Mehak Khurana and Meena Kumari}, title = {{VARIANTS} {OF} {DIFFERENTIAL} {AND} {LINEAR} {CRYPTANALYSIS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {473}, year = {2015}, url = {http://eprint.iacr.org/2015/473}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhuranaK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kiayias0Z15, author = {Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang}, title = {Ceremonies for End-to-End Verifiable Elections}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1166}, year = {2015}, url = {http://eprint.iacr.org/2015/1166}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kiayias0Z15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasP15, author = {Aggelos Kiayias and Giorgos Panagiotakos}, title = {Speed-Security Tradeoffs in Blockchain Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1019}, year = {2015}, url = {http://eprint.iacr.org/2015/1019}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasRRS15, author = {Aggelos Kiayias and Yona Raekow and Alexander Russell and Narasimha K. Shashidhar}, title = {A One-time Stegosystem and Applications to Efficient Covert Communication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {684}, year = {2015}, url = {http://eprint.iacr.org/2015/684}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasRRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasZZ15, author = {Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang}, title = {End-to-End Verifiable Elections in the Standard Model{\({_\ast}\)}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {346}, year = {2015}, url = {http://eprint.iacr.org/2015/346}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasZZ15a, author = {Aggelos Kiayias and Hong{-}Sheng Zhou and Vassilis Zikas}, title = {Fair and Robust Multi-Party Computation using a Global Transaction Ledger}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {574}, year = {2015}, url = {http://eprint.iacr.org/2015/574}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasZZ15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KilincK15, author = {Handan Kilin{\c{c}} and Alptekin K{\"{u}}p{\c{c}}{\"{u}}}, title = {Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {64}, year = {2015}, url = {http://eprint.iacr.org/2015/064}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KilincK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiltzMP15, author = {Eike Kiltz and Daniel Masny and Krzysztof Pietrzak}, title = {Simple Chosen-Ciphertext Security from Low-Noise {LPN}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {401}, year = {2015}, url = {http://eprint.iacr.org/2015/401}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiltzMP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiltzPW15, author = {Eike Kiltz and Jiaxin Pan and Hoeteck Wee}, title = {Structure-Preserving Signatures from Standard Assumptions, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {604}, year = {2015}, url = {http://eprint.iacr.org/2015/604}, timestamp = {Tue, 21 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiltzPW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiltzW15, author = {Eike Kiltz and Hoeteck Wee}, title = {Quasi-Adaptive {NIZK} for Linear Subspaces Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {216}, year = {2015}, url = {http://eprint.iacr.org/2015/216}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiltzW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kim15, author = {Taechan Kim}, title = {Extended Tower Number Field Sieve: {A} New Complexity for Medium Prime Case}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1027}, year = {2015}, url = {http://eprint.iacr.org/2015/1027}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kim15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimKS15, author = {Jinsu Kim and Sungwook Kim and Jae Hong Seo}, title = {Multilinear Map via Scale-Invariant {FHE:} Enhancing Security and Efficiency}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {992}, year = {2015}, url = {http://eprint.iacr.org/2015/992}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimL15, author = {Miran Kim and Kristin E. Lauter}, title = {Private Genome Analysis through Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {965}, year = {2015}, url = {http://eprint.iacr.org/2015/965}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimLLW15, author = {Myungsun Kim and Hyung Tae Lee and San Ling and Huaxiong Wang}, title = {On the Efficiency of FHE-based Private Queries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1176}, year = {2015}, url = {http://eprint.iacr.org/2015/1176}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimLLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KirazSU15, author = {Mehmet Sabir Kiraz and Isa Sertkaya and Osmanbey Uzunkol}, title = {An Efficient ID-Based Message Recoverable Privacy-Preserving Auditing Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {633}, year = {2015}, url = {http://eprint.iacr.org/2015/633}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KirazSU15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KirchnerF15, author = {Paul Kirchner and Pierre{-}Alain Fouque}, title = {An Improved {BKW} Algorithm for {LWE} with Applications to Cryptography and Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {552}, year = {2015}, url = {http://eprint.iacr.org/2015/552}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KirchnerF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kiyoshima15, author = {Susumu Kiyoshima}, title = {An Alternative Approach to Non-black-box Simulation in Fully Concurrent Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {67}, year = {2015}, url = {http://eprint.iacr.org/2015/067}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kiyoshima15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kiyoshima15a, author = {Susumu Kiyoshima}, title = {Statistical Concurrent Non-malleable Zero-knowledge from One-way Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {620}, year = {2015}, url = {http://eprint.iacr.org/2015/620}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kiyoshima15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kiyoshima15b, author = {Susumu Kiyoshima}, title = {Constant-round Leakage-resilient Zero-knowledge from Collision Resistance}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1235}, year = {2015}, url = {http://eprint.iacr.org/2015/1235}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kiyoshima15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KizilkaleEK15, author = {Can Kizilkale and {\"{O}}mer Egecioglu and {\c{C}}etin Kaya Ko{\c{c}}}, title = {A Matrix Decomposition Method for Optimal Normal Basis Multiplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {742}, year = {2015}, url = {http://eprint.iacr.org/2015/742}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KizilkaleEK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KleberUMKSH15, author = {Stephan Kleber and Florian Unterstein and Matthias Matousek and Frank Kargl and Frank Slomka and Matthias Hiller}, title = {Secure Execution Architecture based on PUF-driven Instruction Level Code Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {651}, year = {2015}, url = {http://eprint.iacr.org/2015/651}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KleberUMKSH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KoblitzM15, author = {Neal Koblitz and Alfred Menezes}, title = {The Random Oracle Model: {A} Twenty-Year Retrospective}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {140}, year = {2015}, url = {http://eprint.iacr.org/2015/140}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KoblitzM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KoblitzM15a, author = {Neal Koblitz and Alfred Menezes}, title = {A Riddle Wrapped in an Enigma}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1018}, year = {2015}, url = {http://eprint.iacr.org/2015/1018}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KoblitzM15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KocakMO15, author = {Nese Ko{\c{c}}ak and Sihem Mesnager and Ferruh {\"{O}}zbudak}, title = {Bent and Semi-bent Functions via Linear Translators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {875}, year = {2015}, url = {http://eprint.iacr.org/2015/875}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KocakMO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KochWH15, author = {Alexander Koch and Stefan Walzer and Kevin H{\"{a}}rtel}, title = {Card-based Cryptographic Protocols Using a Minimal Number of Cards}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {865}, year = {2015}, url = {http://eprint.iacr.org/2015/865}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KochWH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KolblLT15, author = {Stefan K{\"{o}}lbl and Gregor Leander and Tyge Tiessen}, title = {Observations on the {SIMON} block cipher family}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {145}, year = {2015}, url = {http://eprint.iacr.org/2015/145}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KolblLT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KolblR15, author = {Stefan K{\"{o}}lbl and Arnab Roy}, title = {A Brief Comparison of Simon and Simeck}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {706}, year = {2015}, url = {http://eprint.iacr.org/2015/706}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KolblR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KolesnikovM15, author = {Vladimir Kolesnikov and Alex J. Malozemoff}, title = {Public Verifiability in the Covert Model (Almost) for Free}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1067}, year = {2015}, url = {http://eprint.iacr.org/2015/1067}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KolesnikovM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KolesnikovMRR15, author = {Vladimir Kolesnikov and Payman Mohassel and Ben Riva and Mike Rosulek}, title = {Richer Efficiency/Security Trade-offs in 2PC}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {55}, year = {2015}, url = {http://eprint.iacr.org/2015/055}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KolesnikovMRR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kolomeec15, author = {Nikolay Kolomeec}, title = {The graph of minimal distances of bent functions and its properties}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1203}, year = {2015}, url = {http://eprint.iacr.org/2015/1203}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kolomeec15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KomargodskiZ15, author = {Ilan Komargodski and Mark Zhandry}, title = {Modern Cryptography Through the Lens of Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {735}, year = {2015}, url = {http://eprint.iacr.org/2015/735}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KomargodskiZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KorchaginP15, author = {Ignat Korchagin and Eugene Pilyankevich}, title = {Secure Comparator: a ZKP-Based Authentication System}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1180}, year = {2015}, url = {http://eprint.iacr.org/2015/1180}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KorchaginP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KorzhikMTY15, author = {Valery I. Korzhik and Guillermo Morales{-}Luna and Sergei Tikhonov and Victor Yakovlev}, title = {Analysis of Keyless Massive MIMO-based Cryptosystem Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {816}, year = {2015}, url = {http://eprint.iacr.org/2015/816}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KorzhikMTY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KosbaMSWP15, author = {Ahmed E. Kosba and Andrew Miller and Elaine Shi and Zikai Wen and Charalampos Papamanthou}, title = {Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {675}, year = {2015}, url = {http://eprint.iacr.org/2015/675}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KosbaMSWP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KosbaZMQCPPSS15, author = {Ahmed E. Kosba and Zhichao Zhao and Andrew Miller and Yi Qian and T.{-}H. Hubert Chan and Charalampos Papamanthou and Rafael Pass and Abhi Shelat and Elaine Shi}, title = {How to Use SNARKs in Universally Composable Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1093}, year = {2015}, url = {http://eprint.iacr.org/2015/1093}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KosbaZMQCPPSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KotovU15, author = {Matvei Kotov and Alexander Ushakov}, title = {Analysis of a key exchange protocol based on tropical matrix algebra}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {852}, year = {2015}, url = {http://eprint.iacr.org/2015/852}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KotovU15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KousidisW15, author = {Stavros Kousidis and Andreas Wiemers}, title = {On the First Fall Degree of Summation Polynomials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1121}, year = {2015}, url = {http://eprint.iacr.org/2015/1121}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KousidisW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KrasnovaNS15, author = {Anna Krasnova and Moritz Neikes and Peter Schwabe}, title = {Footprint scheduling for Dining-Cryptographer networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1213}, year = {2015}, url = {http://eprint.iacr.org/2015/1213}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KrasnovaNS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Krause15, author = {Matthias Krause}, title = {Analyzing Constructions for key-alternating Pseudorandom Functions with Applications to Stream Cipher Operation Modes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {636}, year = {2015}, url = {http://eprint.iacr.org/2015/636}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Krause15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KrawczykW15, author = {Hugo Krawczyk and Hoeteck Wee}, title = {The {OPTLS} Protocol and {TLS} 1.3}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {978}, year = {2015}, url = {http://eprint.iacr.org/2015/978}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KrawczykW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KruppSSFAN15, author = {Johannes Krupp and Dominique Schr{\"{o}}der and Mark Simkin and Dario Fiore and Giuseppe Ateniese and Stefan N{\"{u}}rnberger}, title = {Nearly Optimal Verifiable Data Streaming (Full Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {333}, year = {2015}, url = {http://eprint.iacr.org/2015/333}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KruppSSFAN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ku-CauichM15, author = {Juan Carlos Ku{-}Cauich and Guillermo Morales{-}Luna}, title = {A Linear Code and its Application into Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1124}, year = {2015}, url = {http://eprint.iacr.org/2015/1124}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ku-CauichM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ku-CauichMT15, author = {Juan Carlos Ku{-}Cauich and Guillermo Morales{-}Luna and Horacio Tapia{-}Recillas}, title = {An Authentication Code over Galois Rings with Optimal Impersonation and Substitution Probabilities}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {618}, year = {2015}, url = {http://eprint.iacr.org/2015/618}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ku-CauichMT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KulykNBVHKB15, author = {Oksana Kulyk and Stephan Neumann and Jurlind Budurushi and Melanie Volkamer and Rolf Haenni and Reto E. Koenig and Phil{\'{e}}mon von Bergen}, title = {Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {558}, year = {2015}, url = {http://eprint.iacr.org/2015/558}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KulykNBVHKB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KupcuM15, author = {Alptekin K{\"{u}}p{\c{c}}{\"{u}} and Payman Mohassel}, title = {Fast Optimistically Fair Cut-and-Choose 2PC}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1209}, year = {2015}, url = {http://eprint.iacr.org/2015/1209}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KupcuM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KurosawaO15, author = {Kaoru Kurosawa and Yasuhiro Ohtaki}, title = {How to Construct UC-Secure Searchable Symmetric Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {251}, year = {2015}, url = {http://eprint.iacr.org/2015/251}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KurosawaO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KursaweP15, author = {Klaus Kursawe and Christiane Peters}, title = {Structural Weaknesses in the Open Smart Grid Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {88}, year = {2015}, url = {http://eprint.iacr.org/2015/088}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KursaweP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KustersT15, author = {Ralf K{\"{u}}sters and Tomasz Truderung}, title = {Security Analysis of Re-Encryption {RPC} Mix Nets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {295}, year = {2015}, url = {http://eprint.iacr.org/2015/295}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KustersT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KustersTBBKM15, author = {Ralf K{\"{u}}sters and Tomasz Truderung and Bernhard Beckert and Daniel Bruns and Michael Kirsten and Martin Mohr}, title = {A Hybrid Approach for Proving Noninterference of Java Programs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {438}, year = {2015}, url = {http://eprint.iacr.org/2015/438}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KustersTBBKM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LaarhovenW15, author = {Thijs Laarhoven and Benne de Weger}, title = {Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {211}, year = {2015}, url = {http://eprint.iacr.org/2015/211}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LaarhovenW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Labrande15, author = {Hugo Labrande}, title = {Computing Jacobi's {\textbackslash}theta in quasi-linear time}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1104}, year = {2015}, url = {http://eprint.iacr.org/2015/1104}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Labrande15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LachariteP15, author = {Marie{-}Sarah Lacharit{\'{e}} and Kenneth G. Paterson}, title = {A note on the optimality of frequency analysis vs. {\(\mathscr{l}\)}\({}_{\mbox{p}}\)-optimization}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1158}, year = {2015}, url = {http://eprint.iacr.org/2015/1158}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LachariteP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LaiDLWZ15, author = {Junzuo Lai and Robert H. Deng and Shengli Liu and Jian Weng and Yunlei Zhao}, title = {Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {297}, year = {2015}, url = {http://eprint.iacr.org/2015/297}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LaiDLWZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LaineL15, author = {Kim Laine and Kristin E. Lauter}, title = {Key Recovery for {LWE} in Polynomial Time}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {176}, year = {2015}, url = {http://eprint.iacr.org/2015/176}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LaineL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LaingMPS15, author = {Thalia M. Laing and Keith M. Martin and Maura B. Paterson and Douglas R. Stinson}, title = {Localised Multisecret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {922}, year = {2015}, url = {http://eprint.iacr.org/2015/922}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LaingMPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LallemandN15, author = {Virginie Lallemand and Mar{\'{\i}}a Naya{-}Plasencia}, title = {Cryptanalysis of Full Sprout}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {232}, year = {2015}, url = {http://eprint.iacr.org/2015/232}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LallemandN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LampeS15, author = {Rodolphe Lampe and Yannick Seurin}, title = {Tweakable Blockciphers with Asymptotically Optimal Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {182}, year = {2015}, url = {http://eprint.iacr.org/2015/182}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LampeS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LashermesFG15, author = {Ronan Lashermes and Jacques J. A. Fournier and Louis Goubin}, title = {Inverting the Final exponentiation of Tate pairings on ordinary elliptic curves using faults}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {152}, year = {2015}, url = {http://eprint.iacr.org/2015/152}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LashermesFG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LaudP15, author = {Peeter Laud and Alisa Pankova}, title = {Transformation-Based Outsourcing of Linear Equation Systems over Real Numbers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {322}, year = {2015}, url = {http://eprint.iacr.org/2015/322}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LaudP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LaudP15a, author = {Peeter Laud and Alisa Pankova}, title = {Privacy-preserving Frequent Itemset Mining for Sparse and Dense Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {671}, year = {2015}, url = {http://eprint.iacr.org/2015/671}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LaudP15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LaudP15b, author = {Peeter Laud and Alisa Pankova}, title = {Preprocessing-Based Verification of Multiparty Protocols with Honest Majority}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {674}, year = {2015}, url = {http://eprint.iacr.org/2015/674}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LaudP15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LauridsenR15, author = {Martin M. Lauridsen and Christian Rechberger}, title = {Linear Distinguishers in the Key-less Setting: Application to {PRESENT}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {908}, year = {2015}, url = {http://eprint.iacr.org/2015/908}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LauridsenR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LauterLN15, author = {Kristin E. Lauter and Adriana L{\'{o}}pez{-}Alt and Michael Naehrig}, title = {Private Computation on Encrypted Genomic Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {133}, year = {2015}, url = {http://eprint.iacr.org/2015/133}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LauterLN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeMT15, author = {Duc{-}Phong Le and Nadia El Mrabet and Chik How Tan}, title = {On near prime-order elliptic curves with small embedding degrees}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {835}, year = {2015}, url = {http://eprint.iacr.org/2015/835}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeMT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeTT15, author = {Duc{-}Phong Le and Chik How Tan and Michael Tunstall}, title = {Randomizing the Montgomery Powering Ladder}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {657}, year = {2015}, url = {http://eprint.iacr.org/2015/657}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeTT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeanderMR15, author = {Gregor Leander and Brice Minaud and Sondre R{\o}njom}, title = {A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {68}, year = {2015}, url = {http://eprint.iacr.org/2015/068}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeanderMR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LecomteFM15, author = {Maxime Lecomte and Jacques Fournier and Philippe Maurine}, title = {Extraction of intrinsic structure for Hardware Trojan detection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {912}, year = {2015}, url = {http://eprint.iacr.org/2015/912}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LecomteFM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lee15, author = {Jooyoung Lee}, title = {Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {205}, year = {2015}, url = {http://eprint.iacr.org/2015/205}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Lee15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeLPY15, author = {Kwangsu Lee and Dong Hoon Lee and Jong Hwan Park and Moti Yung}, title = {{CCA} Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1202}, year = {2015}, url = {http://eprint.iacr.org/2015/1202}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeLPY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeP15, author = {Kwangsu Lee and Jong Hwan Park}, title = {Identity-Based Revocation from Subset Difference Methods under Simple Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {921}, year = {2015}, url = {http://eprint.iacr.org/2015/921}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LenstraW15, author = {Arjen K. Lenstra and Benjamin Wesolowski}, title = {A random zoo: sloth, unicorn, and trx}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {366}, year = {2015}, url = {http://eprint.iacr.org/2015/366}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LenstraW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeontiadisEOM15, author = {Iraklis Leontiadis and Kaoutar Elkhiyaoui and Melek {\"{O}}nen and Refik Molva}, title = {{PUDA} - Privacy and Unforgeability for Data Aggregation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {562}, year = {2015}, url = {http://eprint.iacr.org/2015/562}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeontiadisEOM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LepointT15, author = {Tancr{\`{e}}de Lepoint and Mehdi Tibouchi}, title = {Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in {PIR}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {12}, year = {2015}, url = {http://eprint.iacr.org/2015/012}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LepointT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lerner15, author = {Emil Lerner}, title = {The Uniform Distribution of Sequences Generated by Iteration of Polynomials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {296}, year = {2015}, url = {http://eprint.iacr.org/2015/296}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lerner15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeslieSS15, author = {David S. Leslie and Chris Sherfield and Nigel P. Smart}, title = {Threshold FlipThem: When the winner does not need to take all}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {784}, year = {2015}, url = {http://eprint.iacr.org/2015/784}, timestamp = {Wed, 12 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeslieSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Leurent15, author = {Ga{\"{e}}tan Leurent}, title = {Differential and Linear Cryptanalysis of {ARX} with Partitioning - Application to {FEAL} and Chaskey}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {968}, year = {2015}, url = {http://eprint.iacr.org/2015/968}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Leurent15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeurentW15, author = {Ga{\"{e}}tan Leurent and Lei Wang}, title = {The Sum Can Be Weaker Than Each Part}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {70}, year = {2015}, url = {http://eprint.iacr.org/2015/070}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeurentW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Leventi-PeetzP15, author = {Anastasia{-}Maria Leventi{-}Peetz and J.{-}V. Peetz}, title = {Generating S-Box Multivariate Quadratic Equation Systems And Estimating Algebraic Attack Resistance Aided By SageMath}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {589}, year = {2015}, url = {http://eprint.iacr.org/2015/589}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Leventi-PeetzP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Li15, author = {Xin Li}, title = {Non-Malleable Condensers for Arbitrary Min-Entropy, and Almost Optimal Protocols for Privacy Amplification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {21}, year = {2015}, url = {http://eprint.iacr.org/2015/021}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Li15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiJL15, author = {Ming Li and Yupeng Jiang and Dongdai Lin}, title = {A Group-theory Method to The Cycle Structures of Feedback Shift Registers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {357}, year = {2015}, url = {http://eprint.iacr.org/2015/357}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiJL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiL15, author = {Ming Li and Dongdai Lin}, title = {De Bruijn Sequences from Nonlinear Feedback Shift Registers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {667}, year = {2015}, url = {http://eprint.iacr.org/2015/667}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiSLSJ15, author = {Jingwei Li and Anna Cinzia Squicciarini and Dan Lin and Smitha Sundareswaran and Chunfu Jia}, title = {MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {379}, year = {2015}, url = {http://eprint.iacr.org/2015/379}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiSLSJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiW15, author = {Jing Li and Licheng Wang}, title = {Noise-free Symmetric Fully Homomorphic Encryption based on noncommutative rings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {641}, year = {2015}, url = {http://eprint.iacr.org/2015/641}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiWL15, author = {Ming Li and Mingxing Wang and Dongdai Lin}, title = {De Bruijn Sequences from Symmetric Shift Registers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1079}, year = {2015}, url = {http://eprint.iacr.org/2015/1079}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiWL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiWXXS15, author = {Fenghua Li and Yanchao Wang and Rongna Xie and Jinbo Xiong and Fangfang Shan}, title = {A Novel Cyberspace-Oriented Access Control Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {637}, year = {2015}, url = {http://eprint.iacr.org/2015/637}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiWXXS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiYR15, author = {Gefei Li and Yuval Yarom and Damith Chinthana Ranasinghe}, title = {Exploiting Transformations of the Galois Configuration to Improve Guess-and-Determine Attacks on NFSRs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1045}, year = {2015}, url = {http://eprint.iacr.org/2015/1045}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiYR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiZFV15, author = {Zhenqi Li and Bin Zhang and Junfeng Fan and Ingrid Verbauwhede}, title = {A New Model for Error-Tolerant Side-Channel Cube Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {447}, year = {2015}, url = {http://eprint.iacr.org/2015/447}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiZFV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertPJY15, author = {Beno{\^{\i}}t Libert and Thomas Peters and Marc Joye and Moti Yung}, title = {Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound {QA-NIZK} Proofs and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {242}, year = {2015}, url = {http://eprint.iacr.org/2015/242}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LibertPJY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertPY15, author = {Beno{\^{\i}}t Libert and Thomas Peters and Moti Yung}, title = {Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {743}, year = {2015}, url = {http://eprint.iacr.org/2015/743}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LibertPY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertS15, author = {Beno{\^{\i}}t Libert and Damien Stehl{\'{e}}}, title = {Fully Secure Functional Encryption for Inner Products, from Standard Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {608}, year = {2015}, url = {http://eprint.iacr.org/2015/608}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LibertS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LimbasiyaD15, author = {Trupil Limbasiya and Nishant Doshi}, title = {{AN} {ENHANCED} {BIOMETRIC} {BASED} {REMOTE} {USER} {AUTHENTICATION} {SCHEME} {USING} {SMART} {CARD}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {587}, year = {2015}, url = {http://eprint.iacr.org/2015/587}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LimbasiyaD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinPL15, author = {Zhiqiang Lin and Dingyi Pei and Dongdai Lin}, title = {Construction of Transition Matrices for Binary FCSRs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1181}, year = {2015}, url = {http://eprint.iacr.org/2015/1181}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinPL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinPST15, author = {Huijia Lin and Rafael Pass and Karn Seth and Sidharth Telang}, title = {Output-Compressing Randomized Encodings and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {720}, year = {2015}, url = {http://eprint.iacr.org/2015/720}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinPST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinW15, author = {Li Lin and Wenling Wu}, title = {Improved Meet-in-the-Middle Distinguisher on Feistel Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {51}, year = {2015}, url = {http://eprint.iacr.org/2015/051}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LinW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinW15a, author = {Li Lin and Wenling Wu}, title = {Meet-in-the-Middle Attacks on Reduced-Round Midori-64}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1165}, year = {2015}, url = {http://eprint.iacr.org/2015/1165}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LinW15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LindellPSY15, author = {Yehuda Lindell and Benny Pinkas and Nigel P. Smart and Avishay Yanai}, title = {Efficient Constant Round Multi-Party Computation Combining {BMR} and {SPDZ}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {523}, year = {2015}, url = {http://eprint.iacr.org/2015/523}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LindellPSY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LindellR15, author = {Yehuda Lindell and Ben Riva}, title = {Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {987}, year = {2015}, url = {http://eprint.iacr.org/2015/987}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LindellR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LingNW15, author = {San Ling and Khoa Nguyen and Huaxiong Wang}, title = {Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-based}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {14}, year = {2015}, url = {http://eprint.iacr.org/2015/014}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LingNW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiptonOZ15, author = {Richard J. Lipton and Rafail Ostrovsky and Vassilis Zikas}, title = {Provable Virus Detection: Using the Uncertainty Principle to Protect Against Malware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {728}, year = {2015}, url = {http://eprint.iacr.org/2015/728}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiptonOZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Liu15, author = {Dongxi Liu}, title = {Practical Fully Homomorphic Encryption without Noise Reduction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {468}, year = {2015}, url = {http://eprint.iacr.org/2015/468}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Liu15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuAP15, author = {Jian Liu and N. Asokan and Benny Pinkas}, title = {Secure Deduplication of Encrypted Data without Additional Independent Servers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {455}, year = {2015}, url = {http://eprint.iacr.org/2015/455}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuAP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuGR15, author = {Jia Liu and Saqib A. Kakvi and Bogdan Warinschi}, title = {Extractable Witness Encryption and Timed-Release Encryption from Bitcoin}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {482}, year = {2015}, url = {http://eprint.iacr.org/2015/482}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuGR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuMC15, author = {Jian Liu and Sihem Mesnager and Lusheng Chen}, title = {On the Diffusion Property of Iterated Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {873}, year = {2015}, url = {http://eprint.iacr.org/2015/873}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuMC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuMC15a, author = {Jian Liu and Sihem Mesnager and Lusheng Chen}, title = {Secret Sharing Schemes with General Access Structures (Full version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1139}, year = {2015}, url = {http://eprint.iacr.org/2015/1139}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuMC15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuP15, author = {Shengli Liu and Kenneth G. Paterson}, title = {Simulation-based Selective Opening {CCA} Security for {PKE} from Key Encapsulation Mechanisms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {10}, year = {2015}, url = {http://eprint.iacr.org/2015/010}, timestamp = {Sun, 26 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LiuP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuV15, author = {Tianren Liu and Vinod Vaikuntanathan}, title = {On Basing Private Information Retrieval on NP-Hardness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1061}, year = {2015}, url = {http://eprint.iacr.org/2015/1061}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuW15, author = {Zhen Liu and Duncan S. Wong}, title = {Traceable {CP-ABE} on Prime Order Groups: Fully Secure and Fully Collusion-resistant Blackbox Traceable}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {850}, year = {2015}, url = {http://eprint.iacr.org/2015/850}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuZC15, author = {Chang Liu and Liehuang Zhu and Jinjun Chen}, title = {Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on Cloud}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {349}, year = {2015}, url = {http://eprint.iacr.org/2015/349}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuZC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LochterW15, author = {Manfred Lochter and Andreas Wiemers}, title = {Twist Insecurity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {577}, year = {2015}, url = {http://eprint.iacr.org/2015/577}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LochterW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lu15, author = {Jiqiang Lu}, title = {On the Security of the {COPA} and Marble Authenticated Encryption Algorithms against (Almost) Universal Forgery Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {79}, year = {2015}, url = {http://eprint.iacr.org/2015/079}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lu15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuO15, author = {Steve Lu and Rafail Ostrovsky}, title = {Black-Box Parallel Garbled {RAM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1068}, year = {2015}, url = {http://eprint.iacr.org/2015/1068}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LuO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuZL15, author = {Yang Lu and Quanling Zhang and Jiguo Li}, title = {Cryptanalysis of Three Certificate-Based Authenticated Key Agreement Protocols and a Secure Construction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {256}, year = {2015}, url = {http://eprint.iacr.org/2015/256}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuZL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LueksAHV15, author = {Wouter Lueks and Gergely Alp{\'{a}}r and Jaap{-}Henk Hoepman and Pim Vullers}, title = {Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {237}, year = {2015}, url = {http://eprint.iacr.org/2015/237}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LueksAHV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuoFFDKL15, author = {Pei Luo and Yunsi Fei and Xin Fang and A. Adam Ding and David R. Kaeli and Miriam Leeser}, title = {Side-Channel Analysis of MAC-Keccak Hardware Implementations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {411}, year = {2015}, url = {http://eprint.iacr.org/2015/411}, timestamp = {Wed, 20 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LuoFFDKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuoZFD15, author = {Pei Luo and Liwei Zhang and Yunsi Fei and A. Adam Ding}, title = {Towards Secure Cryptographic Software Implementation Against Side-Channel Power Analysis Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {717}, year = {2015}, url = {http://eprint.iacr.org/2015/717}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuoZFD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuuSPSH15, author = {Loi Luu and Ratul Saha and Inian Parameshwaran and Prateek Saxena and Aquinas Hobor}, title = {On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {155}, year = {2015}, url = {http://eprint.iacr.org/2015/155}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuuSPSH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuuTKS15, author = {Loi Luu and Jason Teutsch and Raghav Kulkarni and Prateek Saxena}, title = {Demystifying incentives in the consensus computer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {702}, year = {2015}, url = {http://eprint.iacr.org/2015/702}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuuTKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LychevJBN15, author = {Robert Lychev and Samuel Jero and Alexandra Boldyreva and Cristina Nita{-}Rotaru}, title = {How Secure and Quick is QUIC? Provable Security and Performance Analyses}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {582}, year = {2015}, url = {http://eprint.iacr.org/2015/582}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LychevJBN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LyubashevskyP15, author = {Vadim Lyubashevsky and Thomas Prest}, title = {Quadratic Time, Linear Space Algorithms for Gram-Schmidt Orthogonalization and Gaussian Sampling in Structured Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {257}, year = {2015}, url = {http://eprint.iacr.org/2015/257}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LyubashevskyP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaLHL15, author = {Bingke Ma and Bao Li and Ronglin Hao and Xiaoqian Li}, title = {Cryptanalysis of Reduced-Round Whirlwind (Full Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {568}, year = {2015}, url = {http://eprint.iacr.org/2015/568}, timestamp = {Thu, 08 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaLHL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaLHL15a, author = {Bingke Ma and Bao Li and Ronglin Hao and Xiaoqian Li}, title = {Improved (Pseudo) Preimage Attacks on Reduced-Round {GOST} and Gr{\o}stl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions (Full Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {569}, year = {2015}, url = {http://eprint.iacr.org/2015/569}, timestamp = {Thu, 08 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaLHL15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaQ15, author = {Xiaoshuang Ma and Kexin Qiao}, title = {Related-Key Rectangle Attack on Round-reduced \emph{Khudra} Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {533}, year = {2015}, url = {http://eprint.iacr.org/2015/533}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaQ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaeneV15, author = {Pieter Maene and Ingrid Verbauwhede}, title = {Single-Cycle Implementations of Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {658}, year = {2015}, url = {http://eprint.iacr.org/2015/658}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaeneV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaesLSW15, author = {Roel Maes and Vincent van der Leest and Erik van der Sluis and Frans M. J. Willems}, title = {Secure Key Generation from Biased PUFs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {583}, year = {2015}, url = {http://eprint.iacr.org/2015/583}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaesLSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaffeiMRS15, author = {Matteo Maffei and Giulio Malavolta and Manuel Reinert and Dominique Schr{\"{o}}der}, title = {Privacy and Access Control for Outsourced Personal Records}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {224}, year = {2015}, url = {http://eprint.iacr.org/2015/224}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaffeiMRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MahmoodyM15, author = {Mohammad Mahmoody and Ameer Mohammed}, title = {On the Power of Hierarchical Identity-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {815}, year = {2015}, url = {http://eprint.iacr.org/2015/815}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MahmoodyM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MahmoodyMN15, author = {Mohammad Mahmoody and Ameer Mohammed and Soheil Nematihaji}, title = {More on Impossibility of Virtual Black-Box Obfuscation in Idealized Models}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {632}, year = {2015}, url = {http://eprint.iacr.org/2015/632}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MahmoodyMN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MahmoodyMNPS15, author = {Mohammad Mahmoody and Ameer Mohammed and Soheil Nematihaji and Rafael Pass and Abhi Shelat}, title = {Lower Bounds on Assumptions behind Indistinguishability Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1062}, year = {2015}, url = {http://eprint.iacr.org/2015/1062}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MahmoodyMNPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Maitin-Shepard15, author = {Jeremy Maitin{-}Shepard}, title = {Optimal software-implemented Itoh-Tsujii inversion for GF(2\({}^{\mbox{m}}\))}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {28}, year = {2015}, url = {http://eprint.iacr.org/2015/028}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Maitin-Shepard15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Maitra15, author = {Subhamoy Maitra}, title = {Chosen {IV} Cryptanalysis on Reduced Round ChaCha and Salsa}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {698}, year = {2015}, url = {http://eprint.iacr.org/2015/698}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Maitra15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Maitra15a, author = {Subhamoy Maitra}, title = {The Index j in {RC4} is not Pseudo-random due to Non-existence of Finney Cycle}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1043}, year = {2015}, url = {http://eprint.iacr.org/2015/1043}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Maitra15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaitraPM15, author = {Subhamoy Maitra and Goutam Paul and Willi Meier}, title = {Salsa20 Cryptanalysis: New Moves and Revisiting Old Styles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {217}, year = {2015}, url = {http://eprint.iacr.org/2015/217}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaitraPM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaitraPP15, author = {Arpita Maitra and Goutam Paul and Asim K. Pal}, title = {Fairness in Secure Two-Party Computation with Rational Players}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1071}, year = {2015}, url = {http://eprint.iacr.org/2015/1071}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaitraPP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaitraSBD15, author = {Subhamoy Maitra and Santanu Sarkar and Anubhab Baksi and Pramit Dey}, title = {Key Recovery from State Information of Sprout: Application to Cryptanalysis and Fault Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {236}, year = {2015}, url = {http://eprint.iacr.org/2015/236}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaitraSBD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MalhotraCBG15, author = {Aanchal Malhotra and Isaac E. Cohen and Erik Brakke and Sharon Goldberg}, title = {Attacking the Network Time Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1020}, year = {2015}, url = {http://eprint.iacr.org/2015/1020}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MalhotraCBG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Malik15, author = {Muhammad Yasir Malik}, title = {Comprehensive Efficient Implementations of {ECC} on C54xx Family of Low-cost Digital Signal Processors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {115}, year = {2015}, url = {http://eprint.iacr.org/2015/115}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Malik15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MalisaKC15, author = {Luka Malisa and Kari Kostiainen and Srdjan Capkun}, title = {Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {709}, year = {2015}, url = {http://eprint.iacr.org/2015/709}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MalisaKC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MandalSGP15, author = {Bimal Mandal and Pantelimon Stanica and Sugata Gangopadhyay and Enes Pasalic}, title = {An analysis of the {C} class of bent functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {588}, year = {2015}, url = {http://eprint.iacr.org/2015/588}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MandalSGP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MarcedoneWS15, author = {Antonio Marcedone and Zikai Wen and Elaine Shi}, title = {Secure Dating with Four or Fewer Cards}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1031}, year = {2015}, url = {http://eprint.iacr.org/2015/1031}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MarcedoneWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MarianoLB15, author = {Artur Mariano and Thijs Laarhoven and Christian H. Bischof}, title = {Parallel (probable) lock-free HashSieve: a practical sieving algorithm for the {SVP}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {41}, year = {2015}, url = {http://eprint.iacr.org/2015/041}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MarianoLB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Martens15, author = {Patrick M{\"{a}}rtens}, title = {Practical Compact E-Cash with Arbitrary Wallet Size}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {86}, year = {2015}, url = {http://eprint.iacr.org/2015/086}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Martens15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Martens15a, author = {Patrick M{\"{a}}rtens}, title = {Practical Divisible E-Cash}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {318}, year = {2015}, url = {http://eprint.iacr.org/2015/318}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Martens15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MartinOOS15, author = {Daniel P. Martin and Jonathan F. O'Connell and Elisabeth Oswald and Martijn Stam}, title = {How to Enumerate Your Keys Accurately and Efficiently After a Side Channel Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {689}, year = {2015}, url = {http://eprint.iacr.org/2015/689}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MartinOOS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Matsumoto15, author = {Ryutaroh Matsumoto}, title = {Strong Security of the Strongly Multiplicative Ramp Secret Sharing based on Algebraic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {662}, year = {2015}, url = {http://eprint.iacr.org/2015/662}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Matsumoto15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Mattsson15, author = {John Preu{\ss} Mattsson}, title = {Authentication Key Recovery in Galois/Counter Mode {(GCM)}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {477}, year = {2015}, url = {http://eprint.iacr.org/2015/477}, timestamp = {Fri, 22 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Mattsson15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Mavromati15, author = {Chrysanthi Mavromati}, title = {Key-recovery attacks against the {MAC} algorithm Chaskey}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {811}, year = {2015}, url = {http://eprint.iacr.org/2015/811}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Mavromati15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MayberryBN15, author = {Travis Mayberry and Erik{-}Oliver Blass and Guevara Noubir}, title = {Multi-User Oblivious {RAM} Secure Against Malicious Servers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {121}, year = {2015}, url = {http://eprint.iacr.org/2015/121}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MayberryBN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MazonkaTM15, author = {Oleg Mazonka and Nektarios Georgios Tsoutsos and Michail Maniatakos}, title = {Cryptoleq: {A} Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1226}, year = {2015}, url = {http://eprint.iacr.org/2015/1226}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MazonkaTM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/McCannEO15, author = {David McCann and Kerstin Eder and Elisabeth Oswald}, title = {Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {832}, year = {2015}, url = {http://eprint.iacr.org/2015/832}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/McCannEO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/McCorrySCH15, author = {Patrick McCorry and Siamak Fayyaz Shahandashti and Dylan Clarke and Feng Hao}, title = {Authenticated Key Exchange over Bitcoin}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {308}, year = {2015}, url = {http://eprint.iacr.org/2015/308}, timestamp = {Tue, 10 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/McCorrySCH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MelisACK15, author = {Luca Melis and Hassan Jameel Asghar and Emiliano De Cristofaro and Mohamed Ali K{\^{a}}afar}, title = {Private Processing of Outsourced Network Functions: Feasibility and Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {949}, year = {2015}, url = {http://eprint.iacr.org/2015/949}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MelisACK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MeloniH15, author = {Nicolas M{\'{e}}loni and M. Anwar Hasan}, title = {Random Digit Representation of Integers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {622}, year = {2015}, url = {http://eprint.iacr.org/2015/622}, timestamp = {Thu, 06 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/MeloniH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MendelNS15, author = {Florian Mendel and Tomislav Nad and Martin Schl{\"{a}}ffer}, title = {Improving Local Collisions: New Attacks on Reduced {SHA-256}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {350}, year = {2015}, url = {http://eprint.iacr.org/2015/350}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MendelNS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MengKNK15, author = {Xianrui Meng and Seny Kamara and Kobbi Nissim and George Kollios}, title = {{GRECS:} Graph Encryption for Approximate Shortest Distance Queries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {266}, year = {2015}, url = {http://eprint.iacr.org/2015/266}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MengKNK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Mennink15, author = {Bart Mennink}, title = {Optimally Secure Tweakable Blockciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {363}, year = {2015}, url = {http://eprint.iacr.org/2015/363}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Mennink15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Mennink15a, author = {Bart Mennink}, title = {{XPX:} Generalized Tweakable Even-Mansour with Improved Security Guarantees}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {476}, year = {2015}, url = {http://eprint.iacr.org/2015/476}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Mennink15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MenninkP15, author = {Bart Mennink and Bart Preneel}, title = {On the Impact of Known-Key Attacks on Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {909}, year = {2015}, url = {http://eprint.iacr.org/2015/909}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MenninkP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MenninkRV15, author = {Bart Mennink and Reza Reyhanitabar and Damian Viz{\'{a}}r}, title = {Security of Full-State Keyed and Duplex Sponge: Applications to Authenticated Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {541}, year = {2015}, url = {http://eprint.iacr.org/2015/541}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MenninkRV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Mesnager15, author = {Sihem Mesnager}, title = {A note on constructions of bent functions from involutions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {982}, year = {2015}, url = {http://eprint.iacr.org/2015/982}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Mesnager15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Mesnager15a, author = {Sihem Mesnager}, title = {Linear codes with few weights from weakly regular bent functions based on a generic construction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1103}, year = {2015}, url = {http://eprint.iacr.org/2015/1103}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Mesnager15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MicciancioW15, author = {Daniele Micciancio and Michael Walter}, title = {Practical, Predictable Lattice Basis Reduction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1123}, year = {2015}, url = {http://eprint.iacr.org/2015/1123}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MicciancioW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MieleL15, author = {Andrea Miele and Arjen K. Lenstra}, title = {Efficient ephemeral elliptic curve cryptographic keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {647}, year = {2015}, url = {http://eprint.iacr.org/2015/647}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MieleL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MihajloskaGS15, author = {Hristina Mihajloska and Danilo Gligoroski and Simona Samardjiska}, title = {Reviving the Idea of Incremental Cryptography for the Zettabyte era Use case: Incremental Hash Functions Based on {SHA-3}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1028}, year = {2015}, url = {http://eprint.iacr.org/2015/1028}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MihajloskaGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MillerJ15, author = {Andrew Miller and Rob Jansen}, title = {Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {469}, year = {2015}, url = {http://eprint.iacr.org/2015/469}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MillerJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MinaudDFK15, author = {Brice Minaud and Patrick Derbez and Pierre{-}Alain Fouque and Pierre Karpman}, title = {Key-Recovery Attacks on {ASASA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {516}, year = {2015}, url = {http://eprint.iacr.org/2015/516}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MinaudDFK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MinaudF15, author = {Brice Minaud and Pierre{-}Alain Fouque}, title = {Cryptanalysis of the New Multilinear Map over the Integers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {941}, year = {2015}, url = {http://eprint.iacr.org/2015/941}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MinaudF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MinaudS15, author = {Brice Minaud and Yannick Seurin}, title = {The Iterated Random Permutation Problem with Applications to Cascade Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {504}, year = {2015}, url = {http://eprint.iacr.org/2015/504}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MinaudS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Minematsu15, author = {Kazuhiko Minematsu}, title = {Authenticated Encryption without Tag Expansion (or, How to Accelerate {AERO)}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {738}, year = {2015}, url = {http://eprint.iacr.org/2015/738}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Minematsu15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MinematsuI15, author = {Kazuhiko Minematsu and Tetsu Iwata}, title = {Tweak-Length Extension for Tweakable Blockciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {888}, year = {2015}, url = {http://eprint.iacr.org/2015/888}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MinematsuI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoatazB15, author = {Tarik Moataz and Erik{-}Oliver Blass}, title = {Oblivious Substring Search with Updates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {722}, year = {2015}, url = {http://eprint.iacr.org/2015/722}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoatazB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoatazBM15, author = {Tarik Moataz and Erik{-}Oliver Blass and Travis Mayberry}, title = {Constant Communication {ORAM} without Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1116}, year = {2015}, url = {http://eprint.iacr.org/2015/1116}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoatazBM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoatazMB15, author = {Tarik Moataz and Travis Mayberry and Erik{-}Oliver Blass}, title = {Constant Communication Oblivious {RAM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {570}, year = {2015}, url = {http://eprint.iacr.org/2015/570}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoatazMB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MohasselRZ15, author = {Payman Mohassel and Mike Rosulek and Ye Zhang}, title = {Fast and Secure Three-party Computation: The Garbled Circuit Approach}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {931}, year = {2015}, url = {http://eprint.iacr.org/2015/931}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MohasselRZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MohsenP15, author = {Rabih Mohsen and Alexandre Miranda Pinto}, title = {Algorithmic Information Theory for Obfuscation Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {793}, year = {2015}, url = {http://eprint.iacr.org/2015/793}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MohsenP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoodyP15, author = {Dustin Moody and Ray A. Perlner}, title = {Vulnerabilities of "McEliece in the World of Escher"}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {966}, year = {2015}, url = {http://eprint.iacr.org/2015/966}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoodyP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoradiH15, author = {Amir Moradi and Gesine Hinterw{\"{a}}lder}, title = {Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {199}, year = {2015}, url = {http://eprint.iacr.org/2015/199}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoradiH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoradiW15, author = {Amir Moradi and Alexander Wild}, title = {Assessment of Hiding the Higher-Order Leakages in Hardware - what are the achievements versus overheads?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {597}, year = {2015}, url = {http://eprint.iacr.org/2015/597}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoradiW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Morales-Sandoval15, author = {Miguel Morales{-}Sandoval and Arturo Diaz{-}Perez}, title = {Novel algorithms and hardware architectures for Montgomery Multiplication over GF(p)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {696}, year = {2015}, url = {http://eprint.iacr.org/2015/696}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Morales-Sandoval15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Morawiecki15, author = {Pawel Morawiecki}, title = {Practical Attacks on the Round-reduced {PRINCE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {245}, year = {2015}, url = {http://eprint.iacr.org/2015/245}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Morawiecki15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Morawiecki15a, author = {Pawel Morawiecki}, title = {Malicious Keccak}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1085}, year = {2015}, url = {http://eprint.iacr.org/2015/1085}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Morawiecki15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MorawieckiPSS15, author = {Pawel Morawiecki and Josef Pieprzyk and Michal Straus and Marian Srebrny}, title = {Applications of Key Recovery Cube-attack-like}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1009}, year = {2015}, url = {http://eprint.iacr.org/2015/1009}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MorawieckiPSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MorchonRST15, author = {Oscar Garc{\'{\i}}a Morchon and Ronald Rietman and Igor E. Shparlinski and Ludo Tolhuizen}, title = {Results on polynomial interpolation with mixed modular operations and unknown moduli}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1003}, year = {2015}, url = {http://eprint.iacr.org/2015/1003}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MorchonRST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MorchonRSTT15, author = {Oscar Garc{\'{\i}}a Morchon and Ronald Rietman and Sahil Sharma and Ludo Tolhuizen and Jose Luis Torre{-}Arce}, title = {A comprehensive and lightweight security architecture to secure the IoT throughout the lifecycle of a device based on {HIMMO}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {454}, year = {2015}, url = {http://eprint.iacr.org/2015/454}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MorchonRSTT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MorilloRV15, author = {Paz Morillo and Carla R{\`{a}}fols and Jorge L. Villar}, title = {Matrix Computational Assumptions in Multilinear Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {353}, year = {2015}, url = {http://eprint.iacr.org/2015/353}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MorilloRV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoritaS0HI15, author = {Hiraku Morita and Jacob C. N. Schuldt and Takahiro Matsuda and Goichiro Hanaoka and Tetsu Iwata}, title = {On the Security of the Schnorr Signature Scheme and {DSA} against Related-Key Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1135}, year = {2015}, url = {http://eprint.iacr.org/2015/1135}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoritaS0HI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Mosca15, author = {Michele Mosca}, title = {Cybersecurity in an era with quantum computers: will we be ready?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1075}, year = {2015}, url = {http://eprint.iacr.org/2015/1075}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Mosca15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Mouha15, author = {Nicky Mouha}, title = {The Design Space of Lightweight Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {303}, year = {2015}, url = {http://eprint.iacr.org/2015/303}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Mouha15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Mouha15a, author = {Nicky Mouha}, title = {Chaskey: a {MAC} Algorithm for Microcontrollers - Status Update and Proposal of Chaskey-12 -}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1182}, year = {2015}, url = {http://eprint.iacr.org/2015/1182}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Mouha15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MouhaL15, author = {Nicky Mouha and Atul Luykx}, title = {Multi-Key Security: The Even-Mansour Construction Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {101}, year = {2015}, url = {http://eprint.iacr.org/2015/101}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MouhaL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MourouzisSCC15, author = {Theodosis Mourouzis and Guangyan Song and Nicolas T. Courtois and Michalis Christofi}, title = {Advanced Differential Cryptanalysis of Reduced-Round {SIMON64/128} Using Large-Round Statistical Distinguishers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {481}, year = {2015}, url = {http://eprint.iacr.org/2015/481}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MourouzisSCC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MovahediSZ15, author = {Mahnush Movahedi and Jared Saia and Mahdi Zamani}, title = {Secure Multi-Party Shuffling}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {664}, year = {2015}, url = {http://eprint.iacr.org/2015/664}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MovahediSZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MukherjeeW15, author = {Pratyay Mukherjee and Daniel Wichs}, title = {Two Round {MPC} from {LWE} via Multi-Key {FHE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {345}, year = {2015}, url = {http://eprint.iacr.org/2015/345}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MukherjeeW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MurtaghV15, author = {Jack Murtagh and Salil P. Vadhan}, title = {The Complexity of Computing the Optimal Composition of Differential Privacy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1057}, year = {2015}, url = {http://eprint.iacr.org/2015/1057}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MurtaghV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nagao15, author = {Koh{-}ichi Nagao}, title = {Complexity of {ECDLP} under the First Fall Degree Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {984}, year = {2015}, url = {http://eprint.iacr.org/2015/984}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nagao15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nagao15a, author = {Koh{-}ichi Nagao}, title = {Polynomial time reduction from 3SAT to solving low first fall degree multivariable cubic equations system}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {985}, year = {2015}, url = {http://eprint.iacr.org/2015/985}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nagao15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nagao15b, author = {Koh{-}ichi Nagao}, title = {Bit Coincidence Mining Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {986}, year = {2015}, url = {http://eprint.iacr.org/2015/986}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nagao15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nandi15, author = {Mridul Nandi}, title = {On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {414}, year = {2015}, url = {http://eprint.iacr.org/2015/414}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nandi15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nandi15a, author = {Mridul Nandi}, title = {Revisiting Security Claims of {XLS} and {COPA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {444}, year = {2015}, url = {http://eprint.iacr.org/2015/444}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nandi15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nandi15b, author = {Mridul Nandi}, title = {{XLS} is not a Strong Pseudorandom Permutation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {445}, year = {2015}, url = {http://eprint.iacr.org/2015/445}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nandi15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nandi15c, author = {Mridul Nandi}, title = {A Simple Proof of a Distinguishing Bound of Iterated Uniform Random Permutation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {579}, year = {2015}, url = {http://eprint.iacr.org/2015/579}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nandi15c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NandiP15, author = {Mridul Nandi and Tapas Pandit}, title = {Generic Conversions from {CPA} to {CCA} secure Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {457}, year = {2015}, url = {http://eprint.iacr.org/2015/457}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NandiP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NandiP15a, author = {Mridul Nandi and Tapas Pandit}, title = {On the Power of Pair Encodings: Frameworks for Predicate Cryptographic Primitives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {955}, year = {2015}, url = {http://eprint.iacr.org/2015/955}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NandiP15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaorY15, author = {Moni Naor and Eylon Yogev}, title = {Bloom Filters in Adversarial Environments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {543}, year = {2015}, url = {http://eprint.iacr.org/2015/543}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaorY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Naveed15, author = {Muhammad Naveed}, title = {The Fallacy of Composition of Oblivious {RAM} and Searchable Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {668}, year = {2015}, url = {http://eprint.iacr.org/2015/668}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Naveed15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NayakKMS15, author = {Kartik Nayak and Srijan Kumar and Andrew Miller and Elaine Shi}, title = {Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {796}, year = {2015}, url = {http://eprint.iacr.org/2015/796}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NayakKMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NevesT15, author = {Samuel Neves and Mehdi Tibouchi}, title = {Degenerate Curve Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1233}, year = {2015}, url = {http://eprint.iacr.org/2015/1233}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NevesT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NguyenZZ15, author = {Phong Q. Nguyen and Jiang Zhang and Zhenfeng Zhang}, title = {Simpler Efficient Group Signatures from Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {20}, year = {2015}, url = {http://eprint.iacr.org/2015/020}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NguyenZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NielsenR15, author = {Jesper Buus Nielsen and Samuel Ranellucci}, title = {Foundations of Reactive Garbling Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {693}, year = {2015}, url = {http://eprint.iacr.org/2015/693}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NielsenR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NikolicWW15, author = {Ivica Nikolic and Lei Wang and Shuang Wu}, title = {Cryptanalysis of Round-Reduced {LED}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {429}, year = {2015}, url = {http://eprint.iacr.org/2015/429}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NikolicWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NingDCW15, author = {Jianting Ning and Xiaolei Dong and Zhenfu Cao and Lifei Wei}, title = {Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {613}, year = {2015}, url = {http://eprint.iacr.org/2015/613}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NingDCW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NishimakiW15, author = {Ryo Nishimaki and Daniel Wichs}, title = {Watermarking Cryptographic Programs Against Arbitrary Removal Strategies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {344}, year = {2015}, url = {http://eprint.iacr.org/2015/344}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NishimakiW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NishimakiWZ15, author = {Ryo Nishimaki and Daniel Wichs and Mark Zhandry}, title = {Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {750}, year = {2015}, url = {http://eprint.iacr.org/2015/750}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NishimakiWZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NishimakiX15, author = {Ryo Nishimaki and Keita Xagawa}, title = {Verifiably Encrypted Signatures with Short Keys based on the Decisional Linear Problem and Obfuscation for Encrypted {VES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {248}, year = {2015}, url = {http://eprint.iacr.org/2015/248}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NishimakiX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NitajR15, author = {Abderrahmane Nitaj and Tajjeeddine Rachidi}, title = {Factoring {RSA} moduli with weak prime factors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {398}, year = {2015}, url = {http://eprint.iacr.org/2015/398}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NitajR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NitajR15a, author = {Abderrahmane Nitaj and Tajjeeddine Rachidi}, title = {New attacks on {RSA} with Moduli N=p\({}^{\mbox{rq}}\)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {399}, year = {2015}, url = {http://eprint.iacr.org/2015/399}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NitajR15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NitajR15b, author = {Abderrahmane Nitaj and Tajjeeddine Rachidi}, title = {Lattice Attacks on the {DGHV} Homomorphic Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1145}, year = {2015}, url = {http://eprint.iacr.org/2015/1145}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NitajR15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NiwaOMI15, author = {Yuichi Niwa and Keisuke Ohashi and Kazuhiko Minematsu and Tetsu Iwata}, title = {{GCM} Security Bounds Reconsidered}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {214}, year = {2015}, url = {http://eprint.iacr.org/2015/214}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NiwaOMI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Noether15, author = {Shen Noether}, title = {Ring SIgnature Confidential Transactions for Monero}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1098}, year = {2015}, url = {http://eprint.iacr.org/2015/1098}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Noether15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NojoumianS15, author = {Mehrdad Nojoumian and Douglas R. Stinson}, title = {Sequential Secret Sharing as a New Hierarchical Access Structure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {403}, year = {2015}, url = {http://eprint.iacr.org/2015/403}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NojoumianS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NouraC15, author = {Hassan Noura and Damien Courouss{\'{e}}}, title = {{HLDCA-WSN:} Homomorphic Lightweight Data Confidentiality Algorithm for Wireless Sensor Network}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {928}, year = {2015}, url = {http://eprint.iacr.org/2015/928}, timestamp = {Thu, 09 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/NouraC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OFlynnC15, author = {Colin O'Flynn and Zhizhang Chen}, title = {Power Analysis Attacks against {IEEE} 802.15.4 Nodes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {529}, year = {2015}, url = {http://eprint.iacr.org/2015/529}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OFlynnC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OdeluDG15, author = {Vanga Odelu and Ashok Kumar Das and Adrijit Goswami}, title = {An Efficient {CP-ABE} with Constant Size Secret Keys using {ECC} for Lightweight Devices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {841}, year = {2015}, url = {http://eprint.iacr.org/2015/841}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OdeluDG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OhataK0HM15, author = {Satsuya Ohata and Yutaka Kawai and Takahiro Matsuda and Goichiro Hanaoka and Kanta Matsuura}, title = {Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {112}, year = {2015}, url = {http://eprint.iacr.org/2015/112}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OhataK0HM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OkamotoPWW15, author = {Tatsuaki Okamoto and Krzysztof Pietrzak and Brent Waters and Daniel Wichs}, title = {New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {869}, year = {2015}, url = {http://eprint.iacr.org/2015/869}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OkamotoPWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OkumuraSYT15, author = {Shinya Okumura and Shingo Sugiyama and Masaya Yasuda and Tsuyoshi Takagi}, title = {Security Analysis of Cryptosystems Using Short Generators over Ideal Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1004}, year = {2015}, url = {http://eprint.iacr.org/2015/1004}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OkumuraSYT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OlejnikACD15, author = {Lukasz Olejnik and Gunes Acar and Claude Castelluccia and Claudia D{\'{\i}}az}, title = {The leaking battery: {A} privacy analysis of the {HTML5} Battery Status {API}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {616}, year = {2015}, url = {http://eprint.iacr.org/2015/616}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OlejnikACD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OlimidP15, author = {Ruxandra F. Olimid and Anat Paskin{-}Cherniavsky}, title = {On Cryptographic Anonimity and Unpredicatbility in Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1234}, year = {2015}, url = {http://eprint.iacr.org/2015/1234}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OlimidP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OliynykovGKRKGB15, author = {Roman Oliynykov and Ivan Gorbenko and Oleksandr Kazymyrov and Victor Ruzhentsev and Oleksandr Kuznetsov and Yurii Gorbenko and Artem Boiko and Oleksandr Dyrda and Viktor Dolgov and Andrii Pushkaryov}, title = {A New Standard of Ukraine: The Kupyna Hash Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {885}, year = {2015}, url = {http://eprint.iacr.org/2015/885}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OliynykovGKRKGB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OliynykovGKRKGD15, author = {Roman Oliynykov and Ivan Gorbenko and Oleksandr Kazymyrov and Victor Ruzhentsev and Oleksandr Kuznetsov and Yurii Gorbenko and Oleksandr Dyrda and Viktor Dolgov and Andrii Pushkaryov and Ruslan Mordvinov and Dmytro Kaidalov}, title = {A New Encryption Standard of Ukraine: The Kalyna Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {650}, year = {2015}, url = {http://eprint.iacr.org/2015/650}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OliynykovGKRKGD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OrenSW15, author = {Yossef Oren and Ahmad{-}Reza Sadeghi and Christian Wachsmann}, title = {On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {148}, year = {2015}, url = {http://eprint.iacr.org/2015/148}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OrenSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OstrovskyRS15, author = {Rafail Ostrovsky and Silas Richelson and Alessandra Scafuro}, title = {Round-Optimal Black-Box Two-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {553}, year = {2015}, url = {http://eprint.iacr.org/2015/553}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OstrovskyRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OzenCK15, author = {Mehmet {\"{O}}zen and Mustafa {\c{C}}oban and Ferhat Karako{\c{c}}}, title = {A Guess-and-Determine Attack on Reduced-Round Khudra and Weak Keys of Full Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1163}, year = {2015}, url = {http://eprint.iacr.org/2015/1163}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OzenCK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OzturkDSS15, author = {Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and Yarkin Dor{\"{o}}z and Berk Sunar and Erkay Savas}, title = {Accelerating Somewhat Homomorphic Evaluation using FPGAs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {294}, year = {2015}, url = {http://eprint.iacr.org/2015/294}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OzturkDSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PagourtzisPS15, author = {Aris Pagourtzis and Giorgos Panagiotakos and Dimitris Sakavalas}, title = {Reliable Message Transmission under Partial Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {243}, year = {2015}, url = {http://eprint.iacr.org/2015/243}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PagourtzisPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PanditPB15, author = {Tapas Pandit and Sumit Kumar Pandey and Rana Barua}, title = {Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and {IND-CCA2} Security in Adaptive-Predicates Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {555}, year = {2015}, url = {http://eprint.iacr.org/2015/555}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PanditPB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PanethS15, author = {Omer Paneth and Amit Sahai}, title = {On the Equivalence of Obfuscation and Multilinear Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {791}, year = {2015}, url = {http://eprint.iacr.org/2015/791}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PanethS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ParkPAFG15, author = {Sunoo Park and Krzysztof Pietrzak and Albert Kwon and Jo{\"{e}}l Alwen and Georg Fuchsbauer and Peter Gazi}, title = {Spacemint: {A} Cryptocurrency Based on Proofs of Space}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {528}, year = {2015}, url = {http://eprint.iacr.org/2015/528}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ParkPAFG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Parno15, author = {Bryan Parno}, title = {A Note on the Unsoundness of vnTinyRAM's {SNARK}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {437}, year = {2015}, url = {http://eprint.iacr.org/2015/437}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Parno15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PassS15, author = {Rafael Pass and Abhi Shelat}, title = {Impossibility of {VBB} Obfuscation with Ideal Constant-Degree Graded Encodings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {383}, year = {2015}, url = {http://eprint.iacr.org/2015/383}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PassS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatersonSSW15, author = {Kenneth G. Paterson and Jacob C. N. Schuldt and Dale L. Sibborn and Hoeteck Wee}, title = {Security Against Related Randomness Attacks via Reconstructive Extractors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {892}, year = {2015}, url = {http://eprint.iacr.org/2015/892}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatersonSSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatranabisCM15, author = {Sikhar Patranabis and Abhishek Chakraborty and Debdeep Mukhopadhyay}, title = {Fault Tolerant Infective Countermeasure for {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {493}, year = {2015}, url = {http://eprint.iacr.org/2015/493}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatranabisCM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatranabisCMC15, author = {Sikhar Patranabis and Abhishek Chakraborty and Debdeep Mukhopadhyay and P. P. Chakrabarti}, title = {Using State Space Encoding To Counter Biased Fault Attacks on {AES} Countermeasures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {806}, year = {2015}, url = {http://eprint.iacr.org/2015/806}, timestamp = {Mon, 07 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/PatranabisCMC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatranabisRM15, author = {Sikhar Patranabis and Debapriya Basu Roy and Debdeep Mukhopadhyay}, title = {Using Tweaks To Design Fault Resistant Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {932}, year = {2015}, url = {http://eprint.iacr.org/2015/932}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatranabisRM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatranabisSM15, author = {Sikhar Patranabis and Yash Shrivastava and Debdeep Mukhopadhyay}, title = {Dynamic Key-Aggregate Cryptosystem on Elliptic Curves for Online Data Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {923}, year = {2015}, url = {http://eprint.iacr.org/2015/923}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatranabisSM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatsakisKB15, author = {Constantinos Patsakis and Panayiotis Kotzanikolaou and M{\'{e}}lanie Bouroche}, title = {Private Proximity Testing on Steroids: An NTRU-based Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {917}, year = {2015}, url = {http://eprint.iacr.org/2015/917}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatsakisKB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PaulR15, author = {Goutam Paul and Souvik Ray}, title = {On Data Complexity of Distinguishing Attacks vs. Message Recovery Attacks on Stream Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1174}, year = {2015}, url = {http://eprint.iacr.org/2015/1174}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PaulR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PavlovskiB15, author = {Chris Pavlovski and Colin Boyd}, title = {Microcash: Efficient Off-Line Small Payments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {635}, year = {2015}, url = {http://eprint.iacr.org/2015/635}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PavlovskiB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Peikert15, author = {Chris Peikert}, title = {A Decade of Lattice Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {939}, year = {2015}, url = {http://eprint.iacr.org/2015/939}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Peikert15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Pellet-MaryS15, author = {Alice Pellet{-}Mary and Damien Stehl{\'{e}}}, title = {Cryptanalysis of Gu's ideal multilinear map}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {759}, year = {2015}, url = {http://eprint.iacr.org/2015/759}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Pellet-MaryS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PettaiL15, author = {Martin Pettai and Peeter Laud}, title = {Combining Differential Privacy and Secure Multiparty Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {598}, year = {2015}, url = {http://eprint.iacr.org/2015/598}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PettaiL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PeyrinS15, author = {Thomas Peyrin and Yannick Seurin}, title = {Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1049}, year = {2015}, url = {http://eprint.iacr.org/2015/1049}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PeyrinS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Piedra15, author = {Antonio de la Piedra}, title = {Efficient implementation of AND, {OR} and {NOT} operators for ABCs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1117}, year = {2015}, url = {http://eprint.iacr.org/2015/1117}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Piedra15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PietrzakS15, author = {Krzysztof Pietrzak and Maciej Skorski}, title = {The Chain Rule for {HILL} Pseudoentropy, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {599}, year = {2015}, url = {http://eprint.iacr.org/2015/599}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PietrzakS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Pinkas0SZ15, author = {Benny Pinkas and Thomas Schneider and Gil Segev and Michael Zohner}, title = {Phasing: Private Set Intersection using Permutation-based Hashing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {634}, year = {2015}, url = {http://eprint.iacr.org/2015/634}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Pinkas0SZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PoetteringS15, author = {Bertram Poettering and Dale L. Sibborn}, title = {Cold Boot Attacks in the Discrete Logarithm Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {57}, year = {2015}, url = {http://eprint.iacr.org/2015/057}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PoetteringS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PointchevalS15, author = {David Pointcheval and Olivier Sanders}, title = {Short Randomizable Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {525}, year = {2015}, url = {http://eprint.iacr.org/2015/525}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PointchevalS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PointchevalST15, author = {David Pointcheval and Olivier Sanders and Jacques Traor{\'{e}}}, title = {Cut Down the Tree to Achieve Constant Complexity in Divisible E-Cash}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {972}, year = {2015}, url = {http://eprint.iacr.org/2015/972}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PointchevalST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PopaZB15, author = {Raluca Ada Popa and Nickolai Zeldovich and Hari Balakrishnan}, title = {Guidelines for Using the CryptDB System Securely}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {979}, year = {2015}, url = {http://eprint.iacr.org/2015/979}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PopaZB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PoppelmannNPM15, author = {Thomas P{\"{o}}ppelmann and Michael Naehrig and Andrew Putnam and Adri{\'{a}}n Mac{\'{\i}}as}, title = {Accelerating Homomorphic Evaluation on Reconfigurable Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {631}, year = {2015}, url = {http://eprint.iacr.org/2015/631}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PoppelmannNPM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PoppelmannOG15, author = {Thomas P{\"{o}}ppelmann and Tobias Oder and Tim G{\"{u}}neysu}, title = {Speed Records for Ideal Lattice-Based Cryptography on {AVR}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {382}, year = {2015}, url = {http://eprint.iacr.org/2015/382}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PoppelmannOG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Pornin15, author = {Thomas Pornin}, title = {Optimizing {MAKWA} on {GPU} and {CPU}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {678}, year = {2015}, url = {http://eprint.iacr.org/2015/678}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Pornin15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PullsP15, author = {Tobias Pulls and Roel Peeters}, title = {Balloon: {A} Forward-Secure Append-Only Persistent Authenticated Data Structure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {7}, year = {2015}, url = {http://eprint.iacr.org/2015/007}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PullsP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PullsP15a, author = {Tobias Pulls and Roel Peeters}, title = {Insynd: Privacy-Preserving Secure One-Way Messaging Using Balloons}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {150}, year = {2015}, url = {http://eprint.iacr.org/2015/150}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PullsP15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/QaradaghiA15, author = {Thuraya M. Qaradaghi and Newroz N. Abdulrazaq}, title = {Comparison Between Irreducible and Separable Goppa Code in McEliece Cryptosystem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1050}, year = {2015}, url = {http://eprint.iacr.org/2015/1050}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/QaradaghiA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/QiaoHS15, author = {Kexin Qiao and Lei Hu and Siwei Sun}, title = {Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {902}, year = {2015}, url = {http://eprint.iacr.org/2015/902}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/QiaoHS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/QinL15, author = {Baodong Qin and Shengli Liu}, title = {Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {272}, year = {2015}, url = {http://eprint.iacr.org/2015/272}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/QinL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/QinLYDC15, author = {Baodong Qin and Shengli Liu and Tsz Hon Yuen and Robert H. Deng and Kefei Chen}, title = {Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {3}, year = {2015}, url = {http://eprint.iacr.org/2015/003}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/QinLYDC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/QuSLS15, author = {Haipeng Qu and Peng Shang and Xi Jun Lin and Lin Sun}, title = {Cryptanalysis of {A} Privacy-Preserving Smart Metering Scheme Using Linkable Anonymous Credential}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1066}, year = {2015}, url = {http://eprint.iacr.org/2015/1066}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/QuSLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/QuagliaS15, author = {Elizabeth A. Quaglia and Ben Smyth}, title = {Constructing secret, verifiable auction schemes from election schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1204}, year = {2015}, url = {http://eprint.iacr.org/2015/1204}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/QuagliaS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RK15, author = {B. R. Purushothama and Nishat Koti}, title = {On the Security of an Efficient Group Key Agreement Scheme for MANETs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {177}, year = {2015}, url = {http://eprint.iacr.org/2015/177}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Rafols15, author = {Carla R{\`{a}}fols}, title = {Stretching Groth-Sahai: {NIZK} Proofs of Partial Satisfiability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {50}, year = {2015}, url = {http://eprint.iacr.org/2015/050}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Rafols15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RashidiSF15, author = {Bahram Rashidi and Sayed Masoud Sayedi and Reza Rezaeian Farashahi}, title = {Efficient and Low-complexity Hardware Architecture of Gaussian Normal Basis Multiplication over GF(2m) for Elliptic Curve Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1109}, year = {2015}, url = {http://eprint.iacr.org/2015/1109}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RashidiSF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RauzyMGN15, author = {Pablo Rauzy and Martin Moreau and Sylvain Guilley and Zakaria Najm}, title = {A Generic Countermeasure Against Fault Injection Attacks on Asymmetric Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {882}, year = {2015}, url = {http://eprint.iacr.org/2015/882}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RauzyMGN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Raykov15, author = {Pavel Raykov}, title = {Broadcast from Minicast Secure Against General Adversaries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {352}, year = {2015}, url = {http://eprint.iacr.org/2015/352}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Raykov15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RebeiroM15, author = {Chester Rebeiro and Debdeep Mukhopadhyay}, title = {A Formal Analysis of Prefetching in Profiled Cache-Timing Attacks on Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1191}, year = {2015}, url = {http://eprint.iacr.org/2015/1191}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RebeiroM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RenesCB15, author = {Joost Renes and Craig Costello and Lejla Batina}, title = {Complete addition formulas for prime order elliptic curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1060}, year = {2015}, url = {http://eprint.iacr.org/2015/1060}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RenesCB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Reparaz15, author = {Oscar Reparaz}, title = {A note on the security of Higher-Order Threshold Implementations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1}, year = {2015}, url = {http://eprint.iacr.org/2015/001}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Reparaz15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ReparazBNGV15, author = {Oscar Reparaz and Beg{\"{u}}l Bilgin and Svetla Nikova and Benedikt Gierlichs and Ingrid Verbauwhede}, title = {Consolidating masking schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {719}, year = {2015}, url = {http://eprint.iacr.org/2015/719}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ReparazBNGV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ReparazRVV15, author = {Oscar Reparaz and Sujoy Sinha Roy and Frederik Vercauteren and Ingrid Verbauwhede}, title = {A masked ring-LWE implementation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {724}, year = {2015}, url = {http://eprint.iacr.org/2015/724}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ReparazRVV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ReyhanitabarVV15, author = {Reza Reyhanitabar and Serge Vaudenay and Damian Viz{\'{a}}r}, title = {Boosting {OMD} for Almost Free Authentication of Associated Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {302}, year = {2015}, url = {http://eprint.iacr.org/2015/302}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ReyhanitabarVV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ReyzinY15, author = {Leonid Reyzin and Sophia Yakoubov}, title = {Efficient Asynchronous Accumulators for Distributed {PKI}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {718}, year = {2015}, url = {http://eprint.iacr.org/2015/718}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ReyzinY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RishakaniDSMP15, author = {Akbar Mahmoodi Rishakani and Seyed Mojtaba Dehnavi and M. R. Mirzaee Shamsabad and Hamidreza Maimani and Einollah Pasha}, title = {Statistical Properties of Multiplication mod 2\({}^{\mbox{n}}\)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {201}, year = {2015}, url = {http://eprint.iacr.org/2015/201}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RishakaniDSMP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RiviereNRDBS15, author = {Lionel Rivi{\`{e}}re and Zakaria Najm and Pablo Rauzy and Jean{-}Luc Danger and Julien Bringer and Laurent Sauvage}, title = {High Precision Fault Injections on the Instruction Cache of ARMv7-M Architectures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {147}, year = {2015}, url = {http://eprint.iacr.org/2015/147}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RiviereNRDBS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RobissonASHWBP15, author = {Bruno Robisson and Michel Agoyan and Patrick Soquet and S{\'{e}}bastien Le Henaff and Franck Wajsb{\"{u}}rt and Pirouz Bazargan{-}Sabet and Guillaume Phan}, title = {Smart Security Management in Secure Devices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {670}, year = {2015}, url = {http://eprint.iacr.org/2015/670}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RobissonASHWBP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RocheAC15, author = {Daniel S. Roche and Adam J. Aviv and Seung Geol Choi}, title = {A Practical Oblivious Map Data Structure with Secure Deletion and History Independence}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1126}, year = {2015}, url = {http://eprint.iacr.org/2015/1126}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RocheAC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RocheACY15, author = {Daniel S. Roche and Daniel Apon and Seung Geol Choi and Arkady Yerukhimovich}, title = {{POPE:} Partial Order-Preserving Encoding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1106}, year = {2015}, url = {http://eprint.iacr.org/2015/1106}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RocheACY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Rogaway15, author = {Phillip Rogaway}, title = {The Moral Character of Cryptographic Work}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1162}, year = {2015}, url = {http://eprint.iacr.org/2015/1162}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Rogaway15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.