Search dblp for Publications

export results for "toc:db/journals/iacr/iacr2015.bht:"

more than 1000 matches, exporting first 1000 hits only!

 download as .bib file

@article{DBLP:journals/iacr/0001ACFGHMW15,
  author       = {Muhammad Naveed and
                  Erman Ayday and
                  Ellen Wright Clayton and
                  Jacques Fellay and
                  Carl A. Gunter and
                  Jean{-}Pierre Hubaux and
                  Bradley A. Malin and
                  XiaoFeng Wang},
  title        = {Privacy in the Genomic Era},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {563},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/563},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001ACFGHMW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001AH15,
  author       = {Shota Yamada and
                  Nuttapong Attrapadung and
                  Goichiro Hanaoka},
  title        = {Conversions among Several Classes of Predicate Encryption and Their
                  Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {431},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/431},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001AH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001FPPS15,
  author       = {Abhishek Banerjee and
                  Georg Fuchsbauer and
                  Chris Peikert and
                  Krzysztof Pietrzak and
                  Sophie Stevens},
  title        = {Key-Homomorphic Constrained Pseudorandom Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {180},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/180},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001FPPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001JMN15,
  author       = {Jian Guo and
                  J{\'{e}}r{\'{e}}my Jean and
                  Nicky Mouha and
                  Ivica Nikolic},
  title        = {More Rounds, Less Security?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {484},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/484},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001JMN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001JNQSS15,
  author       = {Jian Guo and
                  J{\'{e}}r{\'{e}}my Jean and
                  Ivica Nikolic and
                  Kexin Qiao and
                  Yu Sasaki and
                  Siang Meng Sim},
  title        = {Invariant Subspace Attack Against Full Midori64},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1189},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1189},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001JNQSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001SRGKV15,
  author       = {Zhe Liu and
                  Hwajeong Seo and
                  Sujoy Sinha Roy and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Howon Kim and
                  Ingrid Verbauwhede},
  title        = {Efficient Ring-LWE Encryption on 8-bit {AVR} Processors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {410},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/410},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/0001SRGKV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001SWW15,
  author       = {Jian Guo and
                  Yu Sasaki and
                  Lei Wang and
                  Shuang Wu},
  title        = {Cryptanalysis of HMAC/NMAC-Whirlpool},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {149},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/149},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001SWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001SWWW15,
  author       = {Jian Guo and
                  Yu Sasaki and
                  Lei Wang and
                  Meiqin Wang and
                  Long Wen},
  title        = {Equivalent Key Recovery Attacks against {HMAC} and {NMAC} with Whirlpool
                  Reduced to 7 Rounds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {75},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/075},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001SWWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001WGHV15,
  author       = {Zhe Liu and
                  Husen Wang and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Zhi Hu and
                  Ingrid Verbauwhede},
  title        = {{VLSI} Implementation of Double-Base Scalar Multiplication on a Twisted
                  Edwards Curve with an Efficiently Computable Endomorphism},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {421},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/421},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001WGHV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0002H15,
  author       = {Takahiro Matsuda and
                  Goichiro Hanaoka},
  title        = {Constructing and Understanding Chosen Ciphertext Security via Puncturable
                  Key Encapsulation Mechanisms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {118},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/118},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0002H15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0002H15a,
  author       = {Takahiro Matsuda and
                  Goichiro Hanaoka},
  title        = {An Asymptotically Optimal Method for Converting Bit Encryption to
                  Multi-Bit Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1149},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1149},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0002H15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbadiBMRS15,
  author       = {Mart{\'{\i}}n Abadi and
                  Dan Boneh and
                  Ilya Mironov and
                  Ananth Raghunathan and
                  Gil Segev},
  title        = {Message-Locked Encryption for Lock-Dependent Messages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {440},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/440},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbadiBMRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbarzuaMM15,
  author       = {Rodrigo Abarz{\'{u}}a and
                  Santi Mart{\'{\i}}nez and
                  Valeria Mendoza},
  title        = {Same Value Analysis on Edwards Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {731},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/731},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbarzuaMM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBCP15,
  author       = {Michel Abdalla and
                  Florian Bourse and
                  Angelo De Caro and
                  David Pointcheval},
  title        = {Simple Functional Encryption Schemes for Inner Products},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {17},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/017},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBCP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBF15,
  author       = {Michel Abdalla and
                  Sonia Bela{\"{\i}}d and
                  Pierre{-}Alain Fouque},
  title        = {Leakage-Resilient Symmetric Encryption via Re-keying},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {204},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/204},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBP15,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  David Pointcheval},
  title        = {Tighter Reductions for Forward-Secure Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {196},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/196},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBP15a,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  Alain Passel{\`{e}}gue},
  title        = {An Algebraic Framework for Pseudorandom Functions and Applications
                  to Related-Key Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {554},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/554},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBP15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBP15b,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  Alain Passel{\`{e}}gue},
  title        = {Multilinear and Aggregate Pseudorandom Functions: New Constructions
                  and Improved Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {867},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/867},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBP15b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBPRV15,
  author       = {Michel Abdalla and
                  Sonia Bela{\"{\i}}d and
                  David Pointcheval and
                  Sylvain Ruhault and
                  Damien Vergnaud},
  title        = {Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel
                  Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1219},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1219},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBPRV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdelraheemAAAB15,
  author       = {Mohamed Ahmed Abdelraheem and
                  Javad Alizadeh and
                  Hoda AlKhzaimi and
                  Mohammad Reza Aref and
                  Nasour Bagheri and
                  Praveen Gauravaram},
  title        = {Improved Linear Cryptanalysis of reduced-round {SIMON-32} and {SIMON-48}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {988},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/988},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdelraheemAAAB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdelraheemBBT15,
  author       = {Mohamed Ahmed Abdelraheem and
                  Peter Beelen and
                  Andrey Bogdanov and
                  Elmar Tischhauser},
  title        = {Twisted Polynomials and Forgery Attacks on {GCM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1224},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1224},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdelraheemBBT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdolmalekiBBA15,
  author       = {Behzad Abdolmaleki and
                  Hamidreza Bakhshi and
                  Karim Baghery and
                  Mohammad Reza Aref},
  title        = {Analysis of an {RFID} Authentication Protocol in Accordance with {EPC}
                  Standards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {980},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/980},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdolmalekiBBA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbeDKNO15,
  author       = {Masayuki Abe and
                  Bernardo David and
                  Markulf Kohlweiss and
                  Ryo Nishimaki and
                  Miyako Ohkubo},
  title        = {Tagged One-Time Signatures: Tight Security and Optimal Tag Size},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {311},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/311},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbeDKNO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbeKOT15,
  author       = {Masayuki Abe and
                  Markulf Kohlweiss and
                  Miyako Ohkubo and
                  Mehdi Tibouchi},
  title        = {Fully Structure-Preserving Signatures and Shrinking Commitments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {76},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/076},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbeKOT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbusalahFP15,
  author       = {Hamza Abusalah and
                  Georg Fuchsbauer and
                  Krzysztof Pietrzak},
  title        = {Offline Witness Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {838},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/838},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbusalahFP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AchenbachMR15,
  author       = {Dirk Achenbach and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Jochen Rill},
  title        = {Universally Composable Firewall Architectures using Trusted Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {99},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/099},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AchenbachMR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AdhikariMORSX15,
  author       = {Avishek Adhikari and
                  Kirill Morozov and
                  Satoshi Obana and
                  Partha Sarathi Roy and
                  Kouichi Sakurai and
                  Rui Xu},
  title        = {Efficient Threshold Secret Sharing Schemes Secure against Rushing
                  Cheaters},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1115},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1115},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AdhikariMORSX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AerabiAFGNV15,
  author       = {Ehsan Aerabi and
                  A. Elhadi Amirouche and
                  Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache and
                  Jean Vuillemin},
  title        = {The Conjoined Microprocessor},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {974},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/974},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AerabiAFGNV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AfsharMPR15,
  author       = {Arash Afshar and
                  Payman Mohassel and
                  Benny Pinkas and
                  Ben Riva},
  title        = {Non-Interactive Secure Computation Based on Cut-and-Choose},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {282},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/282},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AfsharMPR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AggarwalA0MPP15,
  author       = {Divesh Aggarwal and
                  Shashank Agrawal and
                  Divya Gupta and
                  Hemanta K. Maji and
                  Omkant Pandey and
                  Manoj Prabhakaran},
  title        = {Optimal Computational Split-state Non-malleable Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1063},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1063},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AggarwalA0MPP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AggarwalG15,
  author       = {Divesh Aggarwal and
                  Alexander Golovnev},
  title        = {A Note on Lower Bounds for Non-interactive Message Authentication
                  Using Weak Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {324},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/324},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AggarwalG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AggarwalHL15,
  author       = {Divesh Aggarwal and
                  Kaave Hosseini and
                  Shachar Lovett},
  title        = {Affine-malleable Extractors, Spectrum Doubling, and Application to
                  Privacy Amplification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1094},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1094},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AggarwalHL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AggarwalKO15,
  author       = {Divesh Aggarwal and
                  Tomasz Kazana and
                  Maciej Obremski},
  title        = {Inception Makes Non-malleable Codes Stronger},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1013},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1013},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AggarwalKO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgievichGKNPRST15,
  author       = {Sergey Agievich and
                  Anastasiya Gorodilova and
                  Nikolay Kolomeec and
                  Svetla Nikova and
                  Bart Preneel and
                  Vincent Rijmen and
                  George Shushuev and
                  Natalia N. Tokareva and
                  Valeriya Vitkup},
  title        = {Problems, solutions and experience of the first international student's
                  Olympiad in cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {534},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/534},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgievichGKNPRST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalC15,
  author       = {Shashank Agrawal and
                  Melissa Chase},
  title        = {A study of Pair Encodings: Predicate Encryption in prime order groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {413},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/413},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalCGS15,
  author       = {Megha Agrawal and
                  Donghoon Chang and
                  Mohona Ghosh and
                  Somitra Kumar Sanadhya},
  title        = {Collision Attack on 4-branch, Type-2 {GFN} based Hash Functions using
                  Sliced Biclique Cryptanalysis Technique},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {234},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/234},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalCGS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalCS15,
  author       = {Megha Agrawal and
                  Donghoon Chang and
                  Somitra Kumar Sanadhya},
  title        = {A New Authenticated Encryption Technique for Handling Long Ciphertexts
                  in Memory Constrained Devices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {331},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/331},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalPD15,
  author       = {Sarita Agrawal and
                  Jay Patel and
                  Manik Lal Das},
  title        = {Pairing Based Mutual Healing in Wireless Sensor Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {538},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/538},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalPD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AhmadianRSA15,
  author       = {Zahra Ahmadian and
                  Shahram Rasoolzadeh and
                  Mahmoud Salmasizadeh and
                  Mohammad Reza Aref},
  title        = {Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of {SIMON}
                  and {KATAN}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {40},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/040},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AhmadianRSA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AkinS15,
  author       = {Ihsan Haluk Akin and
                  Berk Sunar},
  title        = {On the Difficulty of Securing Web Applications using CryptDB},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {82},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/082},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AkinS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AkinyeleGH15,
  author       = {Joseph A. Akinyele and
                  Christina Garman and
                  Susan Hohenberger},
  title        = {Automating Fast and Secure Translations from Type-I to Type-III Pairing
                  Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {290},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/290},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AkinyeleGH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AkshimaCGGS15,
  author       = {Akshima and
                  Donghoon Chang and
                  Mohona Ghosh and
                  Aarushi Goel and
                  Somitra Kumar Sanadhya},
  title        = {Single Key Recovery Attacks on 9-round Kalyna-128/256 and Kalyna-256/512},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1227},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1227},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AkshimaCGGS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlSabahG15,
  author       = {Mashael AlSabah and
                  Ian Goldberg},
  title        = {Performance and Security Improvements for Tor: {A} Survey},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {235},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/235},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlSabahG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlTawyAY15,
  author       = {Riham AlTawy and
                  Ahmed Abdelkhalek and
                  Amr M. Youssef},
  title        = {A Meet-in-the-Middle Attack on Reduced-Round Kalyna-b/2b},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {762},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/762},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlTawyAY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlTawyDY15,
  author       = {Riham AlTawy and
                  Onur Duman and
                  Amr M. Youssef},
  title        = {Fault Analysis of Kuznyechik},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {347},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/347},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlTawyDY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlTawyY15,
  author       = {Riham AlTawy and
                  Amr M. Youssef},
  title        = {Meet in the Middle Attacks on Reduced Round Kuznyechik},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {96},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/096},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlTawyY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Alawatugoda15,
  author       = {Janaka Alawatugoda},
  title        = {Generic Transformation of a CCA2-Secure Public-Key Encryption Scheme
                  to an eCK-Secure Key Exchange Protocol in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1248},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1248},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Alawatugoda15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlawatugodaBS15,
  author       = {Janaka Alawatugoda and
                  Colin Boyd and
                  Douglas Stebila},
  title        = {Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {335},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/335},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AlawatugodaBS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtFHLP15,
  author       = {Martin R. Albrecht and
                  Pooya Farshim and
                  Dennis Hofheinz and
                  Enrique Larraia and
                  Kenneth G. Paterson},
  title        = {Multilinear Maps from Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {780},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/780},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbrechtFHLP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtP15,
  author       = {Martin R. Albrecht and
                  Kenneth G. Paterson},
  title        = {Lucky Microseconds: {A} Timing Attack on Amazon's s2n Implementation
                  of {TLS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1129},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1129},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbrechtP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtPS15,
  author       = {Martin R. Albrecht and
                  Rachel Player and
                  Sam Scott},
  title        = {On the concrete hardness of Learning with Errors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {46},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/046},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbrechtPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AldermanJCC15,
  author       = {James Alderman and
                  Christian Janson and
                  Carlos Cid and
                  Jason Crampton},
  title        = {Hybrid Publicly Verifiable Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {320},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/320},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AldermanJCC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AldermanJMR15,
  author       = {James Alderman and
                  Christian Janson and
                  Keith M. Martin and
                  Sarah Louise Renwick},
  title        = {Extended Functionality in Verifiable Searchable Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {975},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/975},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AldermanJMR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlendalKm15,
  author       = {Gunnar Alendal and
                  Christian Kison and
                  modg},
  title        = {got {HW} crypto? On the (in)security of a Self-Encrypting Drive series},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1002},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1002},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlendalKm15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlkimBBD15,
  author       = {Erdem Alkim and
                  Nina Bindel and
                  Johannes Buchmann and
                  {\"{O}}zg{\"{u}}r Dagdelen},
  title        = {{TESLA:} Tightly-Secure Efficient Signatures from Standard Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {755},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/755},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AlkimBBD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlkimDPS15,
  author       = {Erdem Alkim and
                  L{\'{e}}o Ducas and
                  Thomas P{\"{o}}ppelmann and
                  Peter Schwabe},
  title        = {Post-quantum key exchange - a new hope},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1092},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1092},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlkimDPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AllanBFPY15,
  author       = {Thomas Allan and
                  Billy Bob Brumley and
                  Katrina Falkner and
                  Joop van de Pol and
                  Yuval Yarom},
  title        = {Amplifying Side Channels Through Performance Degradation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1141},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1141},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AllanBFPY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AllibertFGKTR15,
  author       = {Julien Allibert and
                  Benoit Feix and
                  Georges Gagnerot and
                  Ismael Kane and
                  Hugues Thiebeauld and
                  Tiana Razafindralambo},
  title        = {Chicken or the Egg - Computational Data Attacks or Physical Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1086},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1086},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AllibertFGKTR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlmeidaBBD15,
  author       = {Jos{\'{e}} Bacelar Almeida and
                  Manuel Barbosa and
                  Gilles Barthe and
                  Fran{\c{c}}ois Dupressoir},
  title        = {Verifiable side-channel security of cryptographic implementations:
                  constant-time {MEE-CBC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1241},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1241},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlmeidaBBD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AmeriAMS15,
  author       = {Mohammad Hassan Ameri and
                  Maryam Rajabzadeh Asaar and
                  Javad Mohajeri and
                  Mahmoud Salmasizadeh},
  title        = {A Generic Construction for Verifiable Attribute-based Keyword Search
                  Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {915},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/915},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AmeriAMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AminB15,
  author       = {Ruhul Amin and
                  G. P. Biswas},
  title        = {Cryptanalysis of a Markov Chain Based User Authentication Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {656},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/656},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AminB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Anandakumar15,
  author       = {N. Nalla Anandakumar},
  title        = {{SCA} Resistance Analysis of {MAC-PHOTON}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {197},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/197},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Anandakumar15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnanthCCLL15,
  author       = {Prabhanjan Ananth and
                  Yu{-}Chi Chen and
                  Kai{-}Min Chung and
                  Huijia Lin and
                  Wei{-}Kai Lin},
  title        = {Delegating {RAM} Computations with Adaptive Soundness and Privacy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1082},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1082},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnanthCCLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnanthJ15,
  author       = {Prabhanjan Ananth and
                  Abhishek Jain},
  title        = {Indistinguishability Obfuscation from Compact Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {173},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/173},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnanthJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnanthJS15,
  author       = {Prabhanjan Ananth and
                  Abhishek Jain and
                  Amit Sahai},
  title        = {Achieving Compactness Generically: Indistinguishability Obfuscation
                  from Non-Compact Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {730},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/730},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnanthJS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnanthJS15a,
  author       = {Prabhanjan Ananth and
                  Abhishek Jain and
                  Amit Sahai},
  title        = {Indistinguishability Obfuscation with Constant Size Overhead},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1023},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1023},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnanthJS15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnanthJS15b,
  author       = {Prabhanjan Ananth and
                  Abhishek Jain and
                  Amit Sahai},
  title        = {Patchable Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1084},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1084},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnanthJS15b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnanthS15,
  author       = {Prabhanjan Ananth and
                  Amit Sahai},
  title        = {Functional Encryption for Turing Machines},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {776},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/776},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnanthS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndreevaBM15,
  author       = {Elena Andreeva and
                  Andrey Bogdanov and
                  Bart Mennink},
  title        = {Towards Understanding the Known-Key Security of Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {222},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/222},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AndreevaBM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndreevaBPS15,
  author       = {Elena Andreeva and
                  Guy Barwell and
                  Dan Page and
                  Martijn Stam},
  title        = {Turning Online Ciphers Off},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {485},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/485},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AndreevaBPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndrychowiczMP15,
  author       = {Marcin Andrychowicz and
                  Daniel Masny and
                  Edoardo Persichetti},
  title        = {Leakage-Resilient Cryptography over Large Finite Fields: Theory and
                  Practice},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {317},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/317},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AndrychowiczMP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnkeleKR15,
  author       = {Ralph Ankele and
                  Stefan K{\"{o}}lbl and
                  Christian Rechberger},
  title        = {State-recovery analysis of Spritz},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {828},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/828},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnkeleKR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Anokhin15,
  author       = {Mikhail Anokhin},
  title        = {Pseudo-Free Families of Finite Computational Elementary Abelian p-Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1127},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1127},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Anokhin15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AonoHPW15,
  author       = {Yoshinori Aono and
                  Takuya Hayashi and
                  Le Trieu Phong and
                  Lihua Wang},
  title        = {Fast and Secure Linear Regression and Biometric Authentication with
                  Security Update},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {692},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/692},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AonoHPW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AonoPW15,
  author       = {Yoshinori Aono and
                  Le Trieu Phong and
                  Lihua Wang},
  title        = {Hardness Estimation of {LWE} via Band Pruning},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1026},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1026},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AonoPW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ApececheaES15,
  author       = {Gorka Irazoqui Apecechea and
                  Thomas Eisenbarth and
                  Berk Sunar},
  title        = {Systematic Reverse Engineering of Cache Slice Selection in Intel Processors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {690},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/690},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ApececheaES15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AponFL15,
  author       = {Daniel Apon and
                  Xiong Fan and
                  Feng{-}Hao Liu},
  title        = {Bi-Deniable Inner Product Encryption from {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {993},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/993},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AponFL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Applebaum15,
  author       = {Benny Applebaum},
  title        = {The Cryptographic Hardness of Random Local Functions - Survey},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {165},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/165},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Applebaum15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ApplebaumAB15,
  author       = {Benny Applebaum and
                  Jonathan Avron and
                  Christina Brzuska},
  title        = {Arithmetic Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {336},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/336},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ApplebaumAB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ApplebaumB15,
  author       = {Benny Applebaum and
                  Zvika Brakerski},
  title        = {Obfuscating Circuits via Composite-Order Graded Encoding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {25},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/025},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ApplebaumB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ApplebaumR15,
  author       = {Benny Applebaum and
                  Pavel Raykov},
  title        = {From Private Simultaneous Messages to Zero-Information Arthur-Merlin
                  Protocols and Back},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1046},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1046},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ApplebaumR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArabaciKSU15,
  author       = {{\"{O}}znur Arabaci and
                  Mehmet Sabir Kiraz and
                  Isa Sertkaya and
                  Osmanbey Uzunkol},
  title        = {More Efficient Secure Outsourcing Methods for Bilinear Maps},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {960},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/960},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArabaciKSU15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArcherBPP15,
  author       = {David W. Archer and
                  Dan Bogdanov and
                  Benny Pinkas and
                  Pille Pullonen},
  title        = {Maturity and Performance of Programmable Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1039},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1039},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArcherBPP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArmknechtBCGJRS15,
  author       = {Frederik Armknecht and
                  Colin Boyd and
                  Christopher Carr and
                  Kristian Gj{\o}steen and
                  Angela J{\"{a}}schke and
                  Christian A. Reuter and
                  Martin Strand},
  title        = {A Guide to Fully Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1192},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1192},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArmknechtBCGJRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArmknechtM15,
  author       = {Frederik Armknecht and
                  Vasily Mikhalev},
  title        = {On Lightweight Stream Ciphers with Shorter Internal States},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {131},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/131},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArmknechtM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AsaarSA15,
  author       = {Maryam Rajabzadeh Asaar and
                  Mahmoud Salmasizadeh and
                  Mohammad Reza Aref},
  title        = {A Provably Secure Short Signature Scheme from Coding Theory},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {948},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/948},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AsaarSA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AsgharK15,
  author       = {Hassan Jameel Asghar and
                  Mohamed Ali K{\^{a}}afar},
  title        = {When are Identification Protocols with Sparse Challenges Safe? The
                  Case of the Coskun and Herley Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1231},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1231},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AsgharK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AsharovL0Z15,
  author       = {Gilad Asharov and
                  Yehuda Lindell and
                  Thomas Schneider and
                  Michael Zohner},
  title        = {More Efficient Oblivious Transfer Extensions with Security for Malicious
                  Adversaries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {61},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/061},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AsharovL0Z15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AsharovS15,
  author       = {Gilad Asharov and
                  Gil Segev},
  title        = {Limits on the Power of Indistinguishability Obfuscation and Functional
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {341},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/341},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AsharovS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AsharovS15a,
  author       = {Gilad Asharov and
                  Gil Segev},
  title        = {On Constructing One-Way Permutations from Indistinguishability Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {752},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/752},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AsharovS15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ashur15,
  author       = {Tomer Ashur},
  title        = {Improved Linear Trails for the Block Cipher Simon},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {285},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/285},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ashur15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AshurM15,
  author       = {Tomer Ashur and
                  Bart Mennink},
  title        = {Trivial Nonce-Misusing Attack on Pure {OMD}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {175},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/175},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AshurM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseFK15,
  author       = {Giuseppe Ateniese and
                  Antonio Faonio and
                  Seny Kamara},
  title        = {Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs
                  of Storage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {920},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/920},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseFK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseMV15,
  author       = {Giuseppe Ateniese and
                  Bernardo Magri and
                  Daniele Venturi},
  title        = {Subversion-Resilient Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {517},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/517},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseMV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Attrapadung015,
  author       = {Nuttapong Attrapadung and
                  Shota Yamada},
  title        = {Duality in {ABE:} Converting Attribute Based Encryption for Dual Predicate
                  and Dual Policy via Computational Encodings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {157},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/157},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Attrapadung015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Attrapadung15,
  author       = {Nuttapong Attrapadung},
  title        = {Dual System Encryption Framework in Prime-Order Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {390},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/390},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Attrapadung15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AttrapadungH015,
  author       = {Nuttapong Attrapadung and
                  Goichiro Hanaoka and
                  Shota Yamada},
  title        = {A Framework for Identity-Based Encryption with Almost Tight Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {566},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/566},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AttrapadungH015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AubelBN15,
  author       = {Pol Van Aubel and
                  Daniel J. Bernstein and
                  Ruben Niederhagen},
  title        = {Investigating {SRAM} PUFs in large CPUs and GPUs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {760},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/760},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AubelBN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AumassonJN15,
  author       = {Jean{-}Philippe Aumasson and
                  Philipp Jovanovic and
                  Samuel Neves},
  title        = {{NORX8} and {NORX16:} Authenticated Encryption for Low-End Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1154},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1154},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AumassonJN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AysuGMSY15,
  author       = {Aydin Aysu and
                  Ege Gulcan and
                  Daisuke Moriyama and
                  Patrick Schaumont and
                  Moti Yung},
  title        = {End-to-end Design of a PUF-based Privacy Preserving Authentication
                  Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {937},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/937},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AysuGMSY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AysuS15,
  author       = {Aydin Aysu and
                  Patrick Schaumont},
  title        = {Precomputation Methods for Faster and Greener Post-Quantum Cryptography
                  on Emerging Embedded Platforms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {288},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/288},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AysuS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AzarGP15,
  author       = {Pablo Azar and
                  Shafi Goldwasser and
                  Sunoo Park},
  title        = {How to Incentivize Data-Driven Collaboration Among Competing Parties},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {178},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/178},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AzarGP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Azarderakhsh0SK15,
  author       = {Reza Azarderakhsh and
                  Zhe Liu and
                  Hwajeong Seo and
                  Howon Kim},
  title        = {{NEON} PQCryto: Fast and Parallel Ring-LWE Encryption on {ARM} {NEON}
                  Architecture},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1081},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1081},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Azarderakhsh0SK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaderJLS15,
  author       = {Christoph Bader and
                  Tibor Jager and
                  Yong Li and
                  Sven Sch{\"{a}}ge},
  title        = {On the Impossibility of Tight Cryptographic Reductions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {374},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/374},
  timestamp    = {Thu, 16 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaderJLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Badertscher0MRT15,
  author       = {Christian Badertscher and
                  Christian Matt and
                  Ueli Maurer and
                  Phillip Rogaway and
                  Bj{\"{o}}rn Tackmann},
  title        = {Augmented Secure Channels and the Goal of the {TLS} 1.3 Record Layer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {394},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/394},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Badertscher0MRT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Badertscher0MRT15a,
  author       = {Christian Badertscher and
                  Christian Matt and
                  Ueli Maurer and
                  Phillip Rogaway and
                  Bj{\"{o}}rn Tackmann},
  title        = {Robust Authenticated Encryption and the Limits of Symmetric Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {893},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/893},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Badertscher0MRT15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Badrinarayanan015,
  author       = {Saikrishna Badrinarayanan and
                  Divya Gupta and
                  Abhishek Jain and
                  Amit Sahai},
  title        = {Multi-Input Functional Encryption for Unbounded Arity Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1136},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1136},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Badrinarayanan015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadrinarayananM15,
  author       = {Saikrishna Badrinarayanan and
                  Eric Miles and
                  Amit Sahai and
                  Mark Zhandry},
  title        = {Post-Zeroizing Obfuscation: The case of Evasive Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {167},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/167},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadrinarayananM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bagheri15,
  author       = {Nasour Bagheri},
  title        = {Linear Cryptanalysis of Reduced-Round {SIMECK} Variants},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {716},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/716},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bagheri15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BagheriSJ15,
  author       = {Nasour Bagheri and
                  Masoumeh Safkhani and
                  Hoda Jannati},
  title        = {Security Analysis of Niu et al. Authentication and Ownership Management
                  Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {615},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/615},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BagheriSJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaiLLSS15,
  author       = {Shi Bai and
                  Adeline Langlois and
                  Tancr{\`{e}}de Lepoint and
                  Damien Stehl{\'{e}} and
                  Ron Steinfeld},
  title        = {Improved security proofs in lattice-based cryptography: using the
                  R{\'{e}}nyi divergence rather than the statistical distance},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {483},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/483},
  timestamp    = {Tue, 30 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaiLLSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaigneresDFGLR15,
  author       = {Thomas Baign{\`{e}}res and
                  C{\'{e}}cile Delerabl{\'{e}}e and
                  Matthieu Finiasz and
                  Louis Goubin and
                  Tancr{\`{e}}de Lepoint and
                  Matthieu Rivain},
  title        = {Trap Me If You Can - Million Dollar Curve},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1249},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1249},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaigneresDFGLR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaksiMS15,
  author       = {Anubhab Baksi and
                  Subhamoy Maitra and
                  Santanu Sarkar},
  title        = {New Distinguishers for Reduced Round Trivium and Trivia-SC using Cube
                  Testers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {223},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/223},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaksiMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BalaschFG15,
  author       = {Josep Balasch and
                  Sebastian Faust and
                  Benedikt Gierlichs},
  title        = {Inner Product Masking Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {105},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/105},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BalaschFG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BalaschGRV15,
  author       = {Josep Balasch and
                  Benedikt Gierlichs and
                  Oscar Reparaz and
                  Ingrid Verbauwhede},
  title        = {DPA, Bitslicing and Masking at 1 GHz},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {727},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/727},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BalaschGRV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaldimtsiK0Z15,
  author       = {Foteini Baldimtsi and
                  Aggelos Kiayias and
                  Thomas Zacharias and
                  Bingsheng Zhang},
  title        = {Indistinguishable Proofs of Work or Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1230},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1230},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaldimtsiK0Z15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BanciuOW15,
  author       = {Valentina Banciu and
                  Elisabeth Oswald and
                  Carolyn Whitnall},
  title        = {Reliable Information Extraction for Single Trace Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {45},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/045},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BanciuOW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BanciuOW15a,
  author       = {Valentina Banciu and
                  Elisabeth Oswald and
                  Carolyn Whitnall},
  title        = {Exploring the Resilience of Some Lightweight Ciphers Against Pro led
                  Single Trace Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {161},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/161},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BanciuOW15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Banik15,
  author       = {Subhadeep Banik},
  title        = {Some results on Sprout},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {327},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/327},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Banik15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BanikBISHAR15,
  author       = {Subhadeep Banik and
                  Andrey Bogdanov and
                  Takanori Isobe and
                  Kyoji Shibutani and
                  Harunaga Hiwatari and
                  Toru Akishita and
                  Francesco Regazzoni},
  title        = {Midori: {A} Block Cipher for Low Energy (Extended Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1142},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1142},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BanikBISHAR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BanikBR15,
  author       = {Subhadeep Banik and
                  Andrey Bogdanov and
                  Francesco Regazzoni},
  title        = {Exploring Energy Efficiency of Lightweight Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {847},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/847},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BanikBR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BansalCS15,
  author       = {Tarun Kumar Bansal and
                  Donghoon Chang and
                  Somitra Kumar Sanadhya},
  title        = {Sponge based {CCA2} secure asymmetric encryption for arbitrary length
                  message},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {330},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/330},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BansalCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BansarkhaniB15,
  author       = {Rachid El Bansarkhani and
                  Johannes Buchmann},
  title        = {High Performance Lattice-based CCA-secure Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {42},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/042},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BansarkhaniB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaoLL15,
  author       = {Zhenzhen Bao and
                  Peng Luo and
                  Dongdai Lin},
  title        = {Bitsliced Implementations of the PRINCE, {LED} and {RECTANGLE} Block
                  Ciphers on {AVR} 8-bit Microcontrollers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1118},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1118},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaoLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bar-On15,
  author       = {Achiya Bar{-}On},
  title        = {Improved Higher-Order Differential Attacks on {MISTY1}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {367},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/367},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bar-On15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bar-On15a,
  author       = {Achiya Bar{-}On},
  title        = {A 2\({}^{\mbox{70}}\) Attack on the Full {MISTY1}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {746},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/746},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bar-On15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Barbulescu15,
  author       = {Razvan Barbulescu},
  title        = {An appendix for a recent paper of Kim},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1076},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1076},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Barbulescu15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarbulescuGK15,
  author       = {Razvan Barbulescu and
                  Pierrick Gaudry and
                  Thorsten Kleinjung},
  title        = {The Tower Number Field Sieve},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {505},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/505},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarbulescuGK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaronDLO15,
  author       = {Joshua Baron and
                  Karim El Defrawy and
                  Joshua Lampkins and
                  Rafail Ostrovsky},
  title        = {Communication-Optimal Proactive Secret Sharing for Dynamic Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {304},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/304},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaronDLO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarretoCMNGZ15,
  author       = {Paulo S. L. M. Barreto and
                  Craig Costello and
                  Rafael Misoczki and
                  Michael Naehrig and
                  C. C. F. Pereira Geovandro and
                  Gustavo H. M. Zanon},
  title        = {Subgroup security in pairing-based cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {247},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/247},
  timestamp    = {Fri, 06 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarretoCMNGZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BartheBDFG15,
  author       = {Gilles Barthe and
                  Sonia Bela{\"{\i}}d and
                  Fran{\c{c}}ois Dupressoir and
                  Pierre{-}Alain Fouque and
                  Benjamin Gr{\'{e}}goire},
  title        = {Compositional Verification of Higher-Order Masking: Application to
                  a Verifying Masking Compiler},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {506},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/506},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BartheBDFG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BartheBDFGS15,
  author       = {Gilles Barthe and
                  Sonia Bela{\"{\i}}d and
                  Fran{\c{c}}ois Dupressoir and
                  Pierre{-}Alain Fouque and
                  Benjamin Gr{\'{e}}goire and
                  Pierre{-}Yves Strub},
  title        = {Verified Proofs of Higher-Order Masking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {60},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/060},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BartheBDFGS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BartheCLS15,
  author       = {Gilles Barthe and
                  Juan Manuel Crespo and
                  Yassine Lakhnech and
                  Benedikt Schmidt},
  title        = {Mind the Gap: Modular Machine-checked Proofs of One-Round Key Exchange
                  Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {74},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/074},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BartheCLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BartheFFSST15,
  author       = {Gilles Barthe and
                  Edvard Fagerholm and
                  Dario Fiore and
                  Andre Scedrov and
                  Benedikt Schmidt and
                  Mehdi Tibouchi},
  title        = {Strongly-Optimal Structure Preserving Signatures from Type {II} Pairings:
                  Synthesis and Lower Bounds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {19},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/019},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BartheFFSST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarwellPS15,
  author       = {Guy Barwell and
                  Dan Page and
                  Martijn Stam},
  title        = {Rogue Decryption Failures: Reconciling {AE} Robustness Notions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {895},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/895},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarwellPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BattistelloG15,
  author       = {Alberto Battistello and
                  Christophe Giraud},
  title        = {Fault Cryptanalysis of {CHES} 2014 Symmetric Infective Countermeasure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {500},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/500},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BattistelloG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BayerG15,
  author       = {Stephanie Bayer and
                  Jens Groth},
  title        = {Zero-knowledge Argument for Polynomial Evaluation with Application
                  to Blacklists},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {195},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/195},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BayerG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaysalS15,
  author       = {Adnan Baysal and
                  Suhap Sahin},
  title        = {RoadRunneR: {A} Small And Fast Bitslice Block Cipher For Low Cost
                  8-bit Processors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {906},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/906},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaysalS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeaulieuSSTWW15,
  author       = {Ray Beaulieu and
                  Douglas Shors and
                  Jason Smith and
                  Stefan Treatman{-}Clark and
                  Bryan Weeks and
                  Louis Wingers},
  title        = {{SIMON} and {SPECK:} Block Ciphers for the Internet of Things},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {585},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/585},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeaulieuSSTWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeckerDGL15,
  author       = {Anja Becker and
                  L{\'{e}}o Ducas and
                  Nicolas Gama and
                  Thijs Laarhoven},
  title        = {New directions in nearest neighbor searching with applications to
                  lattice sieving},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1128},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1128},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeckerDGL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeckerGJ15,
  author       = {Anja Becker and
                  Nicolas Gama and
                  Antoine Joux},
  title        = {Speeding-up lattice sieving without increasing the memory, using sub-quadratic
                  nearest neighbor search},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {522},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/522},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeckerGJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeckerL15,
  author       = {Anja Becker and
                  Thijs Laarhoven},
  title        = {Efficient (ideal) lattice sieving using cross-polytope {LSH}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {823},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/823},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeckerL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BegelforMV15,
  author       = {Evgeni Begelfor and
                  Stephen D. Miller and
                  Ramarathnam Venkatesan},
  title        = {Non-Abelian Analogs of Lattice Rounding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {24},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/024},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BegelforMV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeierleJLLR15,
  author       = {Christof Beierle and
                  Philipp Jovanovic and
                  Martin M. Lauridsen and
                  Gregor Leander and
                  Christian Rechberger},
  title        = {Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {212},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/212},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeierleJLLR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BelaidCFGKP15,
  author       = {Sonia Bela{\"{\i}}d and
                  Jean{-}S{\'{e}}bastien Coron and
                  Pierre{-}Alain Fouque and
                  Beno{\^{\i}}t G{\'{e}}rard and
                  Jean{-}Gabriel Kammerer and
                  Emmanuel Prouff},
  title        = {Improved Side-Channel Analysis of Finite-Field Multiplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {542},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/542},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BelaidCFGKP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareJK15,
  author       = {Mihir Bellare and
                  Joseph Jaeger and
                  Daniel Kane},
  title        = {Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution
                  Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {808},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/808},
  timestamp    = {Tue, 09 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareJK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareK15,
  author       = {Mihir Bellare and
                  Sriram Keelveedhi},
  title        = {Interactive Message-Locked Encryption and Secure Deduplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {52},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/052},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareL15,
  author       = {Mihir Bellare and
                  Anna Lysyanskaya},
  title        = {Symmetric and Dual PRFs from Standard Assumptions: {A} Generic Validation
                  of an {HMAC} Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1198},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1198},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareS15,
  author       = {Mihir Bellare and
                  Igors Stepanovs},
  title        = {Point-Function Obfuscation: {A} Framework and Generic Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {703},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/703},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareS15a,
  author       = {Mihir Bellare and
                  Douglas Stebila},
  title        = {Double-Authentication-Preventing Signatures from Trapdoor Identification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1157},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1157},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareS15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareST15,
  author       = {Mihir Bellare and
                  Igors Stepanovs and
                  Stefano Tessaro},
  title        = {Contention in Cryptoland: Obfuscation, Leakage and {UCE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {487},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/487},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ben-SassonBDIR15,
  author       = {Eli Ben{-}Sasson and
                  Iddo Bentov and
                  Ivan Damg{\aa}rd and
                  Yuval Ishai and
                  Noga Ron{-}Zewi},
  title        = {On Public Key Encryption from Noisy Codewords},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {572},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/572},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ben-SassonBDIR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ben-ZviBT15,
  author       = {Adi Ben{-}Zvi and
                  Simon R. Blackburn and
                  Boaz Tsaban},
  title        = {A Practical Cryptanalysis of the Algebraic Eraser},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1102},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1102},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ben-ZviBT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenadjilaCD15,
  author       = {Ryad Benadjila and
                  Thomas Calderon and
                  Marion Daubignard},
  title        = {CamlCrush: {A} PKCS{\textbackslash}{\#}11 Filtering Proxy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {63},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/063},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenadjilaCD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenhamoudaBCPV15,
  author       = {Fabrice Benhamouda and
                  Olivier Blazy and
                  C{\'{e}}line Chevalier and
                  David Pointcheval and
                  Damien Vergnaud},
  title        = {New Techniques for SPHFs and Efficient One-Round {PAKE} Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {188},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/188},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenhamoudaBCPV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenhamoudaCPW15,
  author       = {Fabrice Benhamouda and
                  Geoffroy Couteau and
                  David Pointcheval and
                  Hoeteck Wee},
  title        = {Implicit Zero-Knowledge Arguments and Applications to the Malicious
                  Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {246},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/246},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenhamoudaCPW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeninTT15,
  author       = {Almog Benin and
                  Sivan Toledo and
                  Eran Tromer},
  title        = {Secure Association for the Internet of Things},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {940},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/940},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeninTT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BergsmaJS15,
  author       = {Florian Bergsma and
                  Tibor Jager and
                  J{\"{o}}rg Schwenk},
  title        = {One-Round Key Exchange with Strong Security: An Efficient and Generic
                  Construction in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {15},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/015},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BergsmaJS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernhardCGPW15,
  author       = {David Bernhard and
                  V{\'{e}}ronique Cortier and
                  David Galindo and
                  Olivier Pereira and
                  Bogdan Warinschi},
  title        = {A comprehensive analysis of game-based ballot privacy definitions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {255},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/255},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernhardCGPW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernhardFW15,
  author       = {David Bernhard and
                  Marc Fischlin and
                  Bogdan Warinschi},
  title        = {Adaptive Proofs of Knowledge in the Random Oracle Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {648},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/648},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernhardFW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernhardFW15a,
  author       = {David Bernhard and
                  Marc Fischlin and
                  Bogdan Warinschi},
  title        = {On the Hardness of Proving CCA-security of Signed ElGamal},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {649},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/649},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernhardFW15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernhardW15,
  author       = {David Bernhard and
                  Bogdan Warinschi},
  title        = {On Limitations of the Fiat{\-} - Shamir Transformation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {712},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/712},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernhardW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bernstein15,
  author       = {Daniel J. Bernstein},
  title        = {Multi-user Schnorr security, revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {996},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/996},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bernstein15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinCKL15,
  author       = {Daniel J. Bernstein and
                  Chitchanok Chuengsatiansup and
                  David Kohel and
                  Tanja Lange},
  title        = {Twisted Hessian curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {781},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/781},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinCKL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinCS15,
  author       = {Daniel J. Bernstein and
                  Tung Chou and
                  Peter Schwabe},
  title        = {McBits: fast constant-time code-based cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {610},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/610},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinHLN15,
  author       = {Daniel J. Bernstein and
                  Andreas H{\"{u}}lsing and
                  Tanja Lange and
                  Ruben Niederhagen},
  title        = {Bad directions in cryptographic hash functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {151},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/151},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinHLN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinJLSY15,
  author       = {Daniel J. Bernstein and
                  Simon Josefsson and
                  Tanja Lange and
                  Peter Schwabe and
                  Bo{-}Yin Yang},
  title        = {EdDSA for more curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {677},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/677},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinJLSY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinLN15,
  author       = {Daniel J. Bernstein and
                  Tanja Lange and
                  Ruben Niederhagen},
  title        = {Dual {EC:} {A} Standardized Back Door},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {767},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/767},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinLN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinLV15,
  author       = {Daniel J. Bernstein and
                  Tanja Lange and
                  Christine van Vredendaal},
  title        = {Tighter, faster, simpler side-channel security evaluations beyond
                  computing power},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {221},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/221},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinLV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BertoniDPA15,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche},
  title        = {Keccak},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {389},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/389},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BertoniDPA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhargavaM15,
  author       = {Mudit Bhargava and
                  Ken Mai},
  title        = {A High Reliability {PUF} Using Hot Carrier Injection Based Response
                  Reinforcement},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {427},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/427},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BhargavaM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhatSI15,
  author       = {Varsha Bhat and
                  Harsimran Singh and
                  S. R. S. Iyengar},
  title        = {Secure Multi-party Graph Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {817},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/817},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BhatSI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhattacharyaM15,
  author       = {Sarani Bhattacharya and
                  Debdeep Mukhopadhyay},
  title        = {Who watches the watchmen? : Utilizing Performance Monitors for Compromising
                  keys of {RSA} on Intel Platforms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {621},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/621},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BhattacharyaM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhaumikN15,
  author       = {Ritam Bhaumik and
                  Mridul Nandi},
  title        = {Revisiting Turning Online Cipher Off},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {813},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/813},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BhaumikN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhaumikN15a,
  author       = {Ritam Bhaumik and
                  Mridul Nandi},
  title        = {An Inverse-free Single-Keyed Tweakable Enciphering Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1148},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1148},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BhaumikN15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BibakK0T15,
  author       = {Khodakhast Bibak and
                  Bruce M. Kapron and
                  S. Venkatesh and
                  L{\'{a}}szl{\'{o}} T{\'{o}}th},
  title        = {On an almost-universal hash function family with applications to authentication
                  and secrecy codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1187},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1187},
  timestamp    = {Fri, 14 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BibakK0T15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BibakK0TT15,
  author       = {Khodakhast Bibak and
                  Bruce M. Kapron and
                  S. Venkatesh and
                  Roberto Tauraso and
                  L{\'{a}}szl{\'{o}} T{\'{o}}th},
  title        = {Restricted linear congruences},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1186},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1186},
  timestamp    = {Fri, 14 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BibakK0TT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BigouT15,
  author       = {Karim Bigou and
                  Arnaud Tisserand},
  title        = {Improving Modular Inversion in {RNS} using the Plus-Minus Method},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {193},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/193},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BigouT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BilginBKMW15,
  author       = {Beg{\"{u}}l Bilgin and
                  Andrey Bogdanov and
                  Miroslav Knezevic and
                  Florian Mendel and
                  Qingju Wang},
  title        = {{FIDES:} Lightweight Authenticated Cipher with Side-Channel Resistance
                  for Constrained Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {424},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/424},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BilginBKMW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BiryukovDK15,
  author       = {Alex Biryukov and
                  Daniel Dinu and
                  Dmitry Khovratovich},
  title        = {Fast and Tradeoff-Resilient Memory-Hard Functions for Cryptocurrencies
                  and Password Hashing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {430},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/430},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BiryukovDK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BiryukovDP15,
  author       = {Alex Biryukov and
                  Patrick Derbez and
                  L{\'{e}}o Perrin},
  title        = {Differential Analysis and Meet-in-the-Middle Attack against Round-Reduced
                  {TWINE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {240},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/240},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BiryukovDP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BiryukovK15,
  author       = {Alex Biryukov and
                  Dmitry Khovratovich},
  title        = {Tradeoff Cryptanalysis of Memory-Hard Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {227},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/227},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BiryukovK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BiryukovK15a,
  author       = {Alex Biryukov and
                  Dmitry Khovratovich},
  title        = {Decomposition attack on {SASASASAS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {646},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/646},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BiryukovK15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BiryukovK15b,
  author       = {Alex Biryukov and
                  Dmitry Khovratovich},
  title        = {Asymmetric proof-of-work based on the Generalized Birthday problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {946},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/946},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BiryukovK15b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BiryukovLP15,
  author       = {Alex Biryukov and
                  Ga{\"{e}}tan Leurent and
                  L{\'{e}}o Perrin},
  title        = {Cryptanalysis of Feistel Networks with Secret Round Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {723},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/723},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BiryukovLP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BiryukovN15,
  author       = {Alex Biryukov and
                  Ivica Nikolic},
  title        = {Complementing Feistel Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {426},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/426},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BiryukovN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BiryukovP15,
  author       = {Alex Biryukov and
                  L{\'{e}}o Perrin},
  title        = {On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {976},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/976},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BiryukovP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BiryukovPU15,
  author       = {Alex Biryukov and
                  L{\'{e}}o Perrin and
                  Aleksei Udovenko},
  title        = {The Secret Structure of the S-Box of Streebog, Kuznechik and Stribob},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {812},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/812},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BiryukovPU15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BishopHW15,
  author       = {Allison Bishop and
                  Susan Hohenberger and
                  Brent Waters},
  title        = {New Circular Security Counterexamples from Decision Linear and Learning
                  with Errors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {715},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/715},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BishopHW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BishopJK15,
  author       = {Allison Bishop and
                  Abhishek Jain and
                  Lucas Kowalczyk},
  title        = {Function-Hiding Inner Product Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {672},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/672},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BishopJK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BishopPRW15,
  author       = {Allison Bishop and
                  Valerio Pastro and
                  Rajmohan Rajaraman and
                  Daniel Wichs},
  title        = {Essentially Optimal Robust Secret Sharing with Maximal Corruptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1032},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1032},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BishopPRW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyG0PVW15,
  author       = {Nir Bitansky and
                  Shafi Goldwasser and
                  Abhishek Jain and
                  Omer Paneth and
                  Vinod Vaikuntanathan and
                  Brent Waters},
  title        = {Time-Lock Puzzles from Randomized Encodings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {514},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/514},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BitanskyG0PVW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyGLPT15,
  author       = {Nir Bitansky and
                  Sanjam Garg and
                  Huijia Lin and
                  Rafael Pass and
                  Sidharth Telang},
  title        = {Succinct Randomized Encodings and their Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {356},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/356},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BitanskyGLPT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyP15,
  author       = {Nir Bitansky and
                  Omer Paneth},
  title        = {On Non-Black-Box Simulation and the Impossibility of Approximate Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {369},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/369},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BitanskyP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyPW15,
  author       = {Nir Bitansky and
                  Omer Paneth and
                  Daniel Wichs},
  title        = {Perfect Structure on the Edge of Chaos},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {126},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/126},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BitanskyPW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyV15,
  author       = {Nir Bitansky and
                  Vinod Vaikuntanathan},
  title        = {Indistinguishability Obfuscation from Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {163},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/163},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BitanskyV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyV15a,
  author       = {Nir Bitansky and
                  Vinod Vaikuntanathan},
  title        = {Indistinguishability Obfuscation: from Approximate to Exact},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {704},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/704},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BitanskyV15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyV15b,
  author       = {Nir Bitansky and
                  Vinod Vaikuntanathan},
  title        = {A Note on Perfect Correctness by Derandomization},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1130},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1130},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BitanskyV15b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlantonB15,
  author       = {Marina Blanton and
                  Fattaneh Bayatbabolghani},
  title        = {Efficient Server-Aided Secure Two-Party Function Evaluation with Applications
                  to Genomic Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {422},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/422},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlantonB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlazyC15,
  author       = {Olivier Blazy and
                  C{\'{e}}line Chevalier},
  title        = {Generic Construction of UC-Secure Oblivious Transfer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {560},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/560},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlazyC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlazyCV15,
  author       = {Olivier Blazy and
                  C{\'{e}}line Chevalier and
                  Damien Vergnaud},
  title        = {Non-Interactive Zero-Knowledge Proofs of Non-Membership},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {72},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/072},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlazyCV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlazyCV15a,
  author       = {Olivier Blazy and
                  C{\'{e}}line Chevalier and
                  Damien Vergnaud},
  title        = {Mitigating Server Breaches in Password-Based Authentication: Secure
                  and Efficient Solutions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1144},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1144},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlazyCV15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlazyK15,
  author       = {Olivier Blazy and
                  Saqib A. Kakvi},
  title        = {Group Signatures Without q-Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {858},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/858},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlazyK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlockiBD15,
  author       = {Jeremiah Blocki and
                  Manuel Blum and
                  Anupam Datta},
  title        = {Naturally Rehearsing Passwords},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {166},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/166},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlockiBD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlondeauBV15,
  author       = {C{\'{e}}line Blondeau and
                  Asl{\'{\i}} Bay and
                  Serge Vaudenay},
  title        = {Protecting against Multidimensional Linear and Truncated Differential
                  Cryptanalysis by Decorrelation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {380},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/380},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlondeauBV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlondeauM15,
  author       = {C{\'{e}}line Blondeau and
                  Marine Minier},
  title        = {Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II
                  Generalized Feistel Networks using the Matrix Method},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {141},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/141},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlondeauM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlondeauN15,
  author       = {C{\'{e}}line Blondeau and
                  Kaisa Nyberg},
  title        = {New Links Between Differential and Linear Cryptanalysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {183},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/183},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlondeauN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlondeauN15a,
  author       = {C{\'{e}}line Blondeau and
                  Kaisa Nyberg},
  title        = {Links Between Truncated Differential and Multidimensional Linear Properties
                  of Block Ciphers and Underlying Attack Complexities},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {184},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/184},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlondeauN15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlondeauN15b,
  author       = {C{\'{e}}line Blondeau and
                  Kaisa Nyberg},
  title        = {Joint Data and Key Distribution of the Linear Cryptanalysis Test Statistic
                  and Its Impact to Data Complexity Estimates of Multiple/Multidimensional
                  Linear and Truncated Differential Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {935},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/935},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlondeauN15b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlondeauPW15,
  author       = {C{\'{e}}line Blondeau and
                  Thomas Peyrin and
                  Lei Wang},
  title        = {Known-key Distinguisher on Full {PRESENT}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {575},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/575},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlondeauPW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bock15,
  author       = {Hanno B{\"{o}}ck},
  title        = {A look at the {PGP} ecosystem through the key server data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {262},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/262},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bock15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogdanovGMRR15,
  author       = {Andrej Bogdanov and
                  Siyao Guo and
                  Daniel Masny and
                  Silas Richelson and
                  Alon Rosen},
  title        = {On the Hardness of Learning with Rounding over Small Modulus},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {769},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/769},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BogdanovGMRR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogdanovKKRST15,
  author       = {Dan Bogdanov and
                  Liina Kamm and
                  Baldur Kubo and
                  Reimo Rebane and
                  Ville Sokk and
                  Riivo Talviste},
  title        = {Students and Taxes: a Privacy-Preserving Social Study Using Secure
                  Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1159},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1159},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BogdanovKKRST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogdanovKMTW15,
  author       = {Andrey Bogdanov and
                  Ilya Kizhvatov and
                  Kamran Manzoor and
                  Elmar Tischhauser and
                  Marc Witteman},
  title        = {Fast and Memory-Efficient Key Recovery in Side-Channel Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {795},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/795},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BogdanovKMTW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogdanovL15,
  author       = {Andrej Bogdanov and
                  Chin Ho Lee},
  title        = {Homomorphic evaluation requires depth},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1044},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1044},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BogdanovL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogosTV15,
  author       = {Sonia Bogos and
                  Florian Tram{\`{e}}r and
                  Serge Vaudenay},
  title        = {On Solving Lpn using {BKW} and Variants},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {49},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/049},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BogosTV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoldyrevaDPS15,
  author       = {Alexandra Boldyreva and
                  Jean Paul Degabriele and
                  Kenneth G. Paterson and
                  Martijn Stam},
  title        = {Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {59},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/059},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoldyrevaDPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoldyrevaKLW15,
  author       = {Alexandra Boldyreva and
                  Taesoo Kim and
                  Richard J. Lipton and
                  Bogdan Warinschi},
  title        = {Towards Provably-Secure Remote Memory Attestation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {729},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/729},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoldyrevaKLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehLMR15,
  author       = {Dan Boneh and
                  Kevin Lewi and
                  Hart William Montgomery and
                  Ananth Raghunathan},
  title        = {Key Homomorphic PRFs and Their Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {220},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/220},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehLMR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehLW15,
  author       = {Dan Boneh and
                  Kevin Lewi and
                  David J. Wu},
  title        = {Constraining Pseudorandom Functions Privately},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1167},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1167},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonneauCG15,
  author       = {Joseph Bonneau and
                  Jeremy Clark and
                  Steven Goldfeder},
  title        = {On Bitcoin as a public randomness source},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1015},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1015},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonneauCG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonneauMCNKF15,
  author       = {Joseph Bonneau and
                  Andrew Miller and
                  Jeremy Clark and
                  Arvind Narayanan and
                  Joshua A. Kroll and
                  Edward W. Felten},
  title        = {Research Perspectives and Challenges for Bitcoin and Cryptocurrencies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {261},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/261},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonneauMCNKF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BootleCCGGP15,
  author       = {Jonathan Bootle and
                  Andrea Cerulli and
                  Pyrros Chaidos and
                  Essam Ghadafi and
                  Jens Groth and
                  Christophe Petit},
  title        = {Short Accountable Ring Signatures Based on {DDH}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {643},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/643},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BootleCCGGP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosHMT15,
  author       = {Joppe W. Bos and
                  Charles Hubain and
                  Wil Michiels and
                  Philippe Teuwen},
  title        = {Differential Computation Analysis: Hiding your White-Box Designs is
                  Not Enough},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {753},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/753},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosHMT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoseDR15,
  author       = {Priyanka Bose and
                  Dipanjan Das and
                  C. Pandu Rangan},
  title        = {Constant Size Ring Signature Without Random Oracle},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {164},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/164},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoseDR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BottinelliB15,
  author       = {Paul Bottinelli and
                  Joppe W. Bos},
  title        = {Computational Aspects of Correlation Power Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {260},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/260},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BottinelliB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoureanuMV15,
  author       = {Ioana Boureanu and
                  Aikaterini Mitrokotsa and
                  Serge Vaudenay},
  title        = {Towards Secure Distance Bounding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {208},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/208},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoureanuMV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoydHMS15,
  author       = {Colin Boyd and
                  Britta Hale and
                  Stig Frode Mj{\o}lsnes and
                  Douglas Stebila},
  title        = {From Stateless to Stateful: Generic Authentication and Authenticated
                  Encryption Constructions with Application to {TLS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1150},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1150},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoydHMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleN15,
  author       = {Elette Boyle and
                  Moni Naor},
  title        = {Is There an Oblivious {RAM} Lower Bound?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {863},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/863},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyleN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiGHLST15,
  author       = {Zvika Brakerski and
                  Craig Gentry and
                  Shai Halevi and
                  Tancr{\`{e}}de Lepoint and
                  Amit Sahai and
                  Mehdi Tibouchi},
  title        = {Cryptanalysis of the Quadratic Zero-Testing of {GGH}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {845},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/845},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiGHLST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiKS15,
  author       = {Zvika Brakerski and
                  Ilan Komargodski and
                  Gil Segev},
  title        = {From Single-Input to Multi-Input Functional Encryption in the Private-Key
                  Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {158},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/158},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiS15,
  author       = {Zvika Brakerski and
                  Gil Segev},
  title        = {Hierarchical Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1011},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1011},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiV15,
  author       = {Zvika Brakerski and
                  Vinod Vaikuntanathan},
  title        = {Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions
                  Or: How to Secretly Embed a Circuit in Your {PRF}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {32},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/032},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Brandao15,
  author       = {Lu{\'{\i}}s T. A. N. Brand{\~{a}}o},
  title        = {Very-efficient simulatable flipping of many coins into a well},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {640},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/640},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Brandao15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrinciKMRB15,
  author       = {Riadh Brinci and
                  Walid Khmiri and
                  Mefteh Mbarek and
                  Abdellatif Ben Rabaa and
                  Ammar Bouall{\`{e}}gue},
  title        = {Efficient Hardware Design for Computing Pairings Using Few {FPGA}
                  In-built DSPs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {116},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/116},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrinciKMRB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BroadbentJ15,
  author       = {Anne Broadbent and
                  Stacey Jeffery},
  title        = {Quantum homomorphic encryption for circuits of low T-gate complexity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {551},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/551},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BroadbentJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BroadbentS15,
  author       = {Anne Broadbent and
                  Christian Schaffner},
  title        = {Quantum Cryptography Beyond Quantum Key Distribution},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1242},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1242},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BroadbentS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Brown15,
  author       = {Daniel R. L. Brown},
  title        = {Short Schnorr signatures require a hash function with more than just
                  random-prefix resistance},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {169},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/169},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Brown15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Brown15a,
  author       = {Daniel R. L. Brown},
  title        = {Bounds on surmising remixed keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {375},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/375},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Brown15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Brown15b,
  author       = {Daniel R. L. Brown},
  title        = {A flaw in a theorem about Schnorr signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {509},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/509},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Brown15b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Brown15c,
  author       = {Daniel R. L. Brown},
  title        = {Alternative cubics' rules with an algebraic appeal},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {544},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/544},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Brown15c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Brumley15,
  author       = {Billy Bob Brumley},
  title        = {Faster software for fast endomorphisms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {36},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/036},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Brumley15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BruneauGHR15,
  author       = {Nicolas Bruneau and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Olivier Rioul},
  title        = {Masks will Fall Off - Higher-Order Optimal Distinguishers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {452},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/452},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BruneauGHR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BruneauGNT15,
  author       = {Nicolas Bruneau and
                  Sylvain Guilley and
                  Zakaria Najm and
                  Yannick Teglia},
  title        = {Multi-Variate High-Order Attacks of Shuffled Tables Recomputation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {837},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/837},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BruneauGNT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrzuskaM15,
  author       = {Christina Brzuska and
                  Arno Mittelbach},
  title        = {Universal Computational Extractors and the Superfluous Padding Assumption
                  for Indistinguishability Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {581},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/581},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrzuskaM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BuhrowRSGD15,
  author       = {Benjamin Buhrow and
                  Paul Riemer and
                  Mike Shea and
                  Barry K. Gilbert and
                  Erik S. Daniel},
  title        = {Block Cipher Speed and Energy Efficiency Records on the {MSP430:}
                  System Design Trade-Offs for 16-bit Embedded Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {11},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/011},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BuhrowRSGD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BunZ15,
  author       = {Mark Bun and
                  Mark Zhandry},
  title        = {Order-Revealing Encryption and the Hardness of Private Learning},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {417},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/417},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BunZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BurraLNNOOSS15,
  author       = {Sai Sheshank Burra and
                  Enrique Larraia and
                  Jesper Buus Nielsen and
                  Peter Sebastian Nordholt and
                  Claudio Orlandi and
                  Emmanuela Orsini and
                  Peter Scholl and
                  Nigel P. Smart},
  title        = {High Performance Multi-Party Computation for Binary Circuits Based
                  on Oblivious Transfer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {472},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/472},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BurraLNNOOSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bursuc15,
  author       = {Sergiu Bursuc},
  title        = {Secure two-party computation in applied pi-calculus: models and verification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {782},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/782},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bursuc15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BussiDMD15,
  author       = {Khushboo Bussi and
                  Dhananjoy Dey and
                  Prasanna Raghaw Mishra and
                  B. K. Dass},
  title        = {{MGR} {HASH} {FUNCTION}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {856},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/856},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BussiDMD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CDM15,
  author       = {Prakruti C and
                  Sashank Dara and
                  V. N. Muralidhara},
  title        = {Efficient Format Preserving Encrypted Databases},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {219},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/219},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CDM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CabarcasDGLW15,
  author       = {Daniel Cabarcas and
                  Denise Demirel and
                  Florian G{\"{o}}pfert and
                  Jean Lancrenon and
                  Thomas Wunderer},
  title        = {An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment
                  Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {628},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/628},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CabarcasDGLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischDHK15,
  author       = {Jan Camenisch and
                  Maria Dubovitskaya and
                  Kristiyan Haralambiev and
                  Markulf Kohlweiss},
  title        = {Composable {\&} Modular Anonymous Credentials: Definitions and
                  Practical Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {580},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/580},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischDHK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischDL15,
  author       = {Jan Camenisch and
                  Manu Drijvers and
                  Anja Lehmann},
  title        = {Universally Composable Direct Anonymous Attestation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1246},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1246},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischDL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischEN15,
  author       = {Jan Camenisch and
                  Robert R. Enderlein and
                  Gregory Neven},
  title        = {Two-Server Password-Authenticated Secret Sharing UC-Secure Against
                  Transient Corruptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {6},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/006},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischEN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischLNS15,
  author       = {Jan Camenisch and
                  Anja Lehmann and
                  Gregory Neven and
                  Kai Samelin},
  title        = {Virtual Smart Cards: How to Sign with a Password and a Server},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1101},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1101},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischLNS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanardO15,
  author       = {S{\'{e}}bastien Canard and
                  Baptiste Olivier},
  title        = {Differential Privacy in distribution and instance-based noise mechanisms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {701},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/701},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanardO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanardPS15,
  author       = {S{\'{e}}bastien Canard and
                  David Pointcheval and
                  Olivier Sanders},
  title        = {Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly
                  Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {278},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/278},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanardPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanardPST15,
  author       = {S{\'{e}}bastien Canard and
                  David Pointcheval and
                  Olivier Sanders and
                  Jacques Traor{\'{e}}},
  title        = {Scalable Divisible E-cash},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {300},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/300},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanardPST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanardT15,
  author       = {S{\'{e}}bastien Canard and
                  Viet Cuong Trinh},
  title        = {Private Ciphertext-Policy Attribute-based Encryption Schemes With
                  Constant-Size Ciphertext Supporting {CNF} Access Policy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {891},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/891},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanardT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiCHR15,
  author       = {Ran Canetti and
                  Yilei Chen and
                  Justin Holmgren and
                  Mariana Raykova},
  title        = {Succinct Adaptive Garbled {RAM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1074},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1074},
  timestamp    = {Wed, 23 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiCHR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiCR15,
  author       = {Ran Canetti and
                  Yilei Chen and
                  Leonid Reyzin},
  title        = {On the Correlation Intractability of Obfuscated Pseudorandom Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {334},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/334},
  timestamp    = {Tue, 22 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiCR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiG015,
  author       = {Ran Canetti and
                  Vipul Goyal and
                  Abhishek Jain},
  title        = {Concurrent Secure Computation with Optimal Query Complexity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {559},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/559},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiG015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiH15,
  author       = {Ran Canetti and
                  Justin Holmgren},
  title        = {Fully Succinct Garbled {RAM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {388},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/388},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiKP15,
  author       = {Ran Canetti and
                  Yael Tauman Kalai and
                  Omer Paneth},
  title        = {On Obfuscation with Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {48},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/048},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiKP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanteautCFLNPS15,
  author       = {Anne Canteaut and
                  Sergiu Carpov and
                  Caroline Fontaine and
                  Tancr{\`{e}}de Lepoint and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Pascal Paillier and
                  Renaud Sirdey},
  title        = {How to Compress Homomorphic Ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {113},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/113},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanteautCFLNPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanteautDL15,
  author       = {Anne Canteaut and
                  S{\'{e}}bastien Duval and
                  Ga{\"{e}}tan Leurent},
  title        = {Construction of Lightweight S-Boxes using Feistel and {MISTY} structures
                  (Full Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {711},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/711},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanteautDL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanteautLN15,
  author       = {Anne Canteaut and
                  Virginie Lallemand and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  title        = {Related-Key Attack on Full-Round {PICARO}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {754},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/754},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanteautLN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanteautR15,
  author       = {Anne Canteaut and
                  Jo{\"{e}}lle Rou{\'{e}}},
  title        = {On the behaviors of affine equivalent Sboxes regarding differential
                  and linear attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {85},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/085},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanteautR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CaoC15,
  author       = {Zhengjun Cao and
                  Zhenfu Cao},
  title        = {Comment on Quantum Cryptography - Which is More Important, Signal
                  Security, Information Security or Communication Reliability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1251},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1251},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CaoC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CaoCL15,
  author       = {Zhengjun Cao and
                  Zhenfu Cao and
                  Lihua Liu},
  title        = {Comment on Demonstrations of Shor's Algorithm in the Past Decades},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1207},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1207},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CaoCL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CaoL15,
  author       = {Zhengjun Cao and
                  Lihua Liu},
  title        = {On the Disadvantages of Pairing-based Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {84},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/084},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CaoL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CaoL15a,
  author       = {Zhengjun Cao and
                  Lihua Liu},
  title        = {A Note on the Lindell-Waisbard Private Web Search Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {299},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/299},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CaoL15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CaoL15b,
  author       = {Zhengjun Cao and
                  Lihua Liu},
  title        = {Comment on "Realization of a scalable Shor algorithm"},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1133},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1133},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CaoL15b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Carlet15,
  author       = {Claude Carlet},
  title        = {More {PS} and H-like bent functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {168},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/168},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Carlet15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletG15,
  author       = {Claude Carlet and
                  Sylvain Guilley},
  title        = {Complementary Dual Codes for Counter-measures to Side-Channel Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {603},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/603},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarmonSW15,
  author       = {Elad Carmon and
                  Jean{-}Pierre Seifert and
                  Avishai Wool},
  title        = {Simple Photonic Emission Attack with Reduced Data Complexity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1206},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1206},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarmonSW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CaroIO15,
  author       = {Angelo De Caro and
                  Vincenzo Iovino and
                  Adam O'Neill},
  title        = {Deniable Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1205},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1205},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CaroIO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarpovS15,
  author       = {Sergiu Carpov and
                  Renaud Sirdey},
  title        = {A compression method for homomorphic ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1199},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1199},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarpovS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CashKT15,
  author       = {David Cash and
                  Eike Kiltz and
                  Stefano Tessaro},
  title        = {Two-Round Man-in-the-Middle Security from {LPN}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1220},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1220},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CashKT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CastagnosL15,
  author       = {Guilhem Castagnos and
                  Fabien Laguillaumie},
  title        = {Linearly Homomorphic Encryption from {DDH}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {47},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/047},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CastagnosL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CatalanoF15,
  author       = {Dario Catalano and
                  Dario Fiore},
  title        = {Practical Homomorphic MACs for Arithmetic Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {194},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/194},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CatalanoF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CatalanoFGN15,
  author       = {Dario Catalano and
                  Dario Fiore and
                  Rosario Gennaro and
                  Luca Nizzardo},
  title        = {Generalizing Homomorphic MACs for Arithmetic Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {396},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/396},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CatalanoFGN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CatalanoFN15,
  author       = {Dario Catalano and
                  Dario Fiore and
                  Luca Nizzardo},
  title        = {Programmable Hash Functions go Private: Constructions and Applications
                  to (Homomorphic) Signatures with Shorter Public Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {826},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/826},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CatalanoFN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CavalloCKS15,
  author       = {Bren Cavallo and
                  Giovanni Di Crescenzo and
                  Delaram Kahrobaei and
                  Vladimir Shpilrain},
  title        = {Efficient and Secure Delegation of Group Exponentiation to a Single
                  Server},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {206},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/206},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CavalloCKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CenkH15,
  author       = {Murat Cenk and
                  M. Anwar Hasan},
  title        = {Some New Results on Binary Polynomial Multiplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {94},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/094},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CenkH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CetinDDS15,
  author       = {Gizem S. {\c{C}}etin and
                  Wei Dai and
                  Yarkin Dor{\"{o}}z and
                  Berk Sunar},
  title        = {Homomorphic Autocomplete},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1194},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1194},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CetinDDS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CetinDSM15,
  author       = {Gizem S. {\c{C}}etin and
                  Yarkin Dor{\"{o}}z and
                  Berk Sunar and
                  William J. Martin},
  title        = {An Investigation of Complex Operations with Word-Size Homomorphic
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1195},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1195},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CetinDSM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CetinDSS15,
  author       = {Gizem S. {\c{C}}etin and
                  Yarkin Dor{\"{o}}z and
                  Berk Sunar and
                  Erkay Savas},
  title        = {Low Depth Circuits for Efficient Homomorphic Sorting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {274},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/274},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CetinDSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChakrabortiCHN15,
  author       = {Avik Chakraborti and
                  Anupam Chattopadhyay and
                  Muhammad Hassan and
                  Mridul Nandi},
  title        = {TriviA: {A} Fast and Secure Authenticated Encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {590},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/590},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChakrabortiCHN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chakraborty15,
  author       = {Sumit Chakraborty},
  title        = {Security Intelligence for Broadcast : Threat Analytics},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {332},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/332},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chakraborty15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chakraborty15a,
  author       = {Sumit Chakraborty},
  title        = {Financial Cryptography: Discriminatory Pricing Mechanism},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {370},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/370},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chakraborty15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chakraborty15b,
  author       = {Sumit Chakraborty},
  title        = {Financial Cryptography: Algorithmic Mechanisms for a Hedonic Game},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {381},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/381},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chakraborty15b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chakraborty15c,
  author       = {Sumit Chakraborty},
  title        = {Secure Multi-party Computation: How to Solve the Problem between Security
                  Intelligence {\&} Business Intelligence},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {804},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/804},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chakraborty15c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChakrabortyMM15,
  author       = {Abhishek Chakraborty and
                  Bodhisatwa Mazumdar and
                  Debdeep Mukhopadhyay},
  title        = {Combined Side-Channel and Fault Analysis Attack on Protected Grain
                  Family of Stream Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {602},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/602},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChakrabortyMM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChakrabortyMS15,
  author       = {Debrup Chakraborty and
                  Cuauhtemoc Mancillas{-}L{\'{o}}pez and
                  Palash Sarkar},
  title        = {Disk Encryption: Do We Need to Preserve Length?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {594},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/594},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChakrabortyMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChakrabortyRR15a,
  author       = {Suvradip Chakraborty and
                  Srinivasan Raghuraman and
                  C. Pandu Rangan},
  title        = {Efficient, Pairing-Free, One Round Attribute-Based Authenticated Key
                  Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {520},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/520},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChakrabortyRR15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChandranCLNX15,
  author       = {Nishanth Chandran and
                  Melissa Chase and
                  Feng{-}Hao Liu and
                  Ryo Nishimaki and
                  Keita Xagawa},
  title        = {Re-encryption, functional re-encryption, and multi-hop re-encryption:
                  {A} framework for achieving obfuscation-based security and instantiations
                  from lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {491},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/491},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChandranCLNX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChandranGJS15,
  author       = {Nishanth Chandran and
                  Vipul Goyal and
                  Aayush Jain and
                  Amit Sahai},
  title        = {Functional Encryption: Decentralised and Delegatable},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1017},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1017},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChandranGJS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChandranGMPU15,
  author       = {Nishanth Chandran and
                  Vipul Goyal and
                  Pratyay Mukherjee and
                  Omkant Pandey and
                  Jalaj Upadhyay},
  title        = {Block-wise Non-Malleable Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {129},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/129},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChandranGMPU15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChandranKR15,
  author       = {Nishanth Chandran and
                  Bhavana Kanukurthi and
                  Srinivasan Raghuraman},
  title        = {Information-theoretic Local Non-malleable Codes and their Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1056},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1056},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChandranKR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChandranRV15,
  author       = {Nishanth Chandran and
                  Srinivasan Raghuraman and
                  Dhinakaran Vinayagamurthy},
  title        = {Reducing Multilinear Map Levels in Constrained PRFs and {ABE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {829},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/829},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChandranRV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangJMS15,
  author       = {Donghoon Chang and
                  Arpan Jati and
                  Sweta Mishra and
                  Somitra Kumar Sanadhya},
  title        = {Rig: {A} simple, secure and flexible design for Password Hashing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {9},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/009},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangJMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangJMS15a,
  author       = {Donghoon Chang and
                  Arpan Jati and
                  Sweta Mishra and
                  Somitra Kumar Sanadhya},
  title        = {Performance Analysis of Some Password Hashing Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {139},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/139},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangJMS15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CharpinMS15,
  author       = {Pascale Charpin and
                  Sihem Mesnager and
                  Sumanta Sarkar},
  title        = {Dickson Polynomials that are Involutions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {434},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/434},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CharpinMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChatterjeeBJR15,
  author       = {Rahul Chatterjee and
                  Joseph Bonneau and
                  Ari Juels and
                  Thomas Ristenpart},
  title        = {Cracking-Resistant Password Vaults using Natural Language Encoders},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {788},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/788},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChatterjeeBJR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChatterjeeS15,
  author       = {Ayantika Chatterjee and
                  Indranil Sengupta},
  title        = {{FURISC:} {FHE} Encrypted {URISC} Design},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {699},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/699},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChatterjeeS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChatterjeeS15a,
  author       = {Ayantika Chatterjee and
                  Indranil Sengupta},
  title        = {Searching and Sorting of Fully Homomorphic Encrypted Data on Cloud},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {981},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/981},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChatterjeeS15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaudhariD15,
  author       = {Payal Chaudhari and
                  Manik Lal Das},
  title        = {Privacy-preserving Attribute Based Searchable Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {899},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/899},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaudhariD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenCCLLZ15,
  author       = {Yu{-}Chi Chen and
                  Sherman S. M. Chow and
                  Kai{-}Min Chung and
                  Russell W. F. Lai and
                  Wei{-}Kai Lin and
                  Hong{-}Sheng Zhou},
  title        = {Computation-Trace Indistinguishability Obfuscation and its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {406},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/406},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenCCLLZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenEMS15,
  author       = {Cong Chen and
                  Thomas Eisenbarth and
                  Ingo von Maurich and
                  Rainer Steinwandt},
  title        = {Masking Large Keys in Hardware: {A} Masked Implementation of McEliece},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {924},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/924},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenEMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenGW15,
  author       = {Jie Chen and
                  Romain Gay and
                  Hoeteck Wee},
  title        = {Improved Dual System {ABE} in Prime-Order Groups via Predicate Encodings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {409},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/409},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenGW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenHZ15,
  author       = {Binglong Chen and
                  Chuangqiang Hu and
                  Chang{-}An Zhao},
  title        = {A Note on Scalar Multiplication Using Division Polynomials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {284},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/284},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenHZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenITE15,
  author       = {Cong Chen and
                  Mehmet Sinan Inci and
                  Mostafa Taha and
                  Thomas Eisenbarth},
  title        = {SpecTre: {A} Tiny Side-Channel Resistant Speck Core for FPGAs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {691},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/691},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenITE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenLS15,
  author       = {Hao Chen and
                  Kristin E. Lauter and
                  Katherine E. Stange},
  title        = {Attacks on Search {RLWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {971},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/971},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenLT15,
  author       = {Binyi Chen and
                  Huijia Lin and
                  Stefano Tessaro},
  title        = {Oblivious Parallel {RAM:} Improved Efficiency and Generic Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1053},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1053},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenLT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenQZDC15,
  author       = {Yu Chen and
                  Baodong Qin and
                  Jiang Zhang and
                  Yi Deng and
                  Sherman S. M. Chow},
  title        = {Non-Malleable Functions and Their Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1253},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1253},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenQZDC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenST15,
  author       = {Yi{-}Ruei Chen and
                  Shiuan{-}Tzuo Shen and
                  Wen{-}Guey Tzeng},
  title        = {Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations
                  over Zp},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {947},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/947},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenW15,
  author       = {Huaifeng Chen and
                  Xiaoyun Wang},
  title        = {Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-guessing
                  Techniques},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {666},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/666},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenWW15,
  author       = {Zhan Chen and
                  Ning Wang and
                  Xiaoyun Wang},
  title        = {Impossible Differential Cryptanalysis of Reduced Round {SIMON}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {286},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/286},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenZ15,
  author       = {Binglong Chen and
                  Chang{-}An Zhao},
  title        = {An Improvment of the Elliptic Net Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {276},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/276},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenalT15,
  author       = {Massimo Chenal and
                  Qiang Tang},
  title        = {Key Recovery Attack against an NTRU-type Somewhat Homomorphic Encryption
                  Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {83},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/083},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenalT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenetteLWW15,
  author       = {Nathan Chenette and
                  Kevin Lewi and
                  Stephen A. Weis and
                  David J. Wu},
  title        = {Practical Order-Revealing Encryption with Limited Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1125},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1125},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenetteLWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChengZ15,
  author       = {Shantian Cheng and
                  Juanyang Zhang},
  title        = {Adaptive-ID Secure Revocable Identity-Based Encryption from Lattices
                  via Subset Difference Method},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {98},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/098},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChengZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CheonKL15,
  author       = {Jung Hee Cheon and
                  Miran Kim and
                  Kristin E. Lauter},
  title        = {Homomorphic Computation of Edit Distance},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {132},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/132},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CheonKL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CheonL15,
  author       = {Jung Hee Cheon and
                  Changmin Lee},
  title        = {Cryptanalysis of the multilinear map on the ideal lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {461},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/461},
  timestamp    = {Fri, 26 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CheonL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CheonLR15,
  author       = {Jung Hee Cheon and
                  Changmin Lee and
                  Hansol Ryu},
  title        = {Cryptanalysis of the New {CLT} Multilinear Maps},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {934},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/934},
  timestamp    = {Fri, 26 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CheonLR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Cheraghchi15,
  author       = {Mahdi Cheraghchi},
  title        = {Nearly Optimal Robust Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {951},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/951},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Cheraghchi15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChiCKK15,
  author       = {Dong Pyo Chi and
                  Jeong Woon Choi and
                  Jeong San Kim and
                  Taewan Kim},
  title        = {Lattice Based Cryptography for Beginners},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {938},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/938},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChiCKK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChiappettaSY15,
  author       = {Marco Chiappetta and
                  Erkay Savas and
                  Cemal Yilmaz},
  title        = {Real time detection of cache-based side-channel attacks using Hardware
                  Performance Counters},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1034},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1034},
  timestamp    = {Wed, 21 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChiappettaSY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChiesaTV15,
  author       = {Alessandro Chiesa and
                  Eran Tromer and
                  Madars Virza},
  title        = {Cluster Computing in Zero Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {377},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/377},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChiesaTV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoiCHK15,
  author       = {Kyu Young Choi and
                  Jihoon Cho and
                  Jung Yeon Hwang and
                  Taekyoung Kwon},
  title        = {Constructing Efficient {PAKE} Protocols from Identity-Based {KEM/DEM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {606},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/606},
  timestamp    = {Thu, 12 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoiCHK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoiKKC15,
  author       = {Seung Geol Choi and
                  Jonathan Katz and
                  Ranjit Kumaresan and
                  Carlos Cid},
  title        = {Multi-Client Non-Interactive Verifiable Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {190},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/190},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoiKKC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chou15,
  author       = {Tung Chou},
  title        = {Sandy2x: New Curve25519 Speed Records},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {943},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/943},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chou15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChouO15,
  author       = {Tung Chou and
                  Claudio Orlandi},
  title        = {The Simplest Protocol for Oblivious Transfer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {267},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/267},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChouO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoudhuryOPS15,
  author       = {Ashish Choudhury and
                  Emmanuela Orsini and
                  Arpita Patra and
                  Nigel P. Smart},
  title        = {Linear Overhead Robust {MPC} with Honest Majority Using Preprocessing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {705},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/705},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoudhuryOPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChungCS15,
  author       = {Ping Ngai Chung and
                  Craig Costello and
                  Benjamin Smith},
  title        = {Fast, uniform, and compact scalar multiplication for elliptic curves
                  and genus 2 Jacobians with applications to signature schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {983},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/983},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChungCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChungKZ15,
  author       = {Kai{-}Min Chung and
                  Jonathan Katz and
                  Hong{-}Sheng Zhou},
  title        = {Functional Encryption from (Small) Hardwae Tokens},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {153},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/153},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChungKZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChungP15,
  author       = {Kai{-}Min Chung and
                  Rafael Pass},
  title        = {Tight Parallel Repetition Theorems for Public-Coin Arguments using
                  KL-divergence},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {31},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/031},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChungP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CiampiPSSV15,
  author       = {Michele Ciampi and
                  Giuseppe Persiano and
                  Alessandra Scafuro and
                  Luisa Siniscalchi and
                  Ivan Visconti},
  title        = {Improved {OR} Composition of Sigma-Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {810},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/810},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CiampiPSSV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CiampiPSV15,
  author       = {Michele Ciampi and
                  Giuseppe Persiano and
                  Luisa Siniscalchi and
                  Ivan Visconti},
  title        = {A Transform for {NIZK} Almost as Efficient and General as the Fiat-Shamir
                  Transform Without Programmable Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {770},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/770},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CiampiPSV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CioranescoKNC15,
  author       = {Jean{-}Michel Cioranesco and
                  Roman Korkikian and
                  David Naccache and
                  Rodrigo Portella do Canto},
  title        = {Buying {AES} Design Resistance with Speed and Energy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {786},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/786},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CioranescoKNC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ClavierFW15,
  author       = {Christophe Clavier and
                  Julien Francq and
                  Antoine Wurcker},
  title        = {Study of a Parity Check Based Fault-Detection Countermeasure for the
                  {AES} Key Schedule},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {877},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/877},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ClavierFW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CogliatiLS15,
  author       = {Benoit Cogliati and
                  Rodolphe Lampe and
                  Yannick Seurin},
  title        = {Tweaking Even-Mansour Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {539},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/539},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CogliatiLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CogliatiS15,
  author       = {Benoit Cogliati and
                  Yannick Seurin},
  title        = {On the Provable Security of the Iterated Even-Mansour Cipher against
                  Related-Key and Chosen-Key Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {69},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/069},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CogliatiS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CogliatiS15a,
  author       = {Benoit Cogliati and
                  Yannick Seurin},
  title        = {Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers
                  with Linear Tweak and Key Mixing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {851},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/851},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CogliatiS15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Cohen15,
  author       = {Ran Cohen},
  title        = {Asynchronous Secure Multiparty Computation in Constant Time},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1238},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1238},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Cohen15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CohenGV15,
  author       = {Aloni Cohen and
                  Shafi Goldwasser and
                  Vinod Vaikuntanathan},
  title        = {Aggregatable Pseudorandom Functions and Connections to Learning},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {38},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/038},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CohenGV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CohenH15,
  author       = {Aloni Cohen and
                  Justin Holmgren},
  title        = {Multilinear Pseudorandom Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {125},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/125},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CohenH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CohenHNVW15,
  author       = {Aloni Cohen and
                  Justin Holmgren and
                  Ryo Nishimaki and
                  Vinod Vaikuntanathan and
                  Daniel Wichs},
  title        = {Watermarking Cryptographic Capabilities},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1096},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1096},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CohenHNVW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CohenHOR15,
  author       = {Ran Cohen and
                  Iftach Haitner and
                  Eran Omri and
                  Lior Rotem},
  title        = {Characterization of Secure Multiparty Computation Without Broadcast},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {846},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/846},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CohenHOR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CohenHV15,
  author       = {Aloni Cohen and
                  Justin Holmgren and
                  Vinod Vaikuntanathan},
  title        = {Publicly Verifiable Software Watermarking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {373},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/373},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CohenHV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Contini15,
  author       = {Scott Contini},
  title        = {Method to Protect Passwords in Databases for Web Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {387},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/387},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Contini15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CorettiDTV15,
  author       = {Sandro Coretti and
                  Yevgeniy Dodis and
                  Bj{\"{o}}rn Tackmann and
                  Daniele Venturi},
  title        = {Non-Malleable Encryption: Simpler, Shorter, Stronger},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {772},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/772},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CorettiDTV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Coron15,
  author       = {Jean{-}S{\'{e}}bastien Coron},
  title        = {Cryptanalysis of {GGH15} Multilinear Maps},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1037},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1037},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Coron15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronFRZ15,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Jean{-}Charles Faug{\`{e}}re and
                  Gu{\'{e}}na{\"{e}}l Renault and
                  Rina Zeitoun},
  title        = {Factoring N=p\({}^{\mbox{r}}\) q\({}^{\mbox{s}}\) for Large r and
                  s},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {71},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/071},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronFRZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronGHLMM0ST15,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Craig Gentry and
                  Shai Halevi and
                  Tancr{\`{e}}de Lepoint and
                  Hemanta K. Maji and
                  Eric Miles and
                  Mariana Raykova and
                  Amit Sahai and
                  Mehdi Tibouchi},
  title        = {Zeroizing Without Low-Level Zeroes: New {MMAP} Attacks and Their Limitations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {596},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/596},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronGHLMM0ST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronLT15,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Tancr{\`{e}}de Lepoint and
                  Mehdi Tibouchi},
  title        = {New Multilinear Maps over the Integers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {162},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/162},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronLT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronPRR15,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Emmanuel Prouff and
                  Matthieu Rivain and
                  Thomas Roche},
  title        = {Higher-Order Side Channel Security and Mask Refreshing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {359},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/359},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronPRR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CortierEKMW15,
  author       = {V{\'{e}}ronique Cortier and
                  Fabienne Eigner and
                  Steve Kremer and
                  Matteo Maffei and
                  Cyrille Wiedling},
  title        = {Type-Based Verification of Electronic Voting Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {39},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/039},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CortierEKMW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CortierFG15,
  author       = {V{\'{e}}ronique Cortier and
                  Georg Fuchsbauer and
                  David Galindo},
  title        = {BeleniosRF: {A} Strongly Receipt-Free Electronic Voting Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {629},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/629},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CortierFG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CostacheS15,
  author       = {Anamaria Costache and
                  Nigel P. Smart},
  title        = {Which Ring Based Somewhat Homomorphic Encryption Scheme is Best?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {889},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/889},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CostacheS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CostanLD15,
  author       = {Victor Costan and
                  Ilia A. Lebedev and
                  Srinivas Devadas},
  title        = {Sanctum: Minimal {RISC} Extensions for Isolated Execution},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {564},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/564},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CostanLD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CostelloL15,
  author       = {Craig Costello and
                  Patrick Longa},
  title        = {FourQ: four-dimensional decompositions on a Q-curve over the Mersenne
                  prime},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {565},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/565},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CostelloL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CouteauPP15,
  author       = {Geoffroy Couteau and
                  Thomas Peters and
                  David Pointcheval},
  title        = {Encryption Switching Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {990},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/990},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CouteauPP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CouteauPP15a,
  author       = {Geoffroy Couteau and
                  Thomas Peters and
                  David Pointcheval},
  title        = {Secure Distributed Computation on Private Inputs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1196},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1196},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CouteauPP15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerDDFS15,
  author       = {Ronald Cramer and
                  Ivan Bjerre Damg{\aa}rd and
                  Nico D{\"{o}}ttling and
                  Serge Fehr and
                  Gabriele Spini},
  title        = {Linear Secret Sharing Schemes from Error Correcting Codes and Universal
                  Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1089},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1089},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerDDFS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerDK15,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Marcel Keller},
  title        = {On the Amortized Complexity of Zero-knowledge Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {446},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/446},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerDK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerDPR15,
  author       = {Ronald Cramer and
                  L{\'{e}}o Ducas and
                  Chris Peikert and
                  Oded Regev},
  title        = {Recovering Short Generators of Principal Ideals in Cyclotomic Rings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {313},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/313},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerDPR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CrepeauK15,
  author       = {Claude Cr{\'{e}}peau and
                  Raza Ali Kazmi},
  title        = {Oblivious Transfer from weakly Random Self-Reducible Public-Key Cryptosystem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {362},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/362},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CrepeauK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CrepeauK15a,
  author       = {Claude Cr{\'{e}}peau and
                  Raza Ali Kazmi},
  title        = {Zero-Knowledge Interactive Proof Systems for New Lattice Problems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {969},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/969},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CrepeauK15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CrockettP15,
  author       = {Eric Crockett and
                  Chris Peikert},
  title        = {{\(\Lambda\)} {\(\circ\)} {\(\lambda\)}: {A} Functional Library for
                  Lattice Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1134},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1134},
  timestamp    = {Thu, 02 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CrockettP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DArcoES15,
  author       = {Paolo D'Arco and
                  Navid Nasr Esfahani and
                  Douglas R. Stinson},
  title        = {All or Nothing at All},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {998},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/998},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DArcoES15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledFK15,
  author       = {Dana Dachman{-}Soled and
                  Nils Fleischhacker and
                  Jonathan Katz and
                  Anna Lysyanskaya and
                  Dominique Schr{\"{o}}der},
  title        = {Feasibility and Infeasibility of Secure Computation with Malicious
                  PUFs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {405},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/405},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-SoledFK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledKT15,
  author       = {Dana Dachman{-}Soled and
                  Jonathan Katz and
                  Aishwarya Thiruvengadam},
  title        = {10-Round Feistel is Indifferentiable from an Ideal Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {876},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/876},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-SoledKT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledLPSV15,
  author       = {Dana Dachman{-}Soled and
                  Chang Liu and
                  Charalampos Papamanthou and
                  Elaine Shi and
                  Uzi Vishkin},
  title        = {Oblivious Network {RAM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {73},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/073},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-SoledLPSV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DagherBBCB15,
  author       = {Gaby G. Dagher and
                  Benedikt B{\"{u}}nz and
                  Joseph Bonneau and
                  Jeremy Clark and
                  Dan Boneh},
  title        = {Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1008},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1008},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DagherBBCB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DahabGM15,
  author       = {Ricardo Dahab and
                  Steven D. Galbraith and
                  Eduardo Morais},
  title        = {Adaptive key recovery attacks on NTRU-based somewhat homomorphic encryption
                  schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {127},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/127},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DahabGM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaiDS15,
  author       = {Wei Dai and
                  Yarkin Dor{\"{o}}z and
                  Berk Sunar},
  title        = {Accelerating {SWHE} based PIRs using GPUs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {462},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/462},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DaiDS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaiS15,
  author       = {Wei Dai and
                  Berk Sunar},
  title        = {cuHE: {A} Homomorphic Encryption Accelerator Library},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {818},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/818},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DaiS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaiS15a,
  author       = {Yuanxi Dai and
                  John P. Steinberger},
  title        = {Feistel Networks: Indifferentiability at 10 Rounds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {874},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/874},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DaiS15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaiS15b,
  author       = {Yuanxi Dai and
                  John P. Steinberger},
  title        = {Feistel Networks: Indifferentiability at 8 Rounds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1069},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1069},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DaiS15b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardDNNT15,
  author       = {Ivan Damg{\aa}rd and
                  Kasper Damg{\aa}rd and
                  Kurt Nielsen and
                  Peter Sebastian Nordholt and
                  Tomas Toft},
  title        = {Confidential Benchmarking based on Multiparty Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1006},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1006},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardDNNT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardN15,
  author       = {Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen},
  title        = {Unconditionally Secure Computation with Reduced Interaction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {630},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/630},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardNP15,
  author       = {Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen and
                  Antigoni Polychroniadou},
  title        = {On the Communication required for Unconditionally Secure Multiplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1097},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1097},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardNP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardZ15,
  author       = {Ivan Damg{\aa}rd and
                  Rasmus Winther Zakarias},
  title        = {Fast Oblivious {AES{\textbackslash}{\textbackslash}A} dedicated application
                  of the MiniMac protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {989},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/989},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DanezisM15,
  author       = {George Danezis and
                  Sarah Meiklejohn},
  title        = {Centrally Banked Cryptocurrencies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {502},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/502},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DanezisM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DangTDN15,
  author       = {Thuong T. Dang and
                  Tri T. Ton and
                  Van H. Dang and
                  Thuc Dinh Nguyen},
  title        = {{SOME} {REMARKS} {ON} {THE} {LOGARITHMIC} {SIGNATURES} {OF} {FINITE}
                  {ABELIAN} {GROUPS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {962},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/962},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DangTDN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DangerGHMN15,
  author       = {Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Philippe Hoogvorst and
                  C{\'{e}}dric Murdica and
                  David Naccache},
  title        = {Improving the Big Mac Attack on Elliptic Curve Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {819},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/819},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DangerGHMN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DasMM15,
  author       = {Sourav Das and
                  Subhamoy Maitra and
                  Willi Meier},
  title        = {Higher Order Differential Analysis of {NORX}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {186},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/186},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DasMM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DasRM15,
  author       = {Poulami Das and
                  Debapriya Basu Roy and
                  Debdeep Mukhopadhyay},
  title        = {Exploiting the Order of Multiplier Operands: {A} Low Cost Approach
                  for {HCCA} Resistance},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {925},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/925},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DasRM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DataPP15,
  author       = {Deepesh Data and
                  Manoj Prabhakaran and
                  Vinod M. Prabhakaran},
  title        = {On the Communication Complexity of Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {391},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/391},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DataPP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DattaDM15,
  author       = {Pratish Datta and
                  Ratna Dutta and
                  Sourav Mukhopadhyay},
  title        = {Fully Secure Unbounded Revocable Attribute-Based Encryption in Prime
                  Order Bilinear Groups via Subset Difference Method},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {293},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/293},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DattaDM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DattaDM15a,
  author       = {Pratish Datta and
                  Ratna Dutta and
                  Sourav Mukhopadhyay},
  title        = {General Circuit Realizing Compact Revocable Attribute-Based Encryption
                  from Multilinear Maps},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {884},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/884},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DattaDM15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DattaDM15b,
  author       = {Pratish Datta and
                  Ratna Dutta and
                  Sourav Mukhopadhyay},
  title        = {Functional Signcryption: Notion, Construction, and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {913},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/913},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DattaDM15b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DattaDM15c,
  author       = {Pratish Datta and
                  Ratna Dutta and
                  Sourav Mukhopadhyay},
  title        = {Compact Attribute-Based Encryption and Signcryption for General Circuits
                  from Multilinear Maps},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1188},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1188},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DattaDM15c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DattaDM15d,
  author       = {Pratish Datta and
                  Ratna Dutta and
                  Sourav Mukhopadhyay},
  title        = {Functional Encryption for Inner Product with Full Function Privacy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1255},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1255},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DattaDM15d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DavidNRT15,
  author       = {Bernardo David and
                  Ryo Nishimaki and
                  Samuel Ranellucci and
                  Alain Tapp},
  title        = {Generalizing Efficient Multiparty Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {135},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/135},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DavidNRT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DavidW15,
  author       = {Liron David and
                  Avishai Wool},
  title        = {A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-Dimensional
                  Side-Channel Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1236},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1236},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DavidW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DegabrieleFP15,
  author       = {Jean Paul Degabriele and
                  Pooya Farshim and
                  Bertram Poettering},
  title        = {A More Cautious Approach to Security Against Mass Surveillance},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {748},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/748},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DegabrieleFP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DehnaviRS15,
  author       = {Seyed Mojtaba Dehnavi and
                  Akbar Mahmoodi Rishakani and
                  M. R. Mirzaee Shamsabad},
  title        = {Characterization of {MDS} mappings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {2},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/002},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DehnaviRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DehnaviRS15a,
  author       = {Seyed Mojtaba Dehnavi and
                  Akbar Mahmoodi Rishakani and
                  M. R. Mirzaee Shamsabad},
  title        = {A More Explicit Formula for Linear Probabilities of Modular Addition
                  Modulo a Power of Two},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {26},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/026},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DehnaviRS15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DehnaviRS15b,
  author       = {Seyed Mojtaba Dehnavi and
                  Akbar Mahmoodi Rishakani and
                  M. R. Mirzaee Shamsabad},
  title        = {Bitwise Linear Mappings with Good Cryptographic Properties and Efficient
                  Implementation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {225},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/225},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DehnaviRS15b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DehnaviRSP15,
  author       = {Seyed Mojtaba Dehnavi and
                  Akbar Mahmoodi Rishakani and
                  M. R. Mirzaee Shamsabad and
                  Einollah Pasha},
  title        = {Generalization of Statistical Criteria for Sboxes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {93},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/093},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DehnaviRSP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DehnaviSRD15,
  author       = {Seyed Mojtaba Dehnavi and
                  M. R. Mirzaee Shamsabad and
                  Akbar Mahmoodi Rishakani and
                  Yousef Fekri Dabanloo},
  title        = {Efficient {MDS} Diffusion Layers Through Decomposition of Matrices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {775},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/775},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DehnaviSRD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DelmolinoAKMS15,
  author       = {Kevin Delmolino and
                  Mitchell Arnett and
                  Ahmed E. Kosba and
                  Andrew Miller and
                  Elaine Shi},
  title        = {Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights
                  from a Cryptocurrency Lab},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {460},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/460},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DelmolinoAKMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DelvauxGVHY15,
  author       = {Jeroen Delvaux and
                  Dawu Gu and
                  Ingrid Verbauwhede and
                  Matthias Hiller and
                  Meng{-}Day (Mandel) Yu},
  title        = {Secure Sketch Metamorphosis: Tight Unified Bounds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {854},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/854},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DelvauxGVHY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DemayGMT15,
  author       = {Gr{\'{e}}gory Demay and
                  Peter Gazi and
                  Ueli Maurer and
                  Bj{\"{o}}rn Tackmann},
  title        = {Query-Complexity Amplification for Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {315},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/315},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DemayGMT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DemirelL15,
  author       = {Denise Demirel and
                  Jean Lancrenon},
  title        = {How to Securely Prolong the Computational Bindingness of Pedersen
                  Commitments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {584},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/584},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DemirelL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DerbezF15,
  author       = {Patrick Derbez and
                  Pierre{-}Alain Fouque},
  title        = {Exhausting Demirci-Sel{\c{c}}uk Meet-in-the-Middle Attacks against
                  Reduced-Round {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {259},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/259},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DerbezF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DerbezP15,
  author       = {Patrick Derbez and
                  L{\'{e}}o Perrin},
  title        = {Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced
                  {PRINCE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {239},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/239},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DerbezP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DerlerHS15,
  author       = {David Derler and
                  Christian Hanser and
                  Daniel Slamanig},
  title        = {Revisiting Cryptographic Accumulators, Additional Properties and Relations
                  to other Primitives},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {87},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/087},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DerlerHS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DerlerPSS15,
  author       = {David Derler and
                  Henrich Christopher P{\"{o}}hls and
                  Kai Samelin and
                  Daniel Slamanig},
  title        = {A General Framework for Redactable Signatures and New Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1059},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1059},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DerlerPSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DerlerS15,
  author       = {David Derler and
                  Daniel Slamanig},
  title        = {Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box
                  Construction of Strongly Private Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {843},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/843},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DerlerS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DerlerS15a,
  author       = {David Derler and
                  Daniel Slamanig},
  title        = {Practical Witness Encryption for Algebraic Languages And How to Reply
                  an Unknown Whistleblower},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1073},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1073},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DerlerS15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DevadasDFR15,
  author       = {Srinivas Devadas and
                  Marten van Dijk and
                  Christopher W. Fletcher and
                  Ling Ren},
  title        = {Onion {ORAM:} {A} Constant Bandwidth and Constant Client Storage {ORAM}
                  (without {FHE} or {SWHE)}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {5},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/005},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DevadasDFR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DiazAR15,
  author       = {Jesus Diaz and
                  David Arroyo and
                  Francisco de Borja Rodr{\'{\i}}guez},
  title        = {libgroupsig: An extensible {C} library for group signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1146},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1146},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DiazAR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dichtl15,
  author       = {Markus Dichtl},
  title        = {Fibonacci Ring Oscillators as True Random Number Generators - {A}
                  Security Risk},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {270},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/270},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dichtl15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Diehl15,
  author       = {William Diehl},
  title        = {Implementation of the {SCREAM} Tweakable Block Cipher in {MSP430}
                  Assembly Language},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {761},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/761},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Diehl15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DinUWA15,
  author       = {Nizamud Din and
                  Arif Iqbal Umar and
                  Abdul Waheed and
                  Noor Ul Amin},
  title        = {An Efficient Multi-Message Multi-Receiver Signcryption Scheme with
                  Forward Secrecy on Elliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {655},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/655},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DinUWA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DingCE15,
  author       = {A. Adam Ding and
                  Cong Chen and
                  Thomas Eisenbarth},
  title        = {Simpler, Faster, and More Robust T-test Based Leakage Detection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1215},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1215},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DingCE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DingKOTT15,
  author       = {Jintai Ding and
                  Momonari Kudo and
                  Shinya Okumura and
                  Tsuyoshi Takagi and
                  Chengdong Tao},
  title        = {Cryptanalysis of a public key cryptosystem based on Diophantine equations
                  via weighted {LLL} reduction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1229},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1229},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DingKOTT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DingMU15,
  author       = {Jintai Ding and
                  Alexei Miasnikov and
                  Alexander Ushakov},
  title        = {A Linear Attack on a Key Exchange Protocol Using Extensions of Matrix
                  Semigroups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {18},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/018},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DingMU15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DinuCKPGB15,
  author       = {Daniel Dinu and
                  Yann Le Corre and
                  Dmitry Khovratovich and
                  L{\'{e}}o Perrin and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Alex Biryukov},
  title        = {Triathlon of Lightweight Block Ciphers for the Internet of Things},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {209},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/209},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DinuCKPGB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DinurDGS15,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Masha Gutman and
                  Adi Shamir},
  title        = {Improved Top-Down Techniques in Differential Cryptanalysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {268},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/268},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DinurDGS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DinurDKL15,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Thorsten Kranz and
                  Gregor Leander},
  title        = {Decomposing the {ASASA} Block Cipher Construction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {507},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/507},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DinurDKL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DinurDKS15,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  title        = {New Attacks on Feistel Structures with Improved Memory Complexities},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {146},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/146},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DinurDKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DinurLMW15,
  author       = {Itai Dinur and
                  Yunwen Liu and
                  Willi Meier and
                  Qingju Wang},
  title        = {Optimized Interpolation Attacks on LowMC},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {418},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/418},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DinurLMW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DmukhDM15,
  author       = {Andrey Dmukh and
                  Denis Dygin and
                  Grigory B. Marshalko},
  title        = {A lightweight-friendly modifcation of {GOST} block cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {65},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/065},
  timestamp    = {Thu, 19 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DmukhDM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEM15,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  title        = {Related-Key Forgeries for Pr{\o}st-OTR},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {91},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/091},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEM15a,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  title        = {Forgery Attacks on round-reduced {ICEPOLE-128}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {392},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/392},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEM15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEM15b,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  title        = {Higher-order cryptanalysis of LowMC},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {407},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/407},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEM15b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEM15c,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  title        = {Analysis of the Kupyna-256 Hash Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {956},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/956},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEM15c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEM15d,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  title        = {Heuristic Tool for Linear Cryptanalysis with Applications to {CAESAR}
                  Candidates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1200},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1200},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEM15d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEMM15,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Stefan Mangard and
                  Florian Mendel},
  title        = {On the Security of Fresh Re-keying to Counteract Side-Channel and
                  Fault Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {33},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/033},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEMM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEMS15,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel and
                  Martin Schl{\"{a}}ffer},
  title        = {Cryptanalysis of Ascon},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {30},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/030},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisLSS15,
  author       = {Yevgeniy Dodis and
                  Tianren Liu and
                  Martijn Stam and
                  John P. Steinberger},
  title        = {Indifferentiability of Confusion-Diffusion Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {680},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/680},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisLSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisMS15,
  author       = {Yevgeniy Dodis and
                  Ilya Mironov and
                  Noah Stephens{-}Davidowitz},
  title        = {Message Transmission with Reverse Firewalls - Secure Communication
                  on Corrupted Machines},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {548},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/548},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DolevL15,
  author       = {Shlomi Dolev and
                  Yin Li},
  title        = {Secret Shared Random Access Machine},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {292},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/292},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DolevL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DongK15,
  author       = {Changyu Dong and
                  Franziskus Kiefer},
  title        = {Secure Set-based Policy Checking and Its Application to Password Registration},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {945},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/945},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DongK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DongLJW15,
  author       = {Xiaoyang Dong and
                  Leibo Li and
                  Keting Jia and
                  Xiaoyun Wang},
  title        = {Improved Attacks on Reduced-Round Camellia-128/192/256},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {896},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/896},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DongLJW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DorozSC15,
  author       = {Yarkin Dor{\"{o}}z and
                  Berk Sunar and
                  Gizem S. {\c{C}}etin},
  title        = {On-the-fly Homomorphic Batching/Unbatching},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1197},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1197},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DorozSC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dottling15,
  author       = {Nico D{\"{o}}ttling},
  title        = {Low Noise {LPN:} {KDM} Secure Public Key Encryption and Sample Amplification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {13},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/013},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dottling15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingS15,
  author       = {Nico D{\"{o}}ttling and
                  Dominique Schr{\"{o}}der},
  title        = {Efficient Pseudorandom Functions via On-the-Fly Adaptation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1185},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1185},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DowlingFGS15,
  author       = {Benjamin Dowling and
                  Marc Fischlin and
                  Felix G{\"{u}}nther and
                  Douglas Stebila},
  title        = {A Cryptographic Analysis of the {TLS} 1.3 Handshake Protocol Candidates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {914},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/914},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DowlingFGS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DowlingS15,
  author       = {Benjamin Dowling and
                  Douglas Stebila},
  title        = {Modelling ciphersuite and version negotiation in the {TLS} protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {652},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/652},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DowlingS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DowlingSZ15,
  author       = {Benjamin Dowling and
                  Douglas Stebila and
                  Greg Zaverucha},
  title        = {Authenticated Network Time Synchronization},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {171},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/171},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DowlingSZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DowsleyLN15,
  author       = {Rafael Dowsley and
                  Felipe Lacerda and
                  Anderson C. A. Nascimento},
  title        = {Commitment and Oblivious Transfer in the Bounded Storage Model with
                  Errors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {952},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/952},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DowsleyLN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DowsleyMN15,
  author       = {Rafael Dowsley and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Tobias Nilges},
  title        = {Weakening the Isolation Assumption of Tamper-proof Hardware Tokens},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {104},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/104},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DowsleyMN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuWZZ15,
  author       = {Yusong Du and
                  Baodian Wei and
                  Fangguo Zhang and
                  Huang Zhang},
  title        = {On the (Fast) Algebraic Immunity of Boolean Power Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {435},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/435},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuWZZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuWZZ15a,
  author       = {Yusong Du and
                  Baodian Wei and
                  Fangguo Zhang and
                  Huang Zhang},
  title        = {On the Resistance of Prime-variable Rotation Symmetric Boolean Functions
                  against Fast Algebraic Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {436},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/436},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuWZZ15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DubrovaH15,
  author       = {Elena Dubrova and
                  Martin Hell},
  title        = {Espresso: {A} Stream Cipher for 5G Wireless Communication Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {241},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/241},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DubrovaH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DubrovaNCFS15,
  author       = {Elena Dubrova and
                  Mats N{\"{a}}slund and
                  Gunnar Carlsson and
                  John Fornehed and
                  Ben J. M. Smeets},
  title        = {Remotely Managed Logic Built-In Self-Test for Secure {M2M} Communications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {185},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/185},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DubrovaNCFS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DubrovaNSL15,
  author       = {Elena Dubrova and
                  Mats N{\"{a}}slund and
                  G{\"{o}}ran Selander and
                  Fredrik Lindqvist},
  title        = {Cryptographically Secure {CRC} for Lightweight Message Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {35},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/035},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DubrovaNSL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DubrovaNSL15a,
  author       = {Elena Dubrova and
                  Mats N{\"{a}}slund and
                  G{\"{o}}ran Selander and
                  Fredrik Lindqvist},
  title        = {Lightweight CRC-based Message Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1138},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1138},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DubrovaNSL15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DucFS15,
  author       = {Alexandre Duc and
                  Sebastian Faust and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Making Masking Security Proofs Concrete Or How to Evaluate the Security
                  of any Leaking Device},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {119},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/119},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DucFS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DucTV15,
  author       = {Alexandre Duc and
                  Florian Tram{\`{e}}r and
                  Serge Vaudenay},
  title        = {Better Algorithms for {LWE} and {LWR}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {56},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/056},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DucTV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DucasP15a,
  author       = {L{\'{e}}o Ducas and
                  Thomas Prest},
  title        = {Fast Fourier Orthogonalization},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1014},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1014},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DucasP15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DugardinPNBDGCT15,
  author       = {Margaux Dugardin and
                  Louiza Papachristodoulou and
                  Zakaria Najm and
                  Lejla Batina and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Jean{-}Christophe Courr{\`{e}}ge and
                  Carine Therond},
  title        = {Dismantling real-world {ECC} with Horizontal and Vertical Template
                  Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1001},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1001},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DugardinPNBDGCT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DullHHHPSS15,
  author       = {Michael D{\"{u}}ll and
                  Bj{\"{o}}rn Haase and
                  Gesine Hinterw{\"{a}}lder and
                  Michael Hutter and
                  Christof Paar and
                  Ana Helena S{\'{a}}nchez and
                  Peter Schwabe},
  title        = {High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {343},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/343},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DullHHHPSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuquesneG15,
  author       = {Sylvain Duquesne and
                  Loubna Ghammam},
  title        = {Memory-saving computation of the pairing fi nal exponentiation on
                  {BN} curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {192},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/192},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuquesneG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuquesneMHR15,
  author       = {Sylvain Duquesne and
                  Nadia El Mrabet and
                  Safia Haloui and
                  Franck Rondepierre},
  title        = {Choosing and generating parameters for low level pairing implementation
                  on {BN} curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1212},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1212},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuquesneMHR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DurnogaDKZ15,
  author       = {Konrad Durnoga and
                  Stefan Dziembowski and
                  Tomasz Kazana and
                  Michal Zajac},
  title        = {One Time Programs with Limited Memory},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {238},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/238},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DurnogaDKZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DurnogaKZZ15,
  author       = {Konrad Durnoga and
                  Tomasz Kazana and
                  Michal Zajac and
                  Maciej Zdanowicz},
  title        = {Leakage-Resilient Cryptography with Key Derived from Sensitive Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {228},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/228},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DurnogaKZZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DurvauxS15,
  author       = {Fran{\c{c}}ois Durvaux and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {From Improved Leakage Detection to the Detection of Points of Interests
                  in Leakage Traces},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {536},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/536},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DurvauxS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DurvauxS15a,
  author       = {Fran{\c{c}}ois Durvaux and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Towards Easy Leakage Certification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {537},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/537},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DurvauxS15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dutta15,
  author       = {Pranjal Dutta},
  title        = {Modular Inversion Hidden Number Problem- {A} Lattice Approach},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1140},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1140},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dutta15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuttaP15a,
  author       = {Avijit Dutta and
                  Goutam Paul},
  title        = {Lifting the Security of {NI-MAC} Beyond Birthday Bound},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1016},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1016},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuttaP15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DworkinP15,
  author       = {Morris Dworkin and
                  Ray A. Perlner},
  title        = {Analysis of {VAES3} {(FF2)}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {306},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/306},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DworkinP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DykaBWL15,
  author       = {Zoya Dyka and
                  Thomas Basmer and
                  Christian Wittke and
                  Peter Langend{\"{o}}rfer},
  title        = {Individualizing Electrical Circuits of Cryptographic Devices as a
                  Means to Hinder Tampering Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {442},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/442},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DykaBWL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EatonS15,
  author       = {Edward Eaton and
                  Fang Song},
  title        = {Making Existential-Unforgeable Signatures Strongly Unforgeable in
                  the Quantum Random-Oracle Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {878},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/878},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EatonS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EgeEB15,
  author       = {Baris Ege and
                  Thomas Eisenbarth and
                  Lejla Batina},
  title        = {Near Collision Side Channel Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {511},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/511},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EgeEB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EisenbarthMS15,
  author       = {Thomas Eisenbarth and
                  Aaron Meyerowitz and
                  Rainer Steinwandt},
  title        = {On the security margin of {MAC} striping},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {89},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/089},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EisenbarthMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ekera15,
  author       = {Martin Eker{\aa}},
  title        = {Computing information on domain parameters from public keys selected
                  uniformly at random},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {879},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/879},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ekera15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EliasLOS15,
  author       = {Yara Elias and
                  Kristin E. Lauter and
                  Ekin Ozman and
                  Katherine E. Stange},
  title        = {Provably weak instances of Ring-LWE},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {106},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/106},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EliasLOS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EliasLOS15a,
  author       = {Yara Elias and
                  Kristin E. Lauter and
                  Ekin Ozman and
                  Katherine E. Stange},
  title        = {Ring-LWE Cryptography for the Number Theorist},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {758},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/758},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EliasLOS15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ElkhiyaouiOM15,
  author       = {Kaoutar Elkhiyaoui and
                  Melek {\"{O}}nen and
                  Refik Molva},
  title        = {Online-Offline Homomorphic Signatures for Polynomial Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {954},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/954},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ElkhiyaouiOM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EmmadiGNS15,
  author       = {Nitesh Emmadi and
                  Praveen Gauravaram and
                  Harika Narumanchi and
                  Habeeb Syed},
  title        = {Updates on Sorting of Fully Homomorphic Encrypted Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {995},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/995},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EmmadiGNS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EsginK15,
  author       = {Muhammed F. Esgin and
                  Orhun Kara},
  title        = {Practical Cryptanalysis of Full Sprout with {TMD} Tradeoff Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {289},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/289},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EsginK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EsginKU15,
  author       = {Muhammed F. Esgin and
                  Mehmet S. Kiraz and
                  Osmanbey Uzunkol},
  title        = {A New Partial Key Exposure Attack on Multi-power {RSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {642},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/642},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EsginKU15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EspitauFK15,
  author       = {Thomas Espitau and
                  Pierre{-}Alain Fouque and
                  Pierre Karpman},
  title        = {Higher-Order Differential Meet-in-The-Middle Preimage Attacks on {SHA-1}
                  and {BLAKE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {515},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/515},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EspitauFK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EtemadK15,
  author       = {Mohammad Etemad and
                  Alptekin K{\"{u}}p{\c{c}}{\"{u}}},
  title        = {Database Outsourcing with Hierarchical Authenticated Data Structures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {351},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/351},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EtemadK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EtemadK15a,
  author       = {Mohammad Etemad and
                  Alptekin K{\"{u}}p{\c{c}}{\"{u}}},
  title        = {Efficient Key Authentication Service for Secure End-to-end Communications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {833},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/833},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EtemadK15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EtemadK15b,
  author       = {Mohammad Etemad and
                  Alptekin K{\"{u}}p{\c{c}}{\"{u}}},
  title        = {Generic Efficient Dynamic Proofs of Retrievability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {880},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/880},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EtemadK15b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EverspaughCSJR15,
  author       = {Adam Everspaugh and
                  Rahul Chatterjee and
                  Samuel Scott and
                  Ari Juels and
                  Thomas Ristenpart},
  title        = {The Pythia {PRF} Service},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {644},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/644},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EverspaughCSJR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EzermanLLNW15,
  author       = {Martianus Frederic Ezerman and
                  Hyung Tae Lee and
                  San Ling and
                  Khoa Nguyen and
                  Huaxiong Wang},
  title        = {A Provably Secure Group Signature Scheme from Code-Based Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {479},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/479},
  timestamp    = {Wed, 21 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/EzermanLLNW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaberJKNRS15,
  author       = {Sky Faber and
                  Stanislaw Jarecki and
                  Hugo Krawczyk and
                  Quan Nguyen and
                  Marcel{-}Catalin Rosu and
                  Michael Steiner},
  title        = {Rich Queries on Encrypted Data: Beyond Exact Matches},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {927},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/927},
  timestamp    = {Sat, 23 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FaberJKNRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaonioN15,
  author       = {Antonio Faonio and
                  Jesper Buus Nielsen},
  title        = {Fully Leakage-Resilient Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1151},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1151},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FaonioN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaonioNV15,
  author       = {Antonio Faonio and
                  Jesper Buus Nielsen and
                  Daniele Venturi},
  title        = {Predictable Arguments of Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {740},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/740},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FaonioNV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FauskangerS15,
  author       = {Stian Fauskanger and
                  Igor A. Semaev},
  title        = {Statistical and Algebraic Properties of {DES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {803},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/803},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FauskangerS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustMV15,
  author       = {Sebastian Faust and
                  Daniel Masny and
                  Daniele Venturi},
  title        = {Chosen-Ciphertext Security from Subset Sum},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1223},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1223},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FaustMV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FauziL15,
  author       = {Prastudy Fauzi and
                  Helger Lipmaa},
  title        = {Efficient Culpably Sound {NIZK} Shuffle Argument without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1112},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1112},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FauziL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FehrF15,
  author       = {Serge Fehr and
                  Max Fillinger},
  title        = {Multi-Prover Commitments Against Non-Signaling Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {501},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/501},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FehrF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FehrF15a,
  author       = {Victoria Fehr and
                  Marc Fischlin},
  title        = {Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {765},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/765},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FehrF15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FehrK0ZZ15,
  author       = {Serge Fehr and
                  Jonathan Katz and
                  Fang Song and
                  Hong{-}Sheng Zhou and
                  Vassilis Zikas},
  title        = {Feasibility and Completeness of Cryptographic Tasks in the Quantum
                  World},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {385},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/385},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FehrK0ZZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FerradiGMNW15,
  author       = {Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  Diana Maimut and
                  David Naccache and
                  Amaury de Wargny},
  title        = {Regulating the Pace of von Neumann Correctors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {849},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/849},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FerradiGMNW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FerradiGMNZ15,
  author       = {Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  Diana Maimut and
                  David Naccache and
                  Hang Zhou},
  title        = {Backtracking-Assisted Multiplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {787},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/787},
  timestamp    = {Fri, 03 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FerradiGMNZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FerradiGNT15,
  author       = {Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache and
                  Assia Tria},
  title        = {When Organized Crime Applies Academic Results - {A} Forensic Analysis
                  of an In-Card Listening Device},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {963},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/963},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FerradiGNT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FerreiraRLD15,
  author       = {Bernardo Ferreira and
                  Jo{\~{a}}o Rodrigues and
                  Jo{\~{a}}o Leit{\~{a}}o and
                  Henrique Jo{\~{a}}o L. Domingos},
  title        = {Privacy-Preserving Content-Based Image Retrieval in the Cloud (Extended
                  Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {710},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/710},
  timestamp    = {Fri, 24 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FerreiraRLD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FindST15,
  author       = {Magnus Gausdal Find and
                  Daniel Smith{-}Tone and
                  Meltem S{\"{o}}nmez Turan},
  title        = {The Number of Boolean Functions with Multiplicative Complexity 2},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1041},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1041},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FindST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FischFN15,
  author       = {Ben Fisch and
                  Daniel Freund and
                  Moni Naor},
  title        = {Secure Physical Computation using Disposable Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {226},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/226},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FischFN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FleischhackerKM15,
  author       = {Nils Fleischhacker and
                  Johannes Krupp and
                  Giulio Malavolta and
                  Jonas Schneider and
                  Dominique Schr{\"{o}}der and
                  Mark Simkin},
  title        = {Efficient Unlinkable Sanitizable Signatures from Signatures with Rerandomizable
                  Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {395},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/395},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FleischhackerKM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FletcherNRSS15,
  author       = {Christopher W. Fletcher and
                  Muhammad Naveed and
                  Ling Ren and
                  Elaine Shi and
                  Emil Stefanov},
  title        = {Bucket {ORAM:} Single Online Roundtrip, Constant Bandwidth Oblivious
                  {RAM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1065},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1065},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FletcherNRSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FloriPRE15,
  author       = {Jean{-}Pierre Flori and
                  J{\'{e}}r{\^{o}}me Pl{\^{u}}t and
                  Jean{-}Ren{\'{e}} Reinhard and
                  Martin Eker{\aa}},
  title        = {Diversity and Transparency for {ECC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {659},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/659},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FloriPRE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Fluhrer15,
  author       = {Scott R. Fluhrer},
  title        = {Quantum Cryptanalysis of {NTRU}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {676},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/676},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Fluhrer15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Fluhrer15a,
  author       = {Scott R. Fluhrer},
  title        = {Scalar Blinding on Elliptic Curves based on Primes with Special Structure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {801},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/801},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Fluhrer15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ForteRS15,
  author       = {Pasquale Forte and
                  Diego Romano and
                  Giovanni Schmid},
  title        = {Beyond Bitcoin - Part {I:} {A} critical look at blockchain-based systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1164},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1164},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ForteRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FouqueGMN15,
  author       = {Pierre{-}Alain Fouque and
                  Sylvain Guilley and
                  C{\'{e}}dric Murdica and
                  David Naccache},
  title        = {Safe-Errors on {SPA} Protected implementations with the Atomicity
                  Technique},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {794},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/794},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FouqueGMN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FouqueV15,
  author       = {Pierre{-}Alain Fouque and
                  Thomas Vannet},
  title        = {Improving Key Recovery to 784 and 799 rounds of Trivium using Optimized
                  Cube Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {312},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/312},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FouqueV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FrederiksenJNT15,
  author       = {Tore Kasper Frederiksen and
                  Thomas P. Jakobsen and
                  Jesper Buus Nielsen and
                  Roberto Trifiletti},
  title        = {TinyLEGO: An Interactive Garbling Scheme for Maliciously Secure Two-party
                  Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {309},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/309},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FrederiksenJNT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FrederiksenJNT15a,
  author       = {Tore Kasper Frederiksen and
                  Thomas P. Jakobsen and
                  Jesper Buus Nielsen and
                  Roberto Trifiletti},
  title        = {On the Complexity of Additively Homomorphic {UC} Commitments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {694},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/694},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FrederiksenJNT15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FrederiksenKOS15,
  author       = {Tore Kasper Frederiksen and
                  Marcel Keller and
                  Emmanuela Orsini and
                  Peter Scholl},
  title        = {A Unified Approach to {MPC} with Preprocessing using {OT}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {901},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/901},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FrederiksenKOS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FreyreDC15,
  author       = {Pablo Freyre and
                  Nelson D{\'{\i}}az and
                  Oristela Cuellar},
  title        = {Variations to the Cryptographics Algorithms {AES} and Twofish},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1080},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1080},
  timestamp    = {Tue, 21 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FreyreDC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuchsbauerHS15,
  author       = {Georg Fuchsbauer and
                  Christian Hanser and
                  Daniel Slamanig},
  title        = {Practical Round-Optimal Blind Signatures in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {626},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/626},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuchsbauerHS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuhrLS15,
  author       = {Thomas Fuhr and
                  Ga{\"{e}}tan Leurent and
                  Valentin Suder},
  title        = {Collision Attacks against {CAESAR} Candidates - Forgery and Key-Recovery
                  against {AEZ} and Marble},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1193},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1193},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuhrLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FujisakiX15,
  author       = {Eiichiro Fujisaki and
                  Keita Xagawa},
  title        = {Note on the {RKA} security of Continuously Non-Malleable Key-Derivation
                  Function from {PKC} 2015},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1088},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1088},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FujisakiX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FullerH15,
  author       = {Benjamin Fuller and
                  Ariel Hamlin},
  title        = {Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {857},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/857},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FullerH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GagliardoniHS15,
  author       = {Tommaso Gagliardoni and
                  Andreas H{\"{u}}lsing and
                  Christian Schaffner},
  title        = {Semantic Security and Indistinguishability in the Quantum World},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {355},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/355},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GagliardoniHS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithG15,
  author       = {Steven D. Galbraith and
                  Pierrick Gaudry},
  title        = {Recent progress on the elliptic curve discrete logarithm problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1022},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1022},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithS15,
  author       = {Steven D. Galbraith and
                  Barak Shani},
  title        = {The Multivariate Hidden Number Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {111},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/111},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithWZ15,
  author       = {Steven D. Galbraith and
                  Ping Wang and
                  Fangguo Zhang},
  title        = {Computing Elliptic Curve Discrete Logarithms with Improved Baby-step
                  Giant-step Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {605},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/605},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithWZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaleaMPT15,
  author       = {Jake Longo and
                  Elke De Mulder and
                  Daniel Page and
                  Michael Tunstall},
  title        = {SoC it to {EM:} electromagnetic side-channel attacks on a complex
                  system-on-chip},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {561},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/561},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaleaMPT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GanjiTS15,
  author       = {Fatemeh Ganji and
                  Shahin Tajik and
                  Jean{-}Pierre Seifert},
  title        = {{PAC} Learning of Arbiter PUFs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {378},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/378},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GanjiTS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gao15,
  author       = {Yansong Gao},
  title        = {Secure Key Exchange Protocol based on Virtual Proof of Reality},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {524},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/524},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gao15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaoRAA15,
  author       = {Yansong Gao and
                  Damith Chinthana Ranasinghe and
                  Said F. Al{-}Sarawi and
                  Derek Abbott},
  title        = {Secure Goods Supply Chain and Key Exchange with Virtual Proof of Reality},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1239},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1239},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaoRAA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaoRLAKA15,
  author       = {Yansong Gao and
                  Damith Chinthana Ranasinghe and
                  Gefei Li and
                  Said F. Al{-}Sarawi and
                  Omid Kavehei and
                  Derek Abbott},
  title        = {A Challenge Obfuscation Method for Thwarting Model Building Attacks
                  on PUFs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {471},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/471},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaoRLAKA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarayKTZ15,
  author       = {Juan A. Garay and
                  Jonathan Katz and
                  Bj{\"{o}}rn Tackmann and
                  Vassilis Zikas},
  title        = {How Fair is Your Protocol? {A} Utility-based Approach to Protocol
                  Optimality},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {187},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/187},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarayKTZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarayTZ15,
  author       = {Juan A. Garay and
                  Bj{\"{o}}rn Tackmann and
                  Vassilis Zikas},
  title        = {Fair Distributed Computation of Reactive Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {807},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/807},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarayTZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargLO15,
  author       = {Sanjam Garg and
                  Steve Lu and
                  Rafail Ostrovsky},
  title        = {Black-Box Garbled {RAM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {307},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/307},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GargLO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargMP15,
  author       = {Sanjam Garg and
                  Payman Mohassel and
                  Charalampos Papamanthou},
  title        = {{TWORAM:} Round-Optimal Oblivious {RAM} with Applications to Searchable
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1010},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1010},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargMP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargP15,
  author       = {Sanjam Garg and
                  Omkant Pandey},
  title        = {Incremental Program Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {997},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/997},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargPS15,
  author       = {Sanjam Garg and
                  Omkant Pandey and
                  Akshayaram Srinivasan},
  title        = {On the Exact Cryptographic Hardness of Finding a Nash Equilibrium},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1078},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1078},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gavin15,
  author       = {G{\'{e}}rald Gavin},
  title        = {A general framework for building noise-free homomorphic cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {821},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/821},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gavin15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GayKW15,
  author       = {Romain Gay and
                  Iordanis Kerenidis and
                  Hoeteck Wee},
  title        = {Communication Complexity of Conditional Disclosure of Secrets and
                  Attribute-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {665},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/665},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GayKW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaziLSST15,
  author       = {Peter Gazi and
                  Jooyoung Lee and
                  Yannick Seurin and
                  John P. Steinberger and
                  Stefano Tessaro},
  title        = {Relaxing Full-Codebook Security: {A} Refined Analysis of Key-Length
                  Extension Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {397},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/397},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaziLSST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaziPT15,
  author       = {Peter Gazi and
                  Krzysztof Pietrzak and
                  Stefano Tessaro},
  title        = {Tight Bounds for Keyed Sponges and Truncated {CBC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {53},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/053},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaziPT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaziPT15a,
  author       = {Peter Gazi and
                  Krzysztof Pietrzak and
                  Stefano Tessaro},
  title        = {Generic Security of {NMAC} and {HMAC} with Input Whitening},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {881},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/881},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaziPT15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GenkinIPST15,
  author       = {Daniel Genkin and
                  Yuval Ishai and
                  Manoj Prabhakaran and
                  Amit Sahai and
                  Eran Tromer},
  title        = {Circuits Resilient to Additive Attacks with Applications to Secure
                  Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {154},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/154},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GenkinIPST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GenkinPPT15,
  author       = {Daniel Genkin and
                  Lev Pachmanov and
                  Itamar Pipman and
                  Eran Tromer},
  title        = {Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks
                  on Windowed Exponentiation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {170},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/170},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GenkinPPT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GeorgievaP15,
  author       = {Mariya Georgieva and
                  Fr{\'{e}}d{\'{e}}ric de Portzamparc},
  title        = {Toward Secure Implementation of McEliece Decryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {271},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/271},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GeorgievaP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GeraudMN15,
  author       = {R{\'{e}}mi G{\'{e}}raud and
                  Diana Maimut and
                  David Naccache},
  title        = {Double-Speed Barrett Moduli},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {785},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/785},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GeraudMN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GeraudMNCS15,
  author       = {R{\'{e}}mi G{\'{e}}raud and
                  Diana{-}Stefania Maimut and
                  David Naccache and
                  Rodrigo Portella do Canto and
                  Emil Simion},
  title        = {Applying Cryptographic Acceleration Techniques to Error Correction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {886},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/886},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GeraudMNCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GervaisRKC15,
  author       = {Arthur Gervais and
                  Hubert Ritzdorf and
                  Ghassan O. Karame and
                  Srdjan Capkun},
  title        = {Tampering with the Delivery of Blocks and Transactions in Bitcoin},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {578},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/578},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GervaisRKC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GervaisRLC15,
  author       = {Arthur Gervais and
                  Hubert Ritzdorf and
                  Mario Lucic and
                  Srdjan Capkun},
  title        = {Quantifying Location Privacy Leakage from Transaction Prices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {496},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/496},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GervaisRLC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ghadafi15,
  author       = {Essam Ghadafi},
  title        = {Short Structure-Preserving Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {961},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/961},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ghadafi15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GhaemMaghamiHM15,
  author       = {Seyed Salman Sajjadi GhaemMaghami and
                  Afrooz Haghbin and
                  Mahtab Mirmohseni},
  title        = {Traceability Improvements of a New {RFID} Protocol Based On {EPC}
                  {C1G2}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {872},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/872},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GhaemMaghamiHM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GhalatyYS15,
  author       = {Nahid Farhady Ghalaty and
                  Bilgiday Yuce and
                  Patrick Schaumont},
  title        = {Analyzing the Efficiency of Biased-Fault Based Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {663},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/663},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GhalatyYS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GhoshGOT15,
  author       = {Esha Ghosh and
                  Michael T. Goodrich and
                  Olga Ohrimenko and
                  Roberto Tamassia},
  title        = {Fully-Dynamic Verifiable Zero-Knowledge Order Queries for Network
                  Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {283},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/283},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GhoshGOT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GhoshK15,
  author       = {Satrajit Ghosh and
                  Aniket Kate},
  title        = {Post-Quantum Secure Onion Routing (Future Anonymity in Today's Budget)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {8},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/008},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GhoshK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GhoshKDV15,
  author       = {Santosh Ghosh and
                  Amit Kumar and
                  Amitabh Das and
                  Ingrid Verbauwhede},
  title        = {On the Implementation of Unified Arithmetic on Binary Huff Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {423},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/423},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GhoshKDV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GhoshOPTT15,
  author       = {Esha Ghosh and
                  Olga Ohrimenko and
                  Dimitrios Papadopoulos and
                  Roberto Tamassia and
                  Nikos Triandopoulos},
  title        = {Zero-Knowledge Accumulators and Set Operations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {404},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/404},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GhoshOPTT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GhoshOT15,
  author       = {Esha Ghosh and
                  Olga Ohrimenko and
                  Roberto Tamassia},
  title        = {Authenticated Range {\textbackslash}{\&} Closest Point Queries
                  in Zero-Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1183},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1183},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GhoshOT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GiacomelliOR15,
  author       = {Irene Giacomelli and
                  Ruxandra F. Olimid and
                  Samuel Ranellucci},
  title        = {Security of Linear Secret-Sharing Schemes against Mass Surveillance},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {683},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/683},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GiacomelliOR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GilbertPT15,
  author       = {Henri Gilbert and
                  J{\'{e}}r{\^{o}}me Pl{\^{u}}t and
                  Joana Treger},
  title        = {Key-Recovery Attack on the {ASASA} Cryptosystem with Expanding S-boxes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {567},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/567},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GilbertPT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GilboaG15,
  author       = {Shoni Gilboa and
                  Shay Gueron},
  title        = {Distinguishing a truncated random permutation from a random function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {773},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/773},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GilboaG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GiustolisiIR15,
  author       = {Rosario Giustolisi and
                  Vincenzo Iovino and
                  Peter B. R{\o}nne},
  title        = {On the Possibility of Non-Interactive E-Voting in the Public-key Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1119},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1119},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GiustolisiIR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GjosteenL15,
  author       = {Kristian Gj{\o}steen and
                  Anders Smedstuen Lund},
  title        = {The Norwegian Internet Voting Protocol: {A} new Instantiation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {503},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/503},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GjosteenL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldwasserK15,
  author       = {Shafi Goldwasser and
                  Yael Tauman Kalai},
  title        = {Cryptographic Assumptions: {A} Position Paper},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {907},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/907},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldwasserK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldwasserKP15,
  author       = {Shafi Goldwasser and
                  Yael Tauman Kalai and
                  Sunoo Park},
  title        = {Adaptively Secure Coin-Flipping, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {202},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/202},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldwasserKP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GongCDCT15,
  author       = {Junqing Gong and
                  Jie Chen and
                  Xiaolei Dong and
                  Zhenfu Cao and
                  Shaohua Tang},
  title        = {Extended Nested Dual System Groups, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {820},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/820},
  timestamp    = {Thu, 07 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GongCDCT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GongDCC15,
  author       = {Junqing Gong and
                  Xiaolei Dong and
                  Zhenfu Cao and
                  Jie Chen},
  title        = {Almost-tight Identity Based Encryption against Selective Opening Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {904},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/904},
  timestamp    = {Thu, 07 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GongDCC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GonzalezHR15,
  author       = {Alonso Gonz{\'{a}}lez and
                  Alejandro Hevia and
                  Carla R{\`{a}}fols},
  title        = {{QA-NIZK} Arguments in Asymmetric Groups: New Tools and New Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {910},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/910},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GonzalezHR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gope15,
  author       = {Prosanta Gope},
  title        = {Integrity-Aware Parallelizable Cipher Feedback Mode for Real-time
                  Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {897},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/897},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gope15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GopularamN15,
  author       = {Bhanu Prakash Gopularam and
                  Nalini N},
  title        = {Improved Data Confidentiality of Audit Trail Data in Multi-Tenant
                  Cloud},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1175},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1175},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GopularamN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gor-nikMOP15,
  author       = {Andreas Gornik and
                  Amir Moradi and
                  J{\"{u}}rgen Oehm and
                  Christof Paar},
  title        = {A Hardware-based Countermeasure to Reduce Side-Channel Leakage - Design,
                  Implementation, and Evaluation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {348},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/348},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gor-nikMOP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GorbunovM15,
  author       = {Sergey Gorbunov and
                  Silvio Micali},
  title        = {Democoin: {A} Publicly Verifiable and Jointly Serviced Cryptocurrency},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {521},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/521},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GorbunovM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GorbunovVW15,
  author       = {Sergey Gorbunov and
                  Vinod Vaikuntanathan and
                  Hoeteck Wee},
  title        = {Predicate Encryption for Circuits from {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {29},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/029},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GorbunovVW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GordonKLSZ15,
  author       = {S. Dov Gordon and
                  Jonathan Katz and
                  Feng{-}Hao Liu and
                  Elaine Shi and
                  Hong{-}Sheng Zhou},
  title        = {Multi-Client Verifiable Computation with Stronger Security Guarantees},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {142},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/142},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GordonKLSZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GordonLS15,
  author       = {S. Dov Gordon and
                  Feng{-}Hao Liu and
                  Elaine Shi},
  title        = {Constant-Round {MPC} with Fairness and Guarantee of Output Delivery},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {371},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/371},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GordonLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GotoS15,
  author       = {Shota Goto and
                  Junji Shikata},
  title        = {A Compiler of Two-Party Protocols for Composable and Game-Theoretic
                  Security, and Its Application to Oblivious Transfer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {950},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/950},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GotoS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Goyal0015,
  author       = {Vipul Goyal and
                  Divya Gupta and
                  Abhishek Jain},
  title        = {What Information is Leaked under Concurrent Composition?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {420},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/420},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Goyal0015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Goyal015,
  author       = {Vipul Goyal and
                  Abhishek Jain},
  title        = {On Concurrently Secure Computation in the Multiple Ideal Query Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {439},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/439},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Goyal015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Goyal0S15,
  author       = {Vipul Goyal and
                  Divya Gupta and
                  Amit Sahai},
  title        = {Concurrent Secure Computation via Non-Black Box Simulation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1107},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1107},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Goyal0S15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalJK15,
  author       = {Vipul Goyal and
                  Aayush Jain and
                  Dakshita Khurana},
  title        = {Witness Signatures and Non-Malleable Multi-Prover Zero-Knowledge Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1095},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1095},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalJK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalJO15,
  author       = {Vipul Goyal and
                  Aayush Jain and
                  Adam O'Neill},
  title        = {Multi-Input Functional Encryption with Unbounded-Message Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1113},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1113},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalJO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalKMPS15,
  author       = {Vipul Goyal and
                  Dakshita Khurana and
                  Ilya Mironov and
                  Omkant Pandey and
                  Amit Sahai},
  title        = {Do Distributed Differentially-Private Protocols Require Oblivious
                  Transfer?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1090},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1090},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalKMPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalPR15,
  author       = {Vipul Goyal and
                  Omkant Pandey and
                  Silas Richelson},
  title        = {Textbook Non-Malleable Commitments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1178},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1178},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalPR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrangerJMN15,
  author       = {Robert Granger and
                  Philipp Jovanovic and
                  Bart Mennink and
                  Samuel Neves},
  title        = {Improved Masking for Tweakable Blockciphers with Applications to Authenticated
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {999},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/999},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrangerJMN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrangerKZ15,
  author       = {Robert Granger and
                  Thorsten Kleinjung and
                  Jens Zumbr{\"{a}}gel},
  title        = {On the discrete logarithm problem in finite fields of fixed characteristic},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {685},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/685},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrangerKZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GreenE15,
  author       = {Marc Green and
                  Thomas Eisenbarth},
  title        = {Strength in Numbers: Threshold {ECDSA} to Protect Keys in the Cloud},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1169},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1169},
  timestamp    = {Thu, 23 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GreenE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrossHSS15,
  author       = {Hannes Gro{\ss} and
                  Marko H{\"{o}}lbl and
                  Daniel Slamanig and
                  Raphael Spreitzer},
  title        = {Privacy-Aware Authentication in the Internet of Things},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1110},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1110},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrossHSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrossWDE15,
  author       = {Hannes Gro{\ss} and
                  Erich Wenger and
                  Christoph Dobraunig and
                  Christoph Ehrenh{\"{o}}fer},
  title        = {Suit up! Made-to-Measure Hardware Implementations of Ascon},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {34},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/034},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrossWDE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrossoS15,
  author       = {Vincent Grosso and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {ASCA, {SASCA} and {DPA} with Enumeration: Which One Beats the Other
                  and When?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {535},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/535},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrossoS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrossoSF15,
  author       = {Vincent Grosso and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Sebastian Faust},
  title        = {Masking vs. Multiparty Computation: How Large is the Gap for AES?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {492},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/492},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrossoSF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Groth15,
  author       = {Jens Groth},
  title        = {Efficient Fully Structure-Preserving Signatures for Large Messages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {824},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/824},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Groth15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gu15,
  author       = {Chunsheng Gu},
  title        = {Multilinear Maps Using Ideal Lattices without Encodings of Zero},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {23},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/023},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gu15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gu15a,
  author       = {Chunsheng Gu},
  title        = {Ideal Multilinear Maps Based on Ideal Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {269},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/269},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gu15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gu15c,
  author       = {Chunsheng Gu},
  title        = {New multilinear maps from ideal lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {737},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/737},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gu15c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gu15e,
  author       = {Chunsheng Gu},
  title        = {Variation of {GGH15} Multilinear Maps},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1245},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1245},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gu15e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuXZK15,
  author       = {Chun{-}Xiang Gu and
                  Dan Xin and
                  Yonghui Zheng and
                  Yuanji Kang},
  title        = {Fully Homomorphic Encryption from Ring-LWE{\,:\,}Identity-Based{\unicode{65292}}Arbitrary
                  Cyclotomic{\unicode{65292}}Tighter Parameters},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {78},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/078},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuXZK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GueronL15,
  author       = {Shay Gueron and
                  Yehuda Lindell},
  title        = {{GCM-SIV:} Full Nonce Misuse-Resistant Authenticated Encryption at
                  Under One Cycle per Byte},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {102},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/102},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GueronL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GueronLNP15,
  author       = {Shay Gueron and
                  Yehuda Lindell and
                  Ariel Nof and
                  Benny Pinkas},
  title        = {Fast Garbling of Circuits Under Standard Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {751},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/751},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GueronLNP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuerriniIW15,
  author       = {Eleonora Guerrini and
                  Laurent Imbert and
                  Th{\'{e}}o Winterhalter},
  title        = {Randomizing Scalar Multiplication Using Exact Covering Systems of
                  Congruences},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {475},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/475},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuerriniIW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Guillevic15,
  author       = {Aurore Guillevic},
  title        = {Computing Individual Discrete Logarithms Faster in GF(p\({}^{\mbox{n)}}\)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {513},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/513},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Guillevic15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GulcanAS15,
  author       = {Ege Gulcan and
                  Aydin Aysu and
                  Patrick Schaumont},
  title        = {BitCryptor: Bit-Serialized Compact Crypto Engine on Reconfigurable
                  Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {744},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/744},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GulcanAS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoHRV15,
  author       = {Siyao Guo and
                  Pavel Hub{\'{a}}cek and
                  Alon Rosen and
                  Margarita Vald},
  title        = {Rational Sumchecks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1058},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1058},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoHRV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoL15,
  author       = {Chun Guo and
                  Dongdai Lin},
  title        = {A Synthetic Indifferentiability Analysis of Interleaved Double-Key
                  Even-Mansour Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {861},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/861},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoZX15,
  author       = {Hui Guo and
                  Zhenfeng Zhang and
                  Jing Xu},
  title        = {Non-Transferable Proxy Re-Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1216},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1216},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoZX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuptaCSAW15,
  author       = {Trinabh Gupta and
                  Natacha Crooks and
                  Srinath T. V. Setty and
                  Lorenzo Alvisi and
                  Michael Walfish},
  title        = {Scalable and private media consumption with Popcorn},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {489},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/489},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuptaCSAW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaddadFBN15,
  author       = {Patrick Haddad and
                  Viktor Fischer and
                  Florent Bernard and
                  Jean Nicolai},
  title        = {A Physical Approach for Stochastic Modeling of TERO-based {TRNG}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {593},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/593},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaddadFBN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaiderAHPJSKD15,
  author       = {Syed Kamran Haider and
                  Masab Ahmad and
                  Farrukh Hijaz and
                  Astha Patni and
                  Ethan Johnson and
                  Matthew Seita and
                  Omer Khan and
                  Marten van Dijk},
  title        = {{M-MAP:} Multi-Factor Memory Authentication for Secure Embedded Processors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {831},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/831},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaiderAHPJSKD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HajiabadiK15,
  author       = {Mohammad Hajiabadi and
                  Bruce M. Kapron},
  title        = {Reproducible Circularly-Secure Bit Encryption: Applications and Realizations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {531},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/531},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HajiabadiK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HajiabadiK15a,
  author       = {Mohammad Hajiabadi and
                  Bruce M. Kapron},
  title        = {Gambling, Computational Information and Encryption Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {870},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/870},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HajiabadiK15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HajiabadiKS15,
  author       = {Mohammad Hajiabadi and
                  Bruce M. Kapron and
                  S. Venkatesh},
  title        = {On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key
                  Encryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {741},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/741},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HajiabadiKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleCG15,
  author       = {Britta Hale and
                  Christopher Carr and
                  Danilo Gligoroski},
  title        = {{CARIBE:} Adapting Traditional {IBE} for the Modern Key-Covetous Appetite},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1035},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1035},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleCG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleJLS15,
  author       = {Britta Hale and
                  Tibor Jager and
                  Sebastian Lauer and
                  J{\"{o}}rg Schwenk},
  title        = {Speeding: On Low-Latency Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1214},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1214},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleJLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Halevi15,
  author       = {Shai Halevi},
  title        = {Graded Encoding, Variations on a Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {866},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/866},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Halevi15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviHJ015,
  author       = {Shai Halevi and
                  William Eric Hall and
                  Charanjit S. Jutla and
                  Arnab Roy},
  title        = {Weak Ideal Functionalities for Designing Random Oracles with Applications
                  to Fugue},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {114},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/114},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviHJ015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviIJKR15,
  author       = {Shai Halevi and
                  Yuval Ishai and
                  Abhishek Jain and
                  Eyal Kushilevitz and
                  Tal Rabin},
  title        = {Secure Multiparty Computation with General Interaction Patterns},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1173},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1173},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviIJKR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HallgrenS015,
  author       = {Sean Hallgren and
                  Adam D. Smith and
                  Fang Song},
  title        = {Classical Cryptographic Protocols in a Quantum World},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {687},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/687},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HallgrenS015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hamann015,
  author       = {Matthias Hamann and
                  Matthias Krause},
  title        = {Stream Cipher Operation Modes with Improved Security against Generic
                  Collision Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {757},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/757},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hamann015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hamburg15,
  author       = {Mike Hamburg},
  title        = {Ed448-Goldilocks, a new elliptic curve},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {625},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/625},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hamburg15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hamburg15a,
  author       = {Mike Hamburg},
  title        = {Decaf: Eliminating cofactors through point compression},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {673},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/673},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hamburg15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HanzlikKK15,
  author       = {Lucjan Hanzlik and
                  Przemyslaw Kubiak and
                  Miroslaw Kutylowski},
  title        = {Tracing Attacks on U-Prove with Revocation Mechanism},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {108},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/108},
  timestamp    = {Mon, 23 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HanzlikKK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hao15,
  author       = {Yonglin Hao},
  title        = {A Related-Key Chosen-IV Distinguishing Attack on Full Sprout Stream
                  Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {231},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/231},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hao15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaoYCS15,
  author       = {Feng Hao and
                  Xun Yi and
                  Liqun Chen and
                  Siamak Fayyaz Shahandashti},
  title        = {The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {80},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/080},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HaoYCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hashimoto15,
  author       = {Yasufumi Hashimoto},
  title        = {Cryptanalysis of multi-HFE},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1160},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1160},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hashimoto15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HatzivasilisPM15,
  author       = {George Hatzivasilis and
                  Ioannis Papaefstathiou and
                  Charalampos Manifavas},
  title        = {Password Hashing Competition - Survey and Benchmark},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {265},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/265},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HatzivasilisPM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HayasakaAKT15,
  author       = {Kenichiro Hayasaka and
                  Kazumaro Aoki and
                  Tetsutaro Kobayashi and
                  Tsuyoshi Takagi},
  title        = {A construction of 3-dimensional lattice sieve for number field sieve
                  over F{\_}\{pn\}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1179},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1179},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HayasakaAKT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hazay15,
  author       = {Carmit Hazay},
  title        = {Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic
                  PRFs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {4},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/004},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hazay15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HazayLP15,
  author       = {Carmit Hazay and
                  Yehuda Lindell and
                  Arpita Patra},
  title        = {Adaptively Secure Computation with Partial Erasures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {450},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/450},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HazayLP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HazayPV15,
  author       = {Carmit Hazay and
                  Antigoni Polychroniadou and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Round-Optimal Token-Based Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {887},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/887},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HazayPV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HazayPW15,
  author       = {Carmit Hazay and
                  Arpita Patra and
                  Bogdan Warinschi},
  title        = {Selective Opening Security for Receivers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {860},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/860},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HazayPW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HazayV15,
  author       = {Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {On Black-Box Complexity of Universally Composable Security in the
                  {CRS} model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {488},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/488},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HazayV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HazayV15a,
  author       = {Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {What Security can we Achieve in 4-Rounds?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {797},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/797},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HazayV15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeibergPW15,
  author       = {Sven Heiberg and
                  Arnis Parsovs and
                  Jan Willemson},
  title        = {Log Analysis of Estonian Internet Voting 2013-2015},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1211},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1211},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeibergPW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeilmanKZG15,
  author       = {Ethan Heilman and
                  Alison Kendler and
                  Aviv Zohar and
                  Sharon Goldberg},
  title        = {Eclipse Attacks on Bitcoin's Peer-to-Peer Network},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {263},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/263},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeilmanKZG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HemenwayJOSW15,
  author       = {Brett Hemenway and
                  Zahra Jafargholi and
                  Rafail Ostrovsky and
                  Alessandra Scafuro and
                  Daniel Wichs},
  title        = {Adaptively Secure Garbled Circuits from One-Way Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1250},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1250},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HemenwayJOSW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HemenwayO15,
  author       = {Brett Hemenway and
                  Rafail Ostrovsky},
  title        = {Building Lossy Trapdoor Functions from Lossy Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {156},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/156},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HemenwayO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HemenwayOR15,
  author       = {Brett Hemenway and
                  Rafail Ostrovsky and
                  Alon Rosen},
  title        = {Non-committing encryption from {\(\Phi\)}-hiding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {54},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/054},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HemenwayOR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeroldKM15,
  author       = {Gottfried Herold and
                  Elena Kirshanova and
                  Alexander May},
  title        = {On the Asymptotic Complexity of Solving {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1222},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1222},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeroldKM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Herranz15,
  author       = {Javier Herranz},
  title        = {Attribute-Based Versions of Schnorr and ElGamal},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {213},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/213},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Herranz15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HesseHR15,
  author       = {Julia Hesse and
                  Dennis Hofheinz and
                  Andy Rupp},
  title        = {Reconfigurable Cryptography: {A} flexible approach to long-term security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1047},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1047},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HesseHR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeuerKP15,
  author       = {Felix Heuer and
                  Eike Kiltz and
                  Krzysztof Pietrzak},
  title        = {Standard Security Does Imply Security Against Selective Opening for
                  Markov Distributions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {853},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/853},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeuerKP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeyseMG15,
  author       = {Stefan Heyse and
                  Ingo von Maurich and
                  Tim G{\"{u}}neysu},
  title        = {Smaller Keys for Code-Based Cryptography: {QC-MDPC} McEliece Implementations
                  on Embedded Devices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {425},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/425},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeyseMG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoangKM15,
  author       = {Viet Tung Hoang and
                  Jonathan Katz and
                  Alex J. Malozemoff},
  title        = {Automated Analysis and Synthesis of Authenticated Encryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {624},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/624},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HoangKM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoangRRV15,
  author       = {Viet Tung Hoang and
                  Reza Reyhanitabar and
                  Phillip Rogaway and
                  Damian Viz{\'{a}}r},
  title        = {Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {189},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/189},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HoangRRV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoepmanLR15,
  author       = {Jaap{-}Henk Hoepman and
                  Wouter Lueks and
                  Sietse Ringers},
  title        = {On Linkability and Malleability in Self-blindable Credentials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {842},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/842},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HoepmanLR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoffsteinPSSWZ15,
  author       = {Jeffrey Hoffstein and
                  Jill Pipher and
                  John M. Schanck and
                  Joseph H. Silverman and
                  William Whyte and
                  Zhenfei Zhang},
  title        = {Choosing Parameters for NTRUEncrypt},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {708},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/708},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HoffsteinPSSWZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoffsteinPSSWZ15a,
  author       = {Jeffrey Hoffstein and
                  Jill Pipher and
                  John M. Schanck and
                  Joseph H. Silverman and
                  William Whyte and
                  Zhenfei Zhang},
  title        = {DA-Encrypt: Homomorphic Encryption via Non-Archimedean Diophantine
                  Approximation - Preliminary Report},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {844},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/844},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HoffsteinPSSWZ15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hofheinz0M15,
  author       = {Dennis Hofheinz and
                  Christian Matt and
                  Ueli Maurer},
  title        = {Idealizing Identity-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {862},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/862},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hofheinz0M15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hofheinz15,
  author       = {Dennis Hofheinz},
  title        = {Algebraic partitioning: Fully compact and (almost) tightly secure
                  cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {499},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/499},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hofheinz15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HofheinzJ15,
  author       = {Dennis Hofheinz and
                  Tibor Jager},
  title        = {Verifiable Random Functions from Standard Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1048},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1048},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HofheinzJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HofheinzKS15,
  author       = {Dennis Hofheinz and
                  Jessica Koch and
                  Christoph Striecks},
  title        = {Identity-based encryption with (almost) tight security in the multi-instance,
                  multi-ciphertext setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {123},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/123},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HofheinzKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HofheinzRW15,
  author       = {Dennis Hofheinz and
                  Vanishree Rao and
                  Daniel Wichs},
  title        = {Standard Security Does Not Imply Indistinguishability Under Selective
                  Opening},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {792},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/792},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HofheinzRW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HohenbergerMPS15,
  author       = {Susan Hohenberger and
                  Steven A. Myers and
                  Rafael Pass and
                  Abhi Shelat},
  title        = {{ANONIZE:} {A} Large-Scale Anonymous Survey System},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {681},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/681},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HohenbergerMPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Holmgren15,
  author       = {Justin Holmgren},
  title        = {On Necessary Padding with {IO}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {627},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/627},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Holmgren15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HomsirikamolDFF15,
  author       = {Ekawat Homsirikamol and
                  William Diehl and
                  Ahmed Ferozpuri and
                  Farnoud Farahmand and
                  Malik Umar Sharif and
                  Kris Gaj},
  title        = {{GMU} Hardware {API} for Authenticated Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {669},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/669},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HomsirikamolDFF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HooshmandEA15,
  author       = {Reza Hooshmand and
                  Taraneh Eghlidos and
                  Mohammad Reza Aref},
  title        = {Improving {GGH} Public Key Scheme Using Low Density Lattice Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {229},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/229},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HooshmandEA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Horvath15,
  author       = {M{\'{a}}t{\'{e}} Horv{\'{a}}th},
  title        = {Survey on Cryptographic Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {412},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/412},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Horvath15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuJ15,
  author       = {Yupu Hu and
                  Huiwen Jia},
  title        = {Cryptanalysis of {GGH} Map},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {301},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/301},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuJ15a,
  author       = {Yupu Hu and
                  Huiwen Jia},
  title        = {A Comment on Gu Map-1},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {448},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/448},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuJ15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuJ15b,
  author       = {Yupu Hu and
                  Huiwen Jia},
  title        = {An Optimization of Gu Map-1},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {453},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/453},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuJ15b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuMR15,
  author       = {Zhangxiang Hu and
                  Payman Mohassel and
                  Mike Rosulek},
  title        = {Efficient Zero-Knowledge Proofs of Non-Algebraic Statements with Sublinear
                  Amortized Cost},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {497},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/497},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuMR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangKKKM15,
  author       = {Yan Huang and
                  Jonathan Katz and
                  Vladimir Kolesnikov and
                  Ranjit Kumaresan and
                  Alex J. Malozemoff},
  title        = {Amortizing Garbled Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {81},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/081},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangKKKM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangKY15,
  author       = {Ming{-}Deh A. Huang and
                  Michiel Kosters and
                  Sze Ling Yeo},
  title        = {Last fall degree, HFE, and Weil descent attacks on {ECDLP}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {573},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/573},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangKY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangLMC15,
  author       = {Zhengan Huang and
                  Shengli Liu and
                  Xianping Mao and
                  Kefei Chen},
  title        = {Non-malleability under Selective Opening Attacks: Implication and
                  Separation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {316},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/316},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangLMC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangPST15,
  author       = {Yun{-}Ju Huang and
                  Christophe Petit and
                  Naoyuki Shinohara and
                  Tsuyoshi Takagi},
  title        = {On Generalized First Fall Degree Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {358},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/358},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangPST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangTW15,
  author       = {Tao Huang and
                  Ivan Tjuawinata and
                  Hongjun Wu},
  title        = {Differential-Linear Cryptanalysis of {ICEPOLE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {160},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/160},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangTW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangZ15,
  author       = {Yan Huang and
                  Ruiyu Zhu},
  title        = {Revisiting LEGOs: Optimizations, Analysis, and their Limit},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1038},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1038},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HulsingRS15,
  author       = {Andreas H{\"{u}}lsing and
                  Joost Rijneveld and
                  Peter Schwabe},
  title        = {ARMed {SPHINCS} - Computing a 41KB signature in 16KB of {RAM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1042},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1042},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HulsingRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HulsingRS15a,
  author       = {Andreas H{\"{u}}lsing and
                  Joost Rijneveld and
                  Fang Song},
  title        = {Mitigating Multi-Target Attacks in Hash-based Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1256},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1256},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HulsingRS15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IijimaMC15,
  author       = {Tsutomu Iijima and
                  Fumiyuki Momose and
                  Jinhui Chao},
  title        = {A classification of elliptic curves with respect to the {GHS} attack
                  in odd characteristic},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {805},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/805},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IijimaMC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/InciGAES15,
  author       = {Mehmet Sinan Inci and
                  Berk G{\"{u}}lmezoglu and
                  Gorka Irazoqui Apecechea and
                  Thomas Eisenbarth and
                  Berk Sunar},
  title        = {Seriously, get off my cloud! Cross-VM {RSA} Key Recovery in a Public
                  Cloud},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {898},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/898},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/InciGAES15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IndacoLMT15,
  author       = {Marco Indaco and
                  Fabio Lauri and
                  Andrea Miele and
                  Pascal Trotta},
  title        = {An Efficient Many-Core Architecture for Elliptic Curve Cryptography
                  Security Assessment},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {638},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/638},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IndacoLMT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IovinoTZ15,
  author       = {Vincenzo Iovino and
                  Qiang Tang and
                  Karol Zebrowski},
  title        = {On the Power of Public-key Functional Encryption with Function Privacy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {470},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/470},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IovinoTZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IovinoZ15,
  author       = {Vincenzo Iovino and
                  Karol Zebrowski},
  title        = {Mergeable Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {103},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/103},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IovinoZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IrazoquiES15,
  author       = {Gorka Irazoqui and
                  Thomas Eisenbarth and
                  Berk Sunar},
  title        = {Cross Processor Cache Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1155},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1155},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IrazoquiES15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IrshadSAFH15,
  author       = {Azeem Irshad and
                  Muhammad Sher and
                  Shahzad Ashraf and
                  Ch. Muhammad Shahzad Faisal and
                  Mahmood Ul Hassan},
  title        = {Cryptanalysis for Secure and Efficient Smart-Card-Based Remote User
                  Authentication Scheme for Multi-server Environment},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {686},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/686},
  timestamp    = {Tue, 28 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IrshadSAFH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshaiOZ15,
  author       = {Yuval Ishai and
                  Rafail Ostrovsky and
                  Vassilis Zikas},
  title        = {Secure Multi-Party Computation with Identifiable Abort},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {325},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/325},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshaiOZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshaiWY15,
  author       = {Yuval Ishai and
                  Mor Weiss and
                  Guang Yang},
  title        = {Making the Best of a Leaky Situation: Zero-Knowledge PCPs from Leakage-Resilient
                  Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1055},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1055},
  timestamp    = {Mon, 21 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/IshaiWY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshalKLO15,
  author       = {Yuval Ishai and
                  Eyal Kushilevitz and
                  Steve Lu and
                  Rafail Ostrovsky},
  title        = {Private Large-Scale Databases with Distributed Searchable Symmetric
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1190},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1190},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/IshalKLO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshidaEHST15,
  author       = {Ai Ishida and
                  Keita Emura and
                  Goichiro Hanaoka and
                  Yusuke Sakai and
                  Keisuke Tanaka},
  title        = {Group Signature with Deniability: How to Disavow a Signature},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {43},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/043},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshidaEHST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IsobeS15,
  author       = {Takanori Isobe and
                  Kyoji Shibutani},
  title        = {Generic Key Recovery Attack on Feistel Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {526},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/526},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IsobeS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IsobeS15a,
  author       = {Takanori Isobe and
                  Kyoji Shibutani},
  title        = {Improved All-Subkeys Recovery Attacks on FOX, {KATAN} and {SHACAL-2}
                  Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {557},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/557},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IsobeS15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JacobMV15,
  author       = {Grasha Jacob and
                  A. Murugan and
                  Irine Viola},
  title        = {Towards the Generation of a Dynamic Key-Dependent S-Box to Enhance
                  Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {92},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/092},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JacobMV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JakobsenO15,
  author       = {Sune K. Jakobsen and
                  Claudio Orlandi},
  title        = {How to Bootstrap Anonymous Communication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {130},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/130},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JakobsenO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JakobsenO15a,
  author       = {Jakob Jakobsen and
                  Claudio Orlandi},
  title        = {On the {CCA} (in)security of MTProto},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1177},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1177},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JakobsenO15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JareckiKSS15,
  author       = {Stanislaw Jarecki and
                  Hugo Krawczyk and
                  Maliheh Shirvanian and
                  Nitesh Saxena},
  title        = {Device-Enhanced Password Protocols with Optimal Online-Offline Protection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1099},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1099},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JareckiKSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JeanN15,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Ivica Nikolic},
  title        = {Internal Differential Boomerangs: Practical Analysis of the Round-Reduced
                  Keccak-f Permutation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {244},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/244},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JeanN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JeanNP15,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Thomas Peyrin},
  title        = {Improved Cryptanalysis of AES-like Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {279},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/279},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JeanNP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JeanNPWW15,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Ivica Nikolic and
                  Thomas Peyrin and
                  Lei Wang and
                  Shuang Wu},
  title        = {Security Analysis of {PRINCE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {372},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/372},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JeanNPWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JhaN15,
  author       = {Ashwin Jha and
                  Mridul Nandi},
  title        = {Some Cryptanalytic Results on Zipper Hash and Concatenated Hash},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {973},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/973},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JhaN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JinD15,
  author       = {Chenglu Jin and
                  Marten van Dijk},
  title        = {Secure and Efficient Initialization and Authentication Protocols for
                  {SHIELD}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {210},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/210},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JinD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JinXBRD15,
  author       = {Chenglu Jin and
                  Xiaolin Xu and
                  Wayne P. Burleson and
                  Ulrich R{\"{u}}hrmair and
                  Marten van Dijk},
  title        = {PLayPUF: Programmable Logically Erasable PUFs for Forward and Backward
                  Secure Key Management},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1052},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1052},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JinXBRD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JoseC15,
  author       = {Jimmy Jose and
                  Dipanwita Roy Chowdhury},
  title        = {Four Neighbourhood Cellular Automata as Better Cryptographic Primitives},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {700},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/700},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JoseC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JostLMS15,
  author       = {Christine Jost and
                  Ha Lam and
                  Alexander Maximov and
                  Ben J. M. Smeets},
  title        = {Encryption Performance Improvements of the Paillier Cryptosystem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {864},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/864},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JostLMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JouxP15,
  author       = {Antoine Joux and
                  C{\'{e}}cile Pierrot},
  title        = {Nearly Sparse Linear Algebra},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {930},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/930},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JouxP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JovanovicN15,
  author       = {Philipp Jovanovic and
                  Samuel Neves},
  title        = {Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart
                  Grid Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {428},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/428},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JovanovicN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Jutla15,
  author       = {Charanjit S. Jutla},
  title        = {Upending Stock Market Structure Using Secure Multi-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {550},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/550},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Jutla15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KabiriradH15,
  author       = {Saeideh Kabirirad and
                  Hamideh Hajiabadi},
  title        = {Cryptanalysis Of An Authenticated Image Encryption Scheme Based On
                  Chaotic Maps And Memory Cellular Automata},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {326},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/326},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KabiriradH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KalaiP15,
  author       = {Yael Tauman Kalai and
                  Omer Paneth},
  title        = {Delegating {RAM} Computations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {957},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/957},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KalaiP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kane15,
  author       = {Amadou Moctar Kane},
  title        = {A revocable anonymity in Tor},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {215},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/215},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kane15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kane15a,
  author       = {Amadou Moctar Kane},
  title        = {Cryptanalysis of a fair anonymity for the tor network},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {338},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/338},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kane15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kar15,
  author       = {Jayaprakash Kar},
  title        = {Cryptanalysis of Provably Secure Certi cateless Short Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {933},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/933},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kar15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kar15a,
  author       = {Jayaprakash Kar},
  title        = {Cryptanalysis and Improvement of Identity-based Proxy Multi-signature
                  scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1051},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1051},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kar15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Karabina15,
  author       = {Koray Karabina},
  title        = {Point Decomposition Problem in Binary Elliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {319},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/319},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Karabina15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KarbasiA15,
  author       = {Amir Hassani Karbasi and
                  Reza Ebrahimi Atani},
  title        = {{ILTRU:} An NTRU-Like Public Key Cryptosystem Over Ideal Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {549},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/549},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KarbasiA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Karpman15,
  author       = {Pierre Karpman},
  title        = {From Related-Key Distinguishers to Related-Key-Recovery on Even-Mansour
                  Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {134},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/134},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Karpman15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KarpmanPS15,
  author       = {Pierre Karpman and
                  Thomas Peyrin and
                  Marc Stevens},
  title        = {Practical Free-Start Collision Attacks on 76-step {SHA-1}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {530},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/530},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KarpmanPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KarthikeyanCSR15,
  author       = {Harish Karthikeyan and
                  Suvradip Chakraborty and
                  Kunwar Singh and
                  C. Pandu Rangan},
  title        = {An Efficient Multiple {PKG} Compatible Identity Based Key Agreement
                  for Vehicular Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1012},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1012},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KarthikeyanCSR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kasahara15,
  author       = {Masao Kasahara},
  title        = {New classes of public key cryptosystem {K(XVI)SE(1)PKC} constructed
                  based on Reed-Solomon code over extension field of m=8 and K(XVI)SE(2)PKC,
                  based on binary cyclic code},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {714},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/714},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kasahara15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kasahara15a,
  author       = {Masao Kasahara},
  title        = {A Simple Scheme, for Strengthening Product-sum Type {PKC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {779},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/779},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kasahara15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KatzTZ15,
  author       = {Jonathan Katz and
                  Aishwarya Thiruvengadam and
                  Hong{-}Sheng Zhou},
  title        = {Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {280},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/280},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KatzTZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KaulA15,
  author       = {Sonam Devgan Kaul and
                  Amit K. Awasthi},
  title        = {Cryptanalysis Of Dynamic {ID} Based Remote User Authentication Scheme
                  With Key Agreement},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {490},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/490},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KaulA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KavutM15,
  author       = {Sel{\c{c}}uk Kavut and
                  Subhamoy Maitra},
  title        = {Patterson-Wiedemann type functions on 21 variables with Nonlinearity
                  greater than Bent Concatenation bound},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1036},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1036},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KavutM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kazmi15,
  author       = {Raza Ali Kazmi},
  title        = {Cryptography from Post-Quantum Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {376},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/376},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kazmi15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Keller15,
  author       = {Marcel Keller},
  title        = {The Oblivious Machine - or: How to Put the {C} into {MPC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {467},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/467},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Keller15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KellerOS15,
  author       = {Marcel Keller and
                  Emmanuela Orsini and
                  Peter Scholl},
  title        = {Actively Secure {OT} Extension with Optimal Overhead},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {546},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/546},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KellerOS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KelseyMT15,
  author       = {John Kelsey and
                  Kerry A. McKay and
                  Meltem S{\"{o}}nmez Turan},
  title        = {Predictive Models for Min-Entropy Estimation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {600},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/600},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KelseyMT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KepleyRS15,
  author       = {Shane Kepley and
                  David Russo and
                  Rainer Steinwandt},
  title        = {Cryptanalysis of a modern rotor machine in a multicast setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {661},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/661},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KepleyRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhazaeiA15,
  author       = {Shahram Khazaei and
                  Siavash Ahmadi},
  title        = {Ciphertext-only attack on d*d Hill in O(d13\({}^{\mbox{d}}\))},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {802},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/802},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KhazaeiA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhovratovichNPS15,
  author       = {Dmitry Khovratovich and
                  Ivica Nikolic and
                  Josef Pieprzyk and
                  Przemyslaw Sokolowski and
                  Ron Steinfeld},
  title        = {Rotational Cryptanalysis of {ARX} Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {95},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/095},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KhovratovichNPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhuranaK15,
  author       = {Mehak Khurana and
                  Meena Kumari},
  title        = {{VARIANTS} {OF} {DIFFERENTIAL} {AND} {LINEAR} {CRYPTANALYSIS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {473},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/473},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KhuranaK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kiayias0Z15,
  author       = {Aggelos Kiayias and
                  Thomas Zacharias and
                  Bingsheng Zhang},
  title        = {Ceremonies for End-to-End Verifiable Elections},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1166},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1166},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kiayias0Z15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasP15,
  author       = {Aggelos Kiayias and
                  Giorgos Panagiotakos},
  title        = {Speed-Security Tradeoffs in Blockchain Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1019},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1019},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasRRS15,
  author       = {Aggelos Kiayias and
                  Yona Raekow and
                  Alexander Russell and
                  Narasimha K. Shashidhar},
  title        = {A One-time Stegosystem and Applications to Efficient Covert Communication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {684},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/684},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasRRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasZZ15,
  author       = {Aggelos Kiayias and
                  Thomas Zacharias and
                  Bingsheng Zhang},
  title        = {End-to-End Verifiable Elections in the Standard Model{\({_\ast}\)}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {346},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/346},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasZZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasZZ15a,
  author       = {Aggelos Kiayias and
                  Hong{-}Sheng Zhou and
                  Vassilis Zikas},
  title        = {Fair and Robust Multi-Party Computation using a Global Transaction
                  Ledger},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {574},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/574},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasZZ15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KilincK15,
  author       = {Handan Kilin{\c{c}} and
                  Alptekin K{\"{u}}p{\c{c}}{\"{u}}},
  title        = {Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party
                  Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {64},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/064},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KilincK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiltzMP15,
  author       = {Eike Kiltz and
                  Daniel Masny and
                  Krzysztof Pietrzak},
  title        = {Simple Chosen-Ciphertext Security from Low-Noise {LPN}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {401},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/401},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiltzMP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiltzPW15,
  author       = {Eike Kiltz and
                  Jiaxin Pan and
                  Hoeteck Wee},
  title        = {Structure-Preserving Signatures from Standard Assumptions, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {604},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/604},
  timestamp    = {Tue, 21 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiltzPW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiltzW15,
  author       = {Eike Kiltz and
                  Hoeteck Wee},
  title        = {Quasi-Adaptive {NIZK} for Linear Subspaces Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {216},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/216},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiltzW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kim15,
  author       = {Taechan Kim},
  title        = {Extended Tower Number Field Sieve: {A} New Complexity for Medium Prime
                  Case},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1027},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1027},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kim15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimKS15,
  author       = {Jinsu Kim and
                  Sungwook Kim and
                  Jae Hong Seo},
  title        = {Multilinear Map via Scale-Invariant {FHE:} Enhancing Security and
                  Efficiency},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {992},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/992},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimL15,
  author       = {Miran Kim and
                  Kristin E. Lauter},
  title        = {Private Genome Analysis through Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {965},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/965},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimLLW15,
  author       = {Myungsun Kim and
                  Hyung Tae Lee and
                  San Ling and
                  Huaxiong Wang},
  title        = {On the Efficiency of FHE-based Private Queries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1176},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1176},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimLLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KirazSU15,
  author       = {Mehmet Sabir Kiraz and
                  Isa Sertkaya and
                  Osmanbey Uzunkol},
  title        = {An Efficient ID-Based Message Recoverable Privacy-Preserving Auditing
                  Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {633},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/633},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KirazSU15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KirchnerF15,
  author       = {Paul Kirchner and
                  Pierre{-}Alain Fouque},
  title        = {An Improved {BKW} Algorithm for {LWE} with Applications to Cryptography
                  and Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {552},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/552},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KirchnerF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kiyoshima15,
  author       = {Susumu Kiyoshima},
  title        = {An Alternative Approach to Non-black-box Simulation in Fully Concurrent
                  Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {67},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/067},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kiyoshima15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kiyoshima15a,
  author       = {Susumu Kiyoshima},
  title        = {Statistical Concurrent Non-malleable Zero-knowledge from One-way Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {620},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/620},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kiyoshima15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kiyoshima15b,
  author       = {Susumu Kiyoshima},
  title        = {Constant-round Leakage-resilient Zero-knowledge from Collision Resistance},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1235},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1235},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kiyoshima15b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KizilkaleEK15,
  author       = {Can Kizilkale and
                  {\"{O}}mer Egecioglu and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {A Matrix Decomposition Method for Optimal Normal Basis Multiplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {742},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/742},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KizilkaleEK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KleberUMKSH15,
  author       = {Stephan Kleber and
                  Florian Unterstein and
                  Matthias Matousek and
                  Frank Kargl and
                  Frank Slomka and
                  Matthias Hiller},
  title        = {Secure Execution Architecture based on PUF-driven Instruction Level
                  Code Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {651},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/651},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KleberUMKSH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoblitzM15,
  author       = {Neal Koblitz and
                  Alfred Menezes},
  title        = {The Random Oracle Model: {A} Twenty-Year Retrospective},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {140},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/140},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoblitzM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoblitzM15a,
  author       = {Neal Koblitz and
                  Alfred Menezes},
  title        = {A Riddle Wrapped in an Enigma},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1018},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1018},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoblitzM15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KocakMO15,
  author       = {Nese Ko{\c{c}}ak and
                  Sihem Mesnager and
                  Ferruh {\"{O}}zbudak},
  title        = {Bent and Semi-bent Functions via Linear Translators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {875},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/875},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KocakMO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KochWH15,
  author       = {Alexander Koch and
                  Stefan Walzer and
                  Kevin H{\"{a}}rtel},
  title        = {Card-based Cryptographic Protocols Using a Minimal Number of Cards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {865},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/865},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KochWH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KolblLT15,
  author       = {Stefan K{\"{o}}lbl and
                  Gregor Leander and
                  Tyge Tiessen},
  title        = {Observations on the {SIMON} block cipher family},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {145},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/145},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KolblLT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KolblR15,
  author       = {Stefan K{\"{o}}lbl and
                  Arnab Roy},
  title        = {A Brief Comparison of Simon and Simeck},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {706},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/706},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KolblR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KolesnikovM15,
  author       = {Vladimir Kolesnikov and
                  Alex J. Malozemoff},
  title        = {Public Verifiability in the Covert Model (Almost) for Free},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1067},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1067},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KolesnikovM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KolesnikovMRR15,
  author       = {Vladimir Kolesnikov and
                  Payman Mohassel and
                  Ben Riva and
                  Mike Rosulek},
  title        = {Richer Efficiency/Security Trade-offs in 2PC},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {55},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/055},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KolesnikovMRR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kolomeec15,
  author       = {Nikolay Kolomeec},
  title        = {The graph of minimal distances of bent functions and its properties},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1203},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1203},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kolomeec15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KomargodskiZ15,
  author       = {Ilan Komargodski and
                  Mark Zhandry},
  title        = {Modern Cryptography Through the Lens of Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {735},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/735},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KomargodskiZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KorchaginP15,
  author       = {Ignat Korchagin and
                  Eugene Pilyankevich},
  title        = {Secure Comparator: a ZKP-Based Authentication System},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1180},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1180},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KorchaginP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KorzhikMTY15,
  author       = {Valery I. Korzhik and
                  Guillermo Morales{-}Luna and
                  Sergei Tikhonov and
                  Victor Yakovlev},
  title        = {Analysis of Keyless Massive MIMO-based Cryptosystem Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {816},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/816},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KorzhikMTY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KosbaMSWP15,
  author       = {Ahmed E. Kosba and
                  Andrew Miller and
                  Elaine Shi and
                  Zikai Wen and
                  Charalampos Papamanthou},
  title        = {Hawk: The Blockchain Model of Cryptography and Privacy-Preserving
                  Smart Contracts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {675},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/675},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KosbaMSWP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KosbaZMQCPPSS15,
  author       = {Ahmed E. Kosba and
                  Zhichao Zhao and
                  Andrew Miller and
                  Yi Qian and
                  T.{-}H. Hubert Chan and
                  Charalampos Papamanthou and
                  Rafael Pass and
                  Abhi Shelat and
                  Elaine Shi},
  title        = {How to Use SNARKs in Universally Composable Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1093},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1093},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KosbaZMQCPPSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KotovU15,
  author       = {Matvei Kotov and
                  Alexander Ushakov},
  title        = {Analysis of a key exchange protocol based on tropical matrix algebra},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {852},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/852},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KotovU15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KousidisW15,
  author       = {Stavros Kousidis and
                  Andreas Wiemers},
  title        = {On the First Fall Degree of Summation Polynomials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1121},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1121},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KousidisW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KrasnovaNS15,
  author       = {Anna Krasnova and
                  Moritz Neikes and
                  Peter Schwabe},
  title        = {Footprint scheduling for Dining-Cryptographer networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1213},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1213},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KrasnovaNS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Krause15,
  author       = {Matthias Krause},
  title        = {Analyzing Constructions for key-alternating Pseudorandom Functions
                  with Applications to Stream Cipher Operation Modes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {636},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/636},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Krause15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KrawczykW15,
  author       = {Hugo Krawczyk and
                  Hoeteck Wee},
  title        = {The {OPTLS} Protocol and {TLS} 1.3},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {978},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/978},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KrawczykW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KruppSSFAN15,
  author       = {Johannes Krupp and
                  Dominique Schr{\"{o}}der and
                  Mark Simkin and
                  Dario Fiore and
                  Giuseppe Ateniese and
                  Stefan N{\"{u}}rnberger},
  title        = {Nearly Optimal Verifiable Data Streaming (Full Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {333},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/333},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KruppSSFAN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ku-CauichM15,
  author       = {Juan Carlos Ku{-}Cauich and
                  Guillermo Morales{-}Luna},
  title        = {A Linear Code and its Application into Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1124},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1124},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ku-CauichM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ku-CauichMT15,
  author       = {Juan Carlos Ku{-}Cauich and
                  Guillermo Morales{-}Luna and
                  Horacio Tapia{-}Recillas},
  title        = {An Authentication Code over Galois Rings with Optimal Impersonation
                  and Substitution Probabilities},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {618},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/618},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ku-CauichMT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KulykNBVHKB15,
  author       = {Oksana Kulyk and
                  Stephan Neumann and
                  Jurlind Budurushi and
                  Melanie Volkamer and
                  Rolf Haenni and
                  Reto E. Koenig and
                  Phil{\'{e}}mon von Bergen},
  title        = {Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {558},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/558},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KulykNBVHKB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KupcuM15,
  author       = {Alptekin K{\"{u}}p{\c{c}}{\"{u}} and
                  Payman Mohassel},
  title        = {Fast Optimistically Fair Cut-and-Choose 2PC},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1209},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1209},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KupcuM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KurosawaO15,
  author       = {Kaoru Kurosawa and
                  Yasuhiro Ohtaki},
  title        = {How to Construct UC-Secure Searchable Symmetric Encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {251},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/251},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KurosawaO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KursaweP15,
  author       = {Klaus Kursawe and
                  Christiane Peters},
  title        = {Structural Weaknesses in the Open Smart Grid Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {88},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/088},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KursaweP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KustersT15,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung},
  title        = {Security Analysis of Re-Encryption {RPC} Mix Nets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {295},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/295},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KustersT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KustersTBBKM15,
  author       = {Ralf K{\"{u}}sters and
                  Tomasz Truderung and
                  Bernhard Beckert and
                  Daniel Bruns and
                  Michael Kirsten and
                  Martin Mohr},
  title        = {A Hybrid Approach for Proving Noninterference of Java Programs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {438},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/438},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KustersTBBKM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaarhovenW15,
  author       = {Thijs Laarhoven and
                  Benne de Weger},
  title        = {Faster sieving for shortest lattice vectors using spherical locality-sensitive
                  hashing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {211},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/211},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LaarhovenW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Labrande15,
  author       = {Hugo Labrande},
  title        = {Computing Jacobi's {\textbackslash}theta in quasi-linear time},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1104},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1104},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Labrande15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LachariteP15,
  author       = {Marie{-}Sarah Lacharit{\'{e}} and
                  Kenneth G. Paterson},
  title        = {A note on the optimality of frequency analysis vs. {\(\mathscr{l}\)}\({}_{\mbox{p}}\)-optimization},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1158},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1158},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LachariteP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaiDLWZ15,
  author       = {Junzuo Lai and
                  Robert H. Deng and
                  Shengli Liu and
                  Jian Weng and
                  Yunlei Zhao},
  title        = {Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext
                  Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {297},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/297},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LaiDLWZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaineL15,
  author       = {Kim Laine and
                  Kristin E. Lauter},
  title        = {Key Recovery for {LWE} in Polynomial Time},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {176},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/176},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LaineL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaingMPS15,
  author       = {Thalia M. Laing and
                  Keith M. Martin and
                  Maura B. Paterson and
                  Douglas R. Stinson},
  title        = {Localised Multisecret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {922},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/922},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LaingMPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LallemandN15,
  author       = {Virginie Lallemand and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  title        = {Cryptanalysis of Full Sprout},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {232},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/232},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LallemandN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LampeS15,
  author       = {Rodolphe Lampe and
                  Yannick Seurin},
  title        = {Tweakable Blockciphers with Asymptotically Optimal Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {182},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/182},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LampeS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LashermesFG15,
  author       = {Ronan Lashermes and
                  Jacques J. A. Fournier and
                  Louis Goubin},
  title        = {Inverting the Final exponentiation of Tate pairings on ordinary elliptic
                  curves using faults},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {152},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/152},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LashermesFG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaudP15,
  author       = {Peeter Laud and
                  Alisa Pankova},
  title        = {Transformation-Based Outsourcing of Linear Equation Systems over Real
                  Numbers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {322},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/322},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LaudP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaudP15a,
  author       = {Peeter Laud and
                  Alisa Pankova},
  title        = {Privacy-preserving Frequent Itemset Mining for Sparse and Dense Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {671},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/671},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LaudP15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaudP15b,
  author       = {Peeter Laud and
                  Alisa Pankova},
  title        = {Preprocessing-Based Verification of Multiparty Protocols with Honest
                  Majority},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {674},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/674},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LaudP15b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LauridsenR15,
  author       = {Martin M. Lauridsen and
                  Christian Rechberger},
  title        = {Linear Distinguishers in the Key-less Setting: Application to {PRESENT}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {908},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/908},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LauridsenR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LauterLN15,
  author       = {Kristin E. Lauter and
                  Adriana L{\'{o}}pez{-}Alt and
                  Michael Naehrig},
  title        = {Private Computation on Encrypted Genomic Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {133},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/133},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LauterLN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeMT15,
  author       = {Duc{-}Phong Le and
                  Nadia El Mrabet and
                  Chik How Tan},
  title        = {On near prime-order elliptic curves with small embedding degrees},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {835},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/835},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeMT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeTT15,
  author       = {Duc{-}Phong Le and
                  Chik How Tan and
                  Michael Tunstall},
  title        = {Randomizing the Montgomery Powering Ladder},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {657},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/657},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeTT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeanderMR15,
  author       = {Gregor Leander and
                  Brice Minaud and
                  Sondre R{\o}njom},
  title        = {A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of
                  Robin, iSCREAM and Zorro},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {68},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/068},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeanderMR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LecomteFM15,
  author       = {Maxime Lecomte and
                  Jacques Fournier and
                  Philippe Maurine},
  title        = {Extraction of intrinsic structure for Hardware Trojan detection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {912},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/912},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LecomteFM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lee15,
  author       = {Jooyoung Lee},
  title        = {Towards Key-Length Extension with Optimal Security: Cascade Encryption
                  and Xor-cascade Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {205},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/205},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Lee15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeLPY15,
  author       = {Kwangsu Lee and
                  Dong Hoon Lee and
                  Jong Hwan Park and
                  Moti Yung},
  title        = {{CCA} Security for Self-Updatable Encryption: Protecting Cloud Data
                  When Clients Read/Write Ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1202},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1202},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeLPY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeP15,
  author       = {Kwangsu Lee and
                  Jong Hwan Park},
  title        = {Identity-Based Revocation from Subset Difference Methods under Simple
                  Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {921},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/921},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LenstraW15,
  author       = {Arjen K. Lenstra and
                  Benjamin Wesolowski},
  title        = {A random zoo: sloth, unicorn, and trx},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {366},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/366},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LenstraW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeontiadisEOM15,
  author       = {Iraklis Leontiadis and
                  Kaoutar Elkhiyaoui and
                  Melek {\"{O}}nen and
                  Refik Molva},
  title        = {{PUDA} - Privacy and Unforgeability for Data Aggregation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {562},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/562},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeontiadisEOM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LepointT15,
  author       = {Tancr{\`{e}}de Lepoint and
                  Mehdi Tibouchi},
  title        = {Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme
                  Used in {PIR}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {12},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/012},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LepointT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lerner15,
  author       = {Emil Lerner},
  title        = {The Uniform Distribution of Sequences Generated by Iteration of Polynomials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {296},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/296},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lerner15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeslieSS15,
  author       = {David S. Leslie and
                  Chris Sherfield and
                  Nigel P. Smart},
  title        = {Threshold FlipThem: When the winner does not need to take all},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {784},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/784},
  timestamp    = {Wed, 12 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeslieSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Leurent15,
  author       = {Ga{\"{e}}tan Leurent},
  title        = {Differential and Linear Cryptanalysis of {ARX} with Partitioning -
                  Application to {FEAL} and Chaskey},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {968},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/968},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Leurent15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeurentW15,
  author       = {Ga{\"{e}}tan Leurent and
                  Lei Wang},
  title        = {The Sum Can Be Weaker Than Each Part},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {70},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/070},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeurentW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Leventi-PeetzP15,
  author       = {Anastasia{-}Maria Leventi{-}Peetz and
                  J.{-}V. Peetz},
  title        = {Generating S-Box Multivariate Quadratic Equation Systems And Estimating
                  Algebraic Attack Resistance Aided By SageMath},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {589},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/589},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Leventi-PeetzP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Li15,
  author       = {Xin Li},
  title        = {Non-Malleable Condensers for Arbitrary Min-Entropy, and Almost Optimal
                  Protocols for Privacy Amplification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {21},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/021},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Li15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiJL15,
  author       = {Ming Li and
                  Yupeng Jiang and
                  Dongdai Lin},
  title        = {A Group-theory Method to The Cycle Structures of Feedback Shift Registers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {357},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/357},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiJL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiL15,
  author       = {Ming Li and
                  Dongdai Lin},
  title        = {De Bruijn Sequences from Nonlinear Feedback Shift Registers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {667},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/667},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiSLSJ15,
  author       = {Jingwei Li and
                  Anna Cinzia Squicciarini and
                  Dan Lin and
                  Smitha Sundareswaran and
                  Chunfu Jia},
  title        = {MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {379},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/379},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiSLSJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiW15,
  author       = {Jing Li and
                  Licheng Wang},
  title        = {Noise-free Symmetric Fully Homomorphic Encryption based on noncommutative
                  rings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {641},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/641},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiWL15,
  author       = {Ming Li and
                  Mingxing Wang and
                  Dongdai Lin},
  title        = {De Bruijn Sequences from Symmetric Shift Registers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1079},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1079},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiWL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiWXXS15,
  author       = {Fenghua Li and
                  Yanchao Wang and
                  Rongna Xie and
                  Jinbo Xiong and
                  Fangfang Shan},
  title        = {A Novel Cyberspace-Oriented Access Control Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {637},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/637},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiWXXS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiYR15,
  author       = {Gefei Li and
                  Yuval Yarom and
                  Damith Chinthana Ranasinghe},
  title        = {Exploiting Transformations of the Galois Configuration to Improve
                  Guess-and-Determine Attacks on NFSRs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1045},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1045},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiYR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiZFV15,
  author       = {Zhenqi Li and
                  Bin Zhang and
                  Junfeng Fan and
                  Ingrid Verbauwhede},
  title        = {A New Model for Error-Tolerant Side-Channel Cube Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {447},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/447},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiZFV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertPJY15,
  author       = {Beno{\^{\i}}t Libert and
                  Thomas Peters and
                  Marc Joye and
                  Moti Yung},
  title        = {Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound
                  {QA-NIZK} Proofs and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {242},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/242},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertPJY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertPY15,
  author       = {Beno{\^{\i}}t Libert and
                  Thomas Peters and
                  Moti Yung},
  title        = {Short Group Signatures via Structure-Preserving Signatures: Standard
                  Model Security from Simple Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {743},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/743},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertPY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertS15,
  author       = {Beno{\^{\i}}t Libert and
                  Damien Stehl{\'{e}}},
  title        = {Fully Secure Functional Encryption for Inner Products, from Standard
                  Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {608},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/608},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LimbasiyaD15,
  author       = {Trupil Limbasiya and
                  Nishant Doshi},
  title        = {{AN} {ENHANCED} {BIOMETRIC} {BASED} {REMOTE} {USER} {AUTHENTICATION}
                  {SCHEME} {USING} {SMART} {CARD}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {587},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/587},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LimbasiyaD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinPL15,
  author       = {Zhiqiang Lin and
                  Dingyi Pei and
                  Dongdai Lin},
  title        = {Construction of Transition Matrices for Binary FCSRs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1181},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1181},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinPL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinPST15,
  author       = {Huijia Lin and
                  Rafael Pass and
                  Karn Seth and
                  Sidharth Telang},
  title        = {Output-Compressing Randomized Encodings and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {720},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/720},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinPST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinW15,
  author       = {Li Lin and
                  Wenling Wu},
  title        = {Improved Meet-in-the-Middle Distinguisher on Feistel Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {51},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/051},
  timestamp    = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LinW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinW15a,
  author       = {Li Lin and
                  Wenling Wu},
  title        = {Meet-in-the-Middle Attacks on Reduced-Round Midori-64},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1165},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1165},
  timestamp    = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LinW15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LindellPSY15,
  author       = {Yehuda Lindell and
                  Benny Pinkas and
                  Nigel P. Smart and
                  Avishay Yanai},
  title        = {Efficient Constant Round Multi-Party Computation Combining {BMR} and
                  {SPDZ}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {523},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/523},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LindellPSY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LindellR15,
  author       = {Yehuda Lindell and
                  Ben Riva},
  title        = {Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious
                  Adversaries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {987},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/987},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LindellR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LingNW15,
  author       = {San Ling and
                  Khoa Nguyen and
                  Huaxiong Wang},
  title        = {Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-based},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {14},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/014},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LingNW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiptonOZ15,
  author       = {Richard J. Lipton and
                  Rafail Ostrovsky and
                  Vassilis Zikas},
  title        = {Provable Virus Detection: Using the Uncertainty Principle to Protect
                  Against Malware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {728},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/728},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiptonOZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Liu15,
  author       = {Dongxi Liu},
  title        = {Practical Fully Homomorphic Encryption without Noise Reduction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {468},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/468},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Liu15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuAP15,
  author       = {Jian Liu and
                  N. Asokan and
                  Benny Pinkas},
  title        = {Secure Deduplication of Encrypted Data without Additional Independent
                  Servers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {455},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/455},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuAP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuGR15,
  author       = {Jia Liu and
                  Saqib A. Kakvi and
                  Bogdan Warinschi},
  title        = {Extractable Witness Encryption and Timed-Release Encryption from Bitcoin},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {482},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/482},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuGR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuMC15,
  author       = {Jian Liu and
                  Sihem Mesnager and
                  Lusheng Chen},
  title        = {On the Diffusion Property of Iterated Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {873},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/873},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuMC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuMC15a,
  author       = {Jian Liu and
                  Sihem Mesnager and
                  Lusheng Chen},
  title        = {Secret Sharing Schemes with General Access Structures (Full version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1139},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1139},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuMC15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuP15,
  author       = {Shengli Liu and
                  Kenneth G. Paterson},
  title        = {Simulation-based Selective Opening {CCA} Security for {PKE} from Key
                  Encapsulation Mechanisms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {10},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/010},
  timestamp    = {Sun, 26 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuV15,
  author       = {Tianren Liu and
                  Vinod Vaikuntanathan},
  title        = {On Basing Private Information Retrieval on NP-Hardness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1061},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1061},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuW15,
  author       = {Zhen Liu and
                  Duncan S. Wong},
  title        = {Traceable {CP-ABE} on Prime Order Groups: Fully Secure and Fully Collusion-resistant
                  Blackbox Traceable},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {850},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/850},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuZC15,
  author       = {Chang Liu and
                  Liehuang Zhu and
                  Jinjun Chen},
  title        = {Efficient Searchable Symmetric Encryption for Storing Multiple Source
                  Data on Cloud},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {349},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/349},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuZC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LochterW15,
  author       = {Manfred Lochter and
                  Andreas Wiemers},
  title        = {Twist Insecurity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {577},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/577},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LochterW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lu15,
  author       = {Jiqiang Lu},
  title        = {On the Security of the {COPA} and Marble Authenticated Encryption
                  Algorithms against (Almost) Universal Forgery Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {79},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/079},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lu15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuO15,
  author       = {Steve Lu and
                  Rafail Ostrovsky},
  title        = {Black-Box Parallel Garbled {RAM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1068},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1068},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LuO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuZL15,
  author       = {Yang Lu and
                  Quanling Zhang and
                  Jiguo Li},
  title        = {Cryptanalysis of Three Certificate-Based Authenticated Key Agreement
                  Protocols and a Secure Construction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {256},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/256},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuZL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LueksAHV15,
  author       = {Wouter Lueks and
                  Gergely Alp{\'{a}}r and
                  Jaap{-}Henk Hoepman and
                  Pim Vullers},
  title        = {Fast Revocation of Attribute-Based Credentials for Both Users and
                  Verifiers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {237},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/237},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LueksAHV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuoFFDKL15,
  author       = {Pei Luo and
                  Yunsi Fei and
                  Xin Fang and
                  A. Adam Ding and
                  David R. Kaeli and
                  Miriam Leeser},
  title        = {Side-Channel Analysis of MAC-Keccak Hardware Implementations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {411},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/411},
  timestamp    = {Wed, 20 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LuoFFDKL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuoZFD15,
  author       = {Pei Luo and
                  Liwei Zhang and
                  Yunsi Fei and
                  A. Adam Ding},
  title        = {Towards Secure Cryptographic Software Implementation Against Side-Channel
                  Power Analysis Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {717},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/717},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuoZFD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuuSPSH15,
  author       = {Loi Luu and
                  Ratul Saha and
                  Inian Parameshwaran and
                  Prateek Saxena and
                  Aquinas Hobor},
  title        = {On Power Splitting Games in Distributed Computation: The Case of Bitcoin
                  Pooled Mining},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {155},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/155},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuuSPSH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuuTKS15,
  author       = {Loi Luu and
                  Jason Teutsch and
                  Raghav Kulkarni and
                  Prateek Saxena},
  title        = {Demystifying incentives in the consensus computer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {702},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/702},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuuTKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LychevJBN15,
  author       = {Robert Lychev and
                  Samuel Jero and
                  Alexandra Boldyreva and
                  Cristina Nita{-}Rotaru},
  title        = {How Secure and Quick is QUIC? Provable Security and Performance Analyses},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {582},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/582},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LychevJBN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LyubashevskyP15,
  author       = {Vadim Lyubashevsky and
                  Thomas Prest},
  title        = {Quadratic Time, Linear Space Algorithms for Gram-Schmidt Orthogonalization
                  and Gaussian Sampling in Structured Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {257},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/257},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LyubashevskyP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaLHL15,
  author       = {Bingke Ma and
                  Bao Li and
                  Ronglin Hao and
                  Xiaoqian Li},
  title        = {Cryptanalysis of Reduced-Round Whirlwind (Full Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {568},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/568},
  timestamp    = {Thu, 08 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaLHL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaLHL15a,
  author       = {Bingke Ma and
                  Bao Li and
                  Ronglin Hao and
                  Xiaoqian Li},
  title        = {Improved (Pseudo) Preimage Attacks on Reduced-Round {GOST} and Gr{\o}stl-256
                  and Studies on Several Truncation Patterns for AES-like Compression
                  Functions (Full Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {569},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/569},
  timestamp    = {Thu, 08 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaLHL15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaQ15,
  author       = {Xiaoshuang Ma and
                  Kexin Qiao},
  title        = {Related-Key Rectangle Attack on Round-reduced \emph{Khudra} Block
                  Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {533},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/533},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaQ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaeneV15,
  author       = {Pieter Maene and
                  Ingrid Verbauwhede},
  title        = {Single-Cycle Implementations of Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {658},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/658},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaeneV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaesLSW15,
  author       = {Roel Maes and
                  Vincent van der Leest and
                  Erik van der Sluis and
                  Frans M. J. Willems},
  title        = {Secure Key Generation from Biased PUFs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {583},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/583},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaesLSW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaffeiMRS15,
  author       = {Matteo Maffei and
                  Giulio Malavolta and
                  Manuel Reinert and
                  Dominique Schr{\"{o}}der},
  title        = {Privacy and Access Control for Outsourced Personal Records},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {224},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/224},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaffeiMRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MahmoodyM15,
  author       = {Mohammad Mahmoody and
                  Ameer Mohammed},
  title        = {On the Power of Hierarchical Identity-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {815},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/815},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MahmoodyM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MahmoodyMN15,
  author       = {Mohammad Mahmoody and
                  Ameer Mohammed and
                  Soheil Nematihaji},
  title        = {More on Impossibility of Virtual Black-Box Obfuscation in Idealized
                  Models},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {632},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/632},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MahmoodyMN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MahmoodyMNPS15,
  author       = {Mohammad Mahmoody and
                  Ameer Mohammed and
                  Soheil Nematihaji and
                  Rafael Pass and
                  Abhi Shelat},
  title        = {Lower Bounds on Assumptions behind Indistinguishability Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1062},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1062},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MahmoodyMNPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Maitin-Shepard15,
  author       = {Jeremy Maitin{-}Shepard},
  title        = {Optimal software-implemented Itoh-Tsujii inversion for GF(2\({}^{\mbox{m}}\))},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {28},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/028},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Maitin-Shepard15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Maitra15,
  author       = {Subhamoy Maitra},
  title        = {Chosen {IV} Cryptanalysis on Reduced Round ChaCha and Salsa},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {698},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/698},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Maitra15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Maitra15a,
  author       = {Subhamoy Maitra},
  title        = {The Index j in {RC4} is not Pseudo-random due to Non-existence of
                  Finney Cycle},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1043},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1043},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Maitra15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaitraPM15,
  author       = {Subhamoy Maitra and
                  Goutam Paul and
                  Willi Meier},
  title        = {Salsa20 Cryptanalysis: New Moves and Revisiting Old Styles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {217},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/217},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaitraPM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaitraPP15,
  author       = {Arpita Maitra and
                  Goutam Paul and
                  Asim K. Pal},
  title        = {Fairness in Secure Two-Party Computation with Rational Players},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1071},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1071},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaitraPP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaitraSBD15,
  author       = {Subhamoy Maitra and
                  Santanu Sarkar and
                  Anubhab Baksi and
                  Pramit Dey},
  title        = {Key Recovery from State Information of Sprout: Application to Cryptanalysis
                  and Fault Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {236},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/236},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaitraSBD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MalhotraCBG15,
  author       = {Aanchal Malhotra and
                  Isaac E. Cohen and
                  Erik Brakke and
                  Sharon Goldberg},
  title        = {Attacking the Network Time Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1020},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1020},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MalhotraCBG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Malik15,
  author       = {Muhammad Yasir Malik},
  title        = {Comprehensive Efficient Implementations of {ECC} on C54xx Family of
                  Low-cost Digital Signal Processors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {115},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/115},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Malik15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MalisaKC15,
  author       = {Luka Malisa and
                  Kari Kostiainen and
                  Srdjan Capkun},
  title        = {Detecting Mobile Application Spoofing Attacks by Leveraging User Visual
                  Similarity Perception},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {709},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/709},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MalisaKC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MandalSGP15,
  author       = {Bimal Mandal and
                  Pantelimon Stanica and
                  Sugata Gangopadhyay and
                  Enes Pasalic},
  title        = {An analysis of the {C} class of bent functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {588},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/588},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MandalSGP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MarcedoneWS15,
  author       = {Antonio Marcedone and
                  Zikai Wen and
                  Elaine Shi},
  title        = {Secure Dating with Four or Fewer Cards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1031},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1031},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MarcedoneWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MarianoLB15,
  author       = {Artur Mariano and
                  Thijs Laarhoven and
                  Christian H. Bischof},
  title        = {Parallel (probable) lock-free HashSieve: a practical sieving algorithm
                  for the {SVP}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {41},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/041},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MarianoLB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Martens15,
  author       = {Patrick M{\"{a}}rtens},
  title        = {Practical Compact E-Cash with Arbitrary Wallet Size},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {86},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/086},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Martens15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Martens15a,
  author       = {Patrick M{\"{a}}rtens},
  title        = {Practical Divisible E-Cash},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {318},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/318},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Martens15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MartinOOS15,
  author       = {Daniel P. Martin and
                  Jonathan F. O'Connell and
                  Elisabeth Oswald and
                  Martijn Stam},
  title        = {How to Enumerate Your Keys Accurately and Efficiently After a Side
                  Channel Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {689},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/689},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MartinOOS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Matsumoto15,
  author       = {Ryutaroh Matsumoto},
  title        = {Strong Security of the Strongly Multiplicative Ramp Secret Sharing
                  based on Algebraic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {662},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/662},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Matsumoto15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Mattsson15,
  author       = {John Preu{\ss} Mattsson},
  title        = {Authentication Key Recovery in Galois/Counter Mode {(GCM)}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {477},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/477},
  timestamp    = {Fri, 22 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Mattsson15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Mavromati15,
  author       = {Chrysanthi Mavromati},
  title        = {Key-recovery attacks against the {MAC} algorithm Chaskey},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {811},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/811},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Mavromati15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MayberryBN15,
  author       = {Travis Mayberry and
                  Erik{-}Oliver Blass and
                  Guevara Noubir},
  title        = {Multi-User Oblivious {RAM} Secure Against Malicious Servers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {121},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/121},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MayberryBN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MazonkaTM15,
  author       = {Oleg Mazonka and
                  Nektarios Georgios Tsoutsos and
                  Michail Maniatakos},
  title        = {Cryptoleq: {A} Heterogeneous Abstract Machine for Encrypted and Unencrypted
                  Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1226},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1226},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MazonkaTM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/McCannEO15,
  author       = {David McCann and
                  Kerstin Eder and
                  Elisabeth Oswald},
  title        = {Characterising and Comparing the Energy Consumption of Side Channel
                  Attack Countermeasures and Lightweight Cryptography on Embedded Devices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {832},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/832},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/McCannEO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/McCorrySCH15,
  author       = {Patrick McCorry and
                  Siamak Fayyaz Shahandashti and
                  Dylan Clarke and
                  Feng Hao},
  title        = {Authenticated Key Exchange over Bitcoin},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {308},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/308},
  timestamp    = {Tue, 10 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/McCorrySCH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MelisACK15,
  author       = {Luca Melis and
                  Hassan Jameel Asghar and
                  Emiliano De Cristofaro and
                  Mohamed Ali K{\^{a}}afar},
  title        = {Private Processing of Outsourced Network Functions: Feasibility and
                  Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {949},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/949},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MelisACK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MeloniH15,
  author       = {Nicolas M{\'{e}}loni and
                  M. Anwar Hasan},
  title        = {Random Digit Representation of Integers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {622},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/622},
  timestamp    = {Thu, 06 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/MeloniH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MendelNS15,
  author       = {Florian Mendel and
                  Tomislav Nad and
                  Martin Schl{\"{a}}ffer},
  title        = {Improving Local Collisions: New Attacks on Reduced {SHA-256}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {350},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/350},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MendelNS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MengKNK15,
  author       = {Xianrui Meng and
                  Seny Kamara and
                  Kobbi Nissim and
                  George Kollios},
  title        = {{GRECS:} Graph Encryption for Approximate Shortest Distance Queries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {266},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/266},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MengKNK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Mennink15,
  author       = {Bart Mennink},
  title        = {Optimally Secure Tweakable Blockciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {363},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/363},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Mennink15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Mennink15a,
  author       = {Bart Mennink},
  title        = {{XPX:} Generalized Tweakable Even-Mansour with Improved Security Guarantees},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {476},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/476},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Mennink15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MenninkP15,
  author       = {Bart Mennink and
                  Bart Preneel},
  title        = {On the Impact of Known-Key Attacks on Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {909},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/909},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MenninkP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MenninkRV15,
  author       = {Bart Mennink and
                  Reza Reyhanitabar and
                  Damian Viz{\'{a}}r},
  title        = {Security of Full-State Keyed and Duplex Sponge: Applications to Authenticated
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {541},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/541},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MenninkRV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Mesnager15,
  author       = {Sihem Mesnager},
  title        = {A note on constructions of bent functions from involutions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {982},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/982},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Mesnager15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Mesnager15a,
  author       = {Sihem Mesnager},
  title        = {Linear codes with few weights from weakly regular bent functions based
                  on a generic construction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1103},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1103},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Mesnager15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MicciancioW15,
  author       = {Daniele Micciancio and
                  Michael Walter},
  title        = {Practical, Predictable Lattice Basis Reduction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1123},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1123},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MicciancioW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MieleL15,
  author       = {Andrea Miele and
                  Arjen K. Lenstra},
  title        = {Efficient ephemeral elliptic curve cryptographic keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {647},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/647},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MieleL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MihajloskaGS15,
  author       = {Hristina Mihajloska and
                  Danilo Gligoroski and
                  Simona Samardjiska},
  title        = {Reviving the Idea of Incremental Cryptography for the Zettabyte era
                  Use case: Incremental Hash Functions Based on {SHA-3}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1028},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1028},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MihajloskaGS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MillerJ15,
  author       = {Andrew Miller and
                  Rob Jansen},
  title        = {Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded
                  Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {469},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/469},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MillerJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MinaudDFK15,
  author       = {Brice Minaud and
                  Patrick Derbez and
                  Pierre{-}Alain Fouque and
                  Pierre Karpman},
  title        = {Key-Recovery Attacks on {ASASA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {516},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/516},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MinaudDFK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MinaudF15,
  author       = {Brice Minaud and
                  Pierre{-}Alain Fouque},
  title        = {Cryptanalysis of the New Multilinear Map over the Integers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {941},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/941},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MinaudF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MinaudS15,
  author       = {Brice Minaud and
                  Yannick Seurin},
  title        = {The Iterated Random Permutation Problem with Applications to Cascade
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {504},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/504},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MinaudS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Minematsu15,
  author       = {Kazuhiko Minematsu},
  title        = {Authenticated Encryption without Tag Expansion (or, How to Accelerate
                  {AERO)}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {738},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/738},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Minematsu15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MinematsuI15,
  author       = {Kazuhiko Minematsu and
                  Tetsu Iwata},
  title        = {Tweak-Length Extension for Tweakable Blockciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {888},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/888},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MinematsuI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoatazB15,
  author       = {Tarik Moataz and
                  Erik{-}Oliver Blass},
  title        = {Oblivious Substring Search with Updates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {722},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/722},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoatazB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoatazBM15,
  author       = {Tarik Moataz and
                  Erik{-}Oliver Blass and
                  Travis Mayberry},
  title        = {Constant Communication {ORAM} without Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1116},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1116},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoatazBM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoatazMB15,
  author       = {Tarik Moataz and
                  Travis Mayberry and
                  Erik{-}Oliver Blass},
  title        = {Constant Communication Oblivious {RAM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {570},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/570},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoatazMB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MohasselRZ15,
  author       = {Payman Mohassel and
                  Mike Rosulek and
                  Ye Zhang},
  title        = {Fast and Secure Three-party Computation: The Garbled Circuit Approach},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {931},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/931},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MohasselRZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MohsenP15,
  author       = {Rabih Mohsen and
                  Alexandre Miranda Pinto},
  title        = {Algorithmic Information Theory for Obfuscation Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {793},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/793},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MohsenP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoodyP15,
  author       = {Dustin Moody and
                  Ray A. Perlner},
  title        = {Vulnerabilities of "McEliece in the World of Escher"},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {966},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/966},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoodyP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoradiH15,
  author       = {Amir Moradi and
                  Gesine Hinterw{\"{a}}lder},
  title        = {Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {199},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/199},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoradiH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoradiW15,
  author       = {Amir Moradi and
                  Alexander Wild},
  title        = {Assessment of Hiding the Higher-Order Leakages in Hardware - what
                  are the achievements versus overheads?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {597},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/597},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoradiW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Morales-Sandoval15,
  author       = {Miguel Morales{-}Sandoval and
                  Arturo Diaz{-}Perez},
  title        = {Novel algorithms and hardware architectures for Montgomery Multiplication
                  over GF(p)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {696},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/696},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Morales-Sandoval15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Morawiecki15,
  author       = {Pawel Morawiecki},
  title        = {Practical Attacks on the Round-reduced {PRINCE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {245},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/245},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Morawiecki15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Morawiecki15a,
  author       = {Pawel Morawiecki},
  title        = {Malicious Keccak},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1085},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1085},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Morawiecki15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MorawieckiPSS15,
  author       = {Pawel Morawiecki and
                  Josef Pieprzyk and
                  Michal Straus and
                  Marian Srebrny},
  title        = {Applications of Key Recovery Cube-attack-like},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1009},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1009},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MorawieckiPSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MorchonRST15,
  author       = {Oscar Garc{\'{\i}}a Morchon and
                  Ronald Rietman and
                  Igor E. Shparlinski and
                  Ludo Tolhuizen},
  title        = {Results on polynomial interpolation with mixed modular operations
                  and unknown moduli},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1003},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1003},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MorchonRST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MorchonRSTT15,
  author       = {Oscar Garc{\'{\i}}a Morchon and
                  Ronald Rietman and
                  Sahil Sharma and
                  Ludo Tolhuizen and
                  Jose Luis Torre{-}Arce},
  title        = {A comprehensive and lightweight security architecture to secure the
                  IoT throughout the lifecycle of a device based on {HIMMO}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {454},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/454},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MorchonRSTT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MorilloRV15,
  author       = {Paz Morillo and
                  Carla R{\`{a}}fols and
                  Jorge L. Villar},
  title        = {Matrix Computational Assumptions in Multilinear Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {353},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/353},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MorilloRV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoritaS0HI15,
  author       = {Hiraku Morita and
                  Jacob C. N. Schuldt and
                  Takahiro Matsuda and
                  Goichiro Hanaoka and
                  Tetsu Iwata},
  title        = {On the Security of the Schnorr Signature Scheme and {DSA} against
                  Related-Key Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1135},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1135},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoritaS0HI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Mosca15,
  author       = {Michele Mosca},
  title        = {Cybersecurity in an era with quantum computers: will we be ready?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1075},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1075},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Mosca15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Mouha15,
  author       = {Nicky Mouha},
  title        = {The Design Space of Lightweight Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {303},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/303},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Mouha15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Mouha15a,
  author       = {Nicky Mouha},
  title        = {Chaskey: a {MAC} Algorithm for Microcontrollers - Status Update and
                  Proposal of Chaskey-12 -},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1182},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1182},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Mouha15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MouhaL15,
  author       = {Nicky Mouha and
                  Atul Luykx},
  title        = {Multi-Key Security: The Even-Mansour Construction Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {101},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/101},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MouhaL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MourouzisSCC15,
  author       = {Theodosis Mourouzis and
                  Guangyan Song and
                  Nicolas T. Courtois and
                  Michalis Christofi},
  title        = {Advanced Differential Cryptanalysis of Reduced-Round {SIMON64/128}
                  Using Large-Round Statistical Distinguishers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {481},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/481},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MourouzisSCC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MovahediSZ15,
  author       = {Mahnush Movahedi and
                  Jared Saia and
                  Mahdi Zamani},
  title        = {Secure Multi-Party Shuffling},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {664},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/664},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MovahediSZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MukherjeeW15,
  author       = {Pratyay Mukherjee and
                  Daniel Wichs},
  title        = {Two Round {MPC} from {LWE} via Multi-Key {FHE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {345},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/345},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MukherjeeW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MurtaghV15,
  author       = {Jack Murtagh and
                  Salil P. Vadhan},
  title        = {The Complexity of Computing the Optimal Composition of Differential
                  Privacy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1057},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1057},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MurtaghV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nagao15,
  author       = {Koh{-}ichi Nagao},
  title        = {Complexity of {ECDLP} under the First Fall Degree Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {984},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/984},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nagao15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nagao15a,
  author       = {Koh{-}ichi Nagao},
  title        = {Polynomial time reduction from 3SAT to solving low first fall degree
                  multivariable cubic equations system},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {985},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/985},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nagao15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nagao15b,
  author       = {Koh{-}ichi Nagao},
  title        = {Bit Coincidence Mining Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {986},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/986},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nagao15b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nandi15,
  author       = {Mridul Nandi},
  title        = {On the Optimality of Non-Linear Computations of Length-Preserving
                  Encryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {414},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/414},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nandi15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nandi15a,
  author       = {Mridul Nandi},
  title        = {Revisiting Security Claims of {XLS} and {COPA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {444},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/444},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nandi15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nandi15b,
  author       = {Mridul Nandi},
  title        = {{XLS} is not a Strong Pseudorandom Permutation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {445},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/445},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nandi15b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nandi15c,
  author       = {Mridul Nandi},
  title        = {A Simple Proof of a Distinguishing Bound of Iterated Uniform Random
                  Permutation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {579},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/579},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nandi15c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NandiP15,
  author       = {Mridul Nandi and
                  Tapas Pandit},
  title        = {Generic Conversions from {CPA} to {CCA} secure Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {457},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/457},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NandiP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NandiP15a,
  author       = {Mridul Nandi and
                  Tapas Pandit},
  title        = {On the Power of Pair Encodings: Frameworks for Predicate Cryptographic
                  Primitives},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {955},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/955},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NandiP15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorY15,
  author       = {Moni Naor and
                  Eylon Yogev},
  title        = {Bloom Filters in Adversarial Environments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {543},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/543},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaorY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Naveed15,
  author       = {Muhammad Naveed},
  title        = {The Fallacy of Composition of Oblivious {RAM} and Searchable Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {668},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/668},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Naveed15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NayakKMS15,
  author       = {Kartik Nayak and
                  Srijan Kumar and
                  Andrew Miller and
                  Elaine Shi},
  title        = {Stubborn Mining: Generalizing Selfish Mining and Combining with an
                  Eclipse Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {796},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/796},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NayakKMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NevesT15,
  author       = {Samuel Neves and
                  Mehdi Tibouchi},
  title        = {Degenerate Curve Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1233},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1233},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NevesT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NguyenZZ15,
  author       = {Phong Q. Nguyen and
                  Jiang Zhang and
                  Zhenfeng Zhang},
  title        = {Simpler Efficient Group Signatures from Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {20},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/020},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NguyenZZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NielsenR15,
  author       = {Jesper Buus Nielsen and
                  Samuel Ranellucci},
  title        = {Foundations of Reactive Garbling Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {693},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/693},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NielsenR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NikolicWW15,
  author       = {Ivica Nikolic and
                  Lei Wang and
                  Shuang Wu},
  title        = {Cryptanalysis of Round-Reduced {LED}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {429},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/429},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NikolicWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NingDCW15,
  author       = {Jianting Ning and
                  Xiaolei Dong and
                  Zhenfu Cao and
                  Lifei Wei},
  title        = {Accountable Authority Ciphertext-Policy Attribute-Based Encryption
                  with White-Box Traceability and Public Auditing in the Cloud},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {613},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/613},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NingDCW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NishimakiW15,
  author       = {Ryo Nishimaki and
                  Daniel Wichs},
  title        = {Watermarking Cryptographic Programs Against Arbitrary Removal Strategies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {344},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/344},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NishimakiW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NishimakiWZ15,
  author       = {Ryo Nishimaki and
                  Daniel Wichs and
                  Mark Zhandry},
  title        = {Anonymous Traitor Tracing: How to Embed Arbitrary Information in a
                  Key},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {750},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/750},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NishimakiWZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NishimakiX15,
  author       = {Ryo Nishimaki and
                  Keita Xagawa},
  title        = {Verifiably Encrypted Signatures with Short Keys based on the Decisional
                  Linear Problem and Obfuscation for Encrypted {VES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {248},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/248},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NishimakiX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NitajR15,
  author       = {Abderrahmane Nitaj and
                  Tajjeeddine Rachidi},
  title        = {Factoring {RSA} moduli with weak prime factors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {398},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/398},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NitajR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NitajR15a,
  author       = {Abderrahmane Nitaj and
                  Tajjeeddine Rachidi},
  title        = {New attacks on {RSA} with Moduli N=p\({}^{\mbox{rq}}\)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {399},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/399},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NitajR15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NitajR15b,
  author       = {Abderrahmane Nitaj and
                  Tajjeeddine Rachidi},
  title        = {Lattice Attacks on the {DGHV} Homomorphic Encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1145},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1145},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NitajR15b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NiwaOMI15,
  author       = {Yuichi Niwa and
                  Keisuke Ohashi and
                  Kazuhiko Minematsu and
                  Tetsu Iwata},
  title        = {{GCM} Security Bounds Reconsidered},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {214},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/214},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NiwaOMI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Noether15,
  author       = {Shen Noether},
  title        = {Ring SIgnature Confidential Transactions for Monero},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1098},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1098},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Noether15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NojoumianS15,
  author       = {Mehrdad Nojoumian and
                  Douglas R. Stinson},
  title        = {Sequential Secret Sharing as a New Hierarchical Access Structure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {403},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/403},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NojoumianS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NouraC15,
  author       = {Hassan Noura and
                  Damien Courouss{\'{e}}},
  title        = {{HLDCA-WSN:} Homomorphic Lightweight Data Confidentiality Algorithm
                  for Wireless Sensor Network},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {928},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/928},
  timestamp    = {Thu, 09 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/NouraC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OFlynnC15,
  author       = {Colin O'Flynn and
                  Zhizhang Chen},
  title        = {Power Analysis Attacks against {IEEE} 802.15.4 Nodes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {529},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/529},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OFlynnC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OdeluDG15,
  author       = {Vanga Odelu and
                  Ashok Kumar Das and
                  Adrijit Goswami},
  title        = {An Efficient {CP-ABE} with Constant Size Secret Keys using {ECC} for
                  Lightweight Devices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {841},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/841},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OdeluDG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OhataK0HM15,
  author       = {Satsuya Ohata and
                  Yutaka Kawai and
                  Takahiro Matsuda and
                  Goichiro Hanaoka and
                  Kanta Matsuura},
  title        = {Re-encryption Verifiability: How to Detect Malicious Activities of
                  a Proxy in Proxy Re-encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {112},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/112},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OhataK0HM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OkamotoPWW15,
  author       = {Tatsuaki Okamoto and
                  Krzysztof Pietrzak and
                  Brent Waters and
                  Daniel Wichs},
  title        = {New Realizations of Somewhere Statistically Binding Hashing and Positional
                  Accumulators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {869},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/869},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OkamotoPWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OkumuraSYT15,
  author       = {Shinya Okumura and
                  Shingo Sugiyama and
                  Masaya Yasuda and
                  Tsuyoshi Takagi},
  title        = {Security Analysis of Cryptosystems Using Short Generators over Ideal
                  Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1004},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1004},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OkumuraSYT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OlejnikACD15,
  author       = {Lukasz Olejnik and
                  Gunes Acar and
                  Claude Castelluccia and
                  Claudia D{\'{\i}}az},
  title        = {The leaking battery: {A} privacy analysis of the {HTML5} Battery Status
                  {API}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {616},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/616},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OlejnikACD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OlimidP15,
  author       = {Ruxandra F. Olimid and
                  Anat Paskin{-}Cherniavsky},
  title        = {On Cryptographic Anonimity and Unpredicatbility in Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1234},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1234},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OlimidP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OliynykovGKRKGB15,
  author       = {Roman Oliynykov and
                  Ivan Gorbenko and
                  Oleksandr Kazymyrov and
                  Victor Ruzhentsev and
                  Oleksandr Kuznetsov and
                  Yurii Gorbenko and
                  Artem Boiko and
                  Oleksandr Dyrda and
                  Viktor Dolgov and
                  Andrii Pushkaryov},
  title        = {A New Standard of Ukraine: The Kupyna Hash Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {885},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/885},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OliynykovGKRKGB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OliynykovGKRKGD15,
  author       = {Roman Oliynykov and
                  Ivan Gorbenko and
                  Oleksandr Kazymyrov and
                  Victor Ruzhentsev and
                  Oleksandr Kuznetsov and
                  Yurii Gorbenko and
                  Oleksandr Dyrda and
                  Viktor Dolgov and
                  Andrii Pushkaryov and
                  Ruslan Mordvinov and
                  Dmytro Kaidalov},
  title        = {A New Encryption Standard of Ukraine: The Kalyna Block Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {650},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/650},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OliynykovGKRKGD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OrenSW15,
  author       = {Yossef Oren and
                  Ahmad{-}Reza Sadeghi and
                  Christian Wachsmann},
  title        = {On the Effectiveness of the Remanence Decay Side-Channel to Clone
                  Memory-based PUFs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {148},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/148},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OrenSW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OstrovskyRS15,
  author       = {Rafail Ostrovsky and
                  Silas Richelson and
                  Alessandra Scafuro},
  title        = {Round-Optimal Black-Box Two-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {553},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/553},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OstrovskyRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OzenCK15,
  author       = {Mehmet {\"{O}}zen and
                  Mustafa {\c{C}}oban and
                  Ferhat Karako{\c{c}}},
  title        = {A Guess-and-Determine Attack on Reduced-Round Khudra and Weak Keys
                  of Full Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1163},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1163},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OzenCK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OzturkDSS15,
  author       = {Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and
                  Yarkin Dor{\"{o}}z and
                  Berk Sunar and
                  Erkay Savas},
  title        = {Accelerating Somewhat Homomorphic Evaluation using FPGAs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {294},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/294},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OzturkDSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PagourtzisPS15,
  author       = {Aris Pagourtzis and
                  Giorgos Panagiotakos and
                  Dimitris Sakavalas},
  title        = {Reliable Message Transmission under Partial Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {243},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/243},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PagourtzisPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PanditPB15,
  author       = {Tapas Pandit and
                  Sumit Kumar Pandey and
                  Rana Barua},
  title        = {Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability
                  and {IND-CCA2} Security in Adaptive-Predicates Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {555},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/555},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PanditPB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PanethS15,
  author       = {Omer Paneth and
                  Amit Sahai},
  title        = {On the Equivalence of Obfuscation and Multilinear Maps},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {791},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/791},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PanethS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ParkPAFG15,
  author       = {Sunoo Park and
                  Krzysztof Pietrzak and
                  Albert Kwon and
                  Jo{\"{e}}l Alwen and
                  Georg Fuchsbauer and
                  Peter Gazi},
  title        = {Spacemint: {A} Cryptocurrency Based on Proofs of Space},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {528},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/528},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ParkPAFG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Parno15,
  author       = {Bryan Parno},
  title        = {A Note on the Unsoundness of vnTinyRAM's {SNARK}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {437},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/437},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Parno15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PassS15,
  author       = {Rafael Pass and
                  Abhi Shelat},
  title        = {Impossibility of {VBB} Obfuscation with Ideal Constant-Degree Graded
                  Encodings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {383},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/383},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PassS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatersonSSW15,
  author       = {Kenneth G. Paterson and
                  Jacob C. N. Schuldt and
                  Dale L. Sibborn and
                  Hoeteck Wee},
  title        = {Security Against Related Randomness Attacks via Reconstructive Extractors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {892},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/892},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatersonSSW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatranabisCM15,
  author       = {Sikhar Patranabis and
                  Abhishek Chakraborty and
                  Debdeep Mukhopadhyay},
  title        = {Fault Tolerant Infective Countermeasure for {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {493},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/493},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatranabisCM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatranabisCMC15,
  author       = {Sikhar Patranabis and
                  Abhishek Chakraborty and
                  Debdeep Mukhopadhyay and
                  P. P. Chakrabarti},
  title        = {Using State Space Encoding To Counter Biased Fault Attacks on {AES}
                  Countermeasures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {806},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/806},
  timestamp    = {Mon, 07 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/PatranabisCMC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatranabisRM15,
  author       = {Sikhar Patranabis and
                  Debapriya Basu Roy and
                  Debdeep Mukhopadhyay},
  title        = {Using Tweaks To Design Fault Resistant Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {932},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/932},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatranabisRM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatranabisSM15,
  author       = {Sikhar Patranabis and
                  Yash Shrivastava and
                  Debdeep Mukhopadhyay},
  title        = {Dynamic Key-Aggregate Cryptosystem on Elliptic Curves for Online Data
                  Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {923},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/923},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatranabisSM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatsakisKB15,
  author       = {Constantinos Patsakis and
                  Panayiotis Kotzanikolaou and
                  M{\'{e}}lanie Bouroche},
  title        = {Private Proximity Testing on Steroids: An NTRU-based Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {917},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/917},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatsakisKB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PaulR15,
  author       = {Goutam Paul and
                  Souvik Ray},
  title        = {On Data Complexity of Distinguishing Attacks vs. Message Recovery
                  Attacks on Stream Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1174},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1174},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PaulR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PavlovskiB15,
  author       = {Chris Pavlovski and
                  Colin Boyd},
  title        = {Microcash: Efficient Off-Line Small Payments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {635},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/635},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PavlovskiB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Peikert15,
  author       = {Chris Peikert},
  title        = {A Decade of Lattice Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {939},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/939},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Peikert15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Pellet-MaryS15,
  author       = {Alice Pellet{-}Mary and
                  Damien Stehl{\'{e}}},
  title        = {Cryptanalysis of Gu's ideal multilinear map},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {759},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/759},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Pellet-MaryS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PettaiL15,
  author       = {Martin Pettai and
                  Peeter Laud},
  title        = {Combining Differential Privacy and Secure Multiparty Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {598},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/598},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PettaiL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PeyrinS15,
  author       = {Thomas Peyrin and
                  Yannick Seurin},
  title        = {Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block
                  Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1049},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1049},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PeyrinS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Piedra15,
  author       = {Antonio de la Piedra},
  title        = {Efficient implementation of AND, {OR} and {NOT} operators for ABCs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1117},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1117},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Piedra15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PietrzakS15,
  author       = {Krzysztof Pietrzak and
                  Maciej Skorski},
  title        = {The Chain Rule for {HILL} Pseudoentropy, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {599},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/599},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PietrzakS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Pinkas0SZ15,
  author       = {Benny Pinkas and
                  Thomas Schneider and
                  Gil Segev and
                  Michael Zohner},
  title        = {Phasing: Private Set Intersection using Permutation-based Hashing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {634},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/634},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Pinkas0SZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PoetteringS15,
  author       = {Bertram Poettering and
                  Dale L. Sibborn},
  title        = {Cold Boot Attacks in the Discrete Logarithm Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {57},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/057},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PoetteringS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PointchevalS15,
  author       = {David Pointcheval and
                  Olivier Sanders},
  title        = {Short Randomizable Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {525},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/525},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PointchevalS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PointchevalST15,
  author       = {David Pointcheval and
                  Olivier Sanders and
                  Jacques Traor{\'{e}}},
  title        = {Cut Down the Tree to Achieve Constant Complexity in Divisible E-Cash},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {972},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/972},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PointchevalST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PopaZB15,
  author       = {Raluca Ada Popa and
                  Nickolai Zeldovich and
                  Hari Balakrishnan},
  title        = {Guidelines for Using the CryptDB System Securely},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {979},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/979},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PopaZB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PoppelmannNPM15,
  author       = {Thomas P{\"{o}}ppelmann and
                  Michael Naehrig and
                  Andrew Putnam and
                  Adri{\'{a}}n Mac{\'{\i}}as},
  title        = {Accelerating Homomorphic Evaluation on Reconfigurable Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {631},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/631},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PoppelmannNPM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PoppelmannOG15,
  author       = {Thomas P{\"{o}}ppelmann and
                  Tobias Oder and
                  Tim G{\"{u}}neysu},
  title        = {Speed Records for Ideal Lattice-Based Cryptography on {AVR}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {382},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/382},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PoppelmannOG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Pornin15,
  author       = {Thomas Pornin},
  title        = {Optimizing {MAKWA} on {GPU} and {CPU}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {678},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/678},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Pornin15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PullsP15,
  author       = {Tobias Pulls and
                  Roel Peeters},
  title        = {Balloon: {A} Forward-Secure Append-Only Persistent Authenticated Data
                  Structure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {7},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/007},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PullsP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PullsP15a,
  author       = {Tobias Pulls and
                  Roel Peeters},
  title        = {Insynd: Privacy-Preserving Secure One-Way Messaging Using Balloons},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {150},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/150},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PullsP15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/QaradaghiA15,
  author       = {Thuraya M. Qaradaghi and
                  Newroz N. Abdulrazaq},
  title        = {Comparison Between Irreducible and Separable Goppa Code in McEliece
                  Cryptosystem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1050},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1050},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/QaradaghiA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/QiaoHS15,
  author       = {Kexin Qiao and
                  Lei Hu and
                  Siwei Sun},
  title        = {Differential Security Evaluation of Simeck with Dynamic Key-guessing
                  Techniques},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {902},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/902},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/QiaoHS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/QinL15,
  author       = {Baodong Qin and
                  Shengli Liu},
  title        = {Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction
                  and Free of Pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {272},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/272},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/QinL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/QinLYDC15,
  author       = {Baodong Qin and
                  Shengli Liu and
                  Tsz Hon Yuen and
                  Robert H. Deng and
                  Kefei Chen},
  title        = {Continuous Non-Malleable Key Derivation and Its Application to Related-Key
                  Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {3},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/003},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/QinLYDC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/QuSLS15,
  author       = {Haipeng Qu and
                  Peng Shang and
                  Xi Jun Lin and
                  Lin Sun},
  title        = {Cryptanalysis of {A} Privacy-Preserving Smart Metering Scheme Using
                  Linkable Anonymous Credential},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1066},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1066},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/QuSLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/QuagliaS15,
  author       = {Elizabeth A. Quaglia and
                  Ben Smyth},
  title        = {Constructing secret, verifiable auction schemes from election schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1204},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1204},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/QuagliaS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RK15,
  author       = {B. R. Purushothama and
                  Nishat Koti},
  title        = {On the Security of an Efficient Group Key Agreement Scheme for MANETs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {177},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/177},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Rafols15,
  author       = {Carla R{\`{a}}fols},
  title        = {Stretching Groth-Sahai: {NIZK} Proofs of Partial Satisfiability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {50},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/050},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Rafols15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RashidiSF15,
  author       = {Bahram Rashidi and
                  Sayed Masoud Sayedi and
                  Reza Rezaeian Farashahi},
  title        = {Efficient and Low-complexity Hardware Architecture of Gaussian Normal
                  Basis Multiplication over GF(2m) for Elliptic Curve Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1109},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1109},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RashidiSF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RauzyMGN15,
  author       = {Pablo Rauzy and
                  Martin Moreau and
                  Sylvain Guilley and
                  Zakaria Najm},
  title        = {A Generic Countermeasure Against Fault Injection Attacks on Asymmetric
                  Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {882},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/882},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RauzyMGN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Raykov15,
  author       = {Pavel Raykov},
  title        = {Broadcast from Minicast Secure Against General Adversaries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {352},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/352},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Raykov15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RebeiroM15,
  author       = {Chester Rebeiro and
                  Debdeep Mukhopadhyay},
  title        = {A Formal Analysis of Prefetching in Profiled Cache-Timing Attacks
                  on Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1191},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1191},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RebeiroM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RenesCB15,
  author       = {Joost Renes and
                  Craig Costello and
                  Lejla Batina},
  title        = {Complete addition formulas for prime order elliptic curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1060},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1060},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RenesCB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Reparaz15,
  author       = {Oscar Reparaz},
  title        = {A note on the security of Higher-Order Threshold Implementations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/001},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Reparaz15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ReparazBNGV15,
  author       = {Oscar Reparaz and
                  Beg{\"{u}}l Bilgin and
                  Svetla Nikova and
                  Benedikt Gierlichs and
                  Ingrid Verbauwhede},
  title        = {Consolidating masking schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {719},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/719},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ReparazBNGV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ReparazRVV15,
  author       = {Oscar Reparaz and
                  Sujoy Sinha Roy and
                  Frederik Vercauteren and
                  Ingrid Verbauwhede},
  title        = {A masked ring-LWE implementation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {724},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/724},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ReparazRVV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ReyhanitabarVV15,
  author       = {Reza Reyhanitabar and
                  Serge Vaudenay and
                  Damian Viz{\'{a}}r},
  title        = {Boosting {OMD} for Almost Free Authentication of Associated Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {302},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/302},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ReyhanitabarVV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ReyzinY15,
  author       = {Leonid Reyzin and
                  Sophia Yakoubov},
  title        = {Efficient Asynchronous Accumulators for Distributed {PKI}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {718},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/718},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ReyzinY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RishakaniDSMP15,
  author       = {Akbar Mahmoodi Rishakani and
                  Seyed Mojtaba Dehnavi and
                  M. R. Mirzaee Shamsabad and
                  Hamidreza Maimani and
                  Einollah Pasha},
  title        = {Statistical Properties of Multiplication mod 2\({}^{\mbox{n}}\)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {201},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/201},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RishakaniDSMP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RiviereNRDBS15,
  author       = {Lionel Rivi{\`{e}}re and
                  Zakaria Najm and
                  Pablo Rauzy and
                  Jean{-}Luc Danger and
                  Julien Bringer and
                  Laurent Sauvage},
  title        = {High Precision Fault Injections on the Instruction Cache of ARMv7-M
                  Architectures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {147},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/147},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RiviereNRDBS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RobissonASHWBP15,
  author       = {Bruno Robisson and
                  Michel Agoyan and
                  Patrick Soquet and
                  S{\'{e}}bastien Le Henaff and
                  Franck Wajsb{\"{u}}rt and
                  Pirouz Bazargan{-}Sabet and
                  Guillaume Phan},
  title        = {Smart Security Management in Secure Devices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {670},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/670},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RobissonASHWBP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RocheAC15,
  author       = {Daniel S. Roche and
                  Adam J. Aviv and
                  Seung Geol Choi},
  title        = {A Practical Oblivious Map Data Structure with Secure Deletion and
                  History Independence},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1126},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1126},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RocheAC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RocheACY15,
  author       = {Daniel S. Roche and
                  Daniel Apon and
                  Seung Geol Choi and
                  Arkady Yerukhimovich},
  title        = {{POPE:} Partial Order-Preserving Encoding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1106},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1106},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RocheACY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Rogaway15,
  author       = {Phillip Rogaway},
  title        = {The Moral Character of Cryptographic Work},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1162},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1162},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Rogaway15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics