Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/iacr/iacr2016.bht:"
more than 1000 matches, exporting first 1000 hits only!
@article{DBLP:journals/iacr/0001HKP16, author = {Michael Backes and Amir Herzberg and Aniket Kate and Ivan Pryvalov}, title = {Anonymous {RAM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {678}, year = {2016}, url = {http://eprint.iacr.org/2016/678}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001HKP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001JNSS16, author = {Jian Guo and J{\'{e}}r{\'{e}}my Jean and Ivica Nikolic and Yu Sasaki and Siang Meng Sim}, title = {Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {973}, year = {2016}, url = {http://eprint.iacr.org/2016/973}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001JNSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001LS16, author = {Jian Guo and Meicheng Liu and Ling Song}, title = {Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {878}, year = {2016}, url = {http://eprint.iacr.org/2016/878}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001LS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001MOS16, author = {Daniel P. Martin and Luke Mather and Elisabeth Oswald and Martijn Stam}, title = {Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {491}, year = {2016}, url = {http://eprint.iacr.org/2016/491}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001MOS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001P16, author = {Qiang Tang and Balazs Pejo}, title = {Game-Theoretic Framework for Integrity Veri cation in Computation Outsourcing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {639}, year = {2016}, url = {http://eprint.iacr.org/2016/639}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001P16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001R16, author = {Lorenzo Grassi and Christian Rechberger}, title = {Practical low data-complexity subspace-trail cryptanalysis of round-reduced {PRINCE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {964}, year = {2016}, url = {http://eprint.iacr.org/2016/964}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001R16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0002H16, author = {Takahiro Matsuda and Goichiro Hanaoka}, title = {Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {235}, year = {2016}, url = {http://eprint.iacr.org/2016/235}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0002H16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0002L16, author = {Chun Guo and Dongdai Lin}, title = {Indifferentiability of 3-Round Even-Mansour with Random Oracle Key Derivation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {894}, year = {2016}, url = {http://eprint.iacr.org/2016/894}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0002L16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0002LL16, author = {Chun Guo and Dongdai Lin and Meicheng Liu}, title = {Cascade Ciphers Revisited: Indifferentiability Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {825}, year = {2016}, url = {http://eprint.iacr.org/2016/825}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0002LL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/002116, author = {Jie Chen}, title = {Tightly Secure {IBE} under Constant-size Master Public Key}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {891}, year = {2016}, url = {http://eprint.iacr.org/2016/891}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/002116.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/00310ZZG16, author = {Lei Wang and Jian Guo and Guoyan Zhang and Jingyuan Zhao and Dawu Gu}, title = {How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {876}, year = {2016}, url = {http://eprint.iacr.org/2016/876}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/00310ZZG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBCP16, author = {Michel Abdalla and Florian Bourse and Angelo De Caro and David Pointcheval}, title = {Better Security for Functional Encryption for Inner Product Evaluations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {11}, year = {2016}, url = {http://eprint.iacr.org/2016/011}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBCP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaCNP16, author = {Michel Abdalla and Mario Cornejo and Anca Nitulescu and David Pointcheval}, title = {Robust Password-Protected Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {123}, year = {2016}, url = {http://eprint.iacr.org/2016/123}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaCNP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaRW16, author = {Michel Abdalla and Mariana Raykova and Hoeteck Wee}, title = {Multi-Input Inner-Product Functional Encryption from Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {425}, year = {2016}, url = {http://eprint.iacr.org/2016/425}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaRW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdolmalekiBKA16, author = {Behzad Abdolmaleki and Karim Baghery and Shahram Khazaei and Mohammad Reza Aref}, title = {Game-Based Privacy Analysis of {RFID} Security Schemes for Confident Au-thentication in IoT}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {649}, year = {2016}, url = {http://eprint.iacr.org/2016/649}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdolmalekiBKA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbeHO16, author = {Masayuki Abe and Fumitaka Hoshino and Miyako Ohkubo}, title = {Design in Type-I, Run in Type-III: Fast and Scalable Bilinear-Type Conversion using Integer Programming}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {570}, year = {2016}, url = {http://eprint.iacr.org/2016/570}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbeHO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbedBL16, author = {Farzaneh Abed and Francesco Berti and Stefan Lucks}, title = {Insecurity of {RCB:} Leakage-Resilient Authenticated Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1121}, year = {2016}, url = {http://eprint.iacr.org/2016/1121}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbedBL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbidinACM16, author = {Aysajan Abidin and Abdelrahaman Aly and Sara Cleemput and Mustafa A. Mustafa}, title = {An MPC-based Privacy-Preserving Protocol for a Local Electricity Trading Market}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {797}, year = {2016}, url = {http://eprint.iacr.org/2016/797}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbidinACM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbuAA16, author = {Nur Azman Abu and Shekh Faisal Abdul{-}Latip and Muhammad Rezal Kamel Ariffin}, title = {A Comparative S-Index in Factoring {RSA} Modulus via Lucas Sequences}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {937}, year = {2016}, url = {http://eprint.iacr.org/2016/937}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbuAA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbusalahF16, author = {Hamza Abusalah and Georg Fuchsbauer}, title = {Constrained PRFs for Unbounded Inputs with Short Keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {279}, year = {2016}, url = {http://eprint.iacr.org/2016/279}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbusalahF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AcharyaD16, author = {Kamalesh Acharya and Ratna Dutta}, title = {Secure and {E} fficient Construction of Broadcast Encryption with Dealership}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {844}, year = {2016}, url = {http://eprint.iacr.org/2016/844}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AcharyaD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AdjCCMORR16, author = {Gora Adj and Isaac Canales{-}Mart{\'{\i}}nez and Nareli Cruz Cort{\'{e}}s and Alfred Menezes and Thomaz Oliveira and Luis Rivera{-}Zamarripa and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {Computing discrete logarithms in cryptographically-interesting characteristic-three finite fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {914}, year = {2016}, url = {http://eprint.iacr.org/2016/914}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AdjCCMORR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgievichMMS16, author = {Sergey Agievich and Vadim Marchuk and Alexander Maslau and Vlad Semenov}, title = {Bash-f: another {LRX} sponge function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {587}, year = {2016}, url = {http://eprint.iacr.org/2016/587}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgievichMMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Agrawal16, author = {Shweta Agrawal}, title = {Interpolating Predicate and Functional Encryption from Learning With Errors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {654}, year = {2016}, url = {http://eprint.iacr.org/2016/654}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Agrawal16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalKW16, author = {Shashank Agrawal and Venkata Koppula and Brent Waters}, title = {Impossibility of Simulation Secure Functional Encryption Even with Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {959}, year = {2016}, url = {http://eprint.iacr.org/2016/959}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalKW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalPY16, author = {Shashank Agrawal and Manoj Prabhakaran and Ching{-}Hua Yu}, title = {Virtual Grey-Boxes Beyond Obfuscation: {A} Statistical Security Notion for Cryptographic Agents}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {819}, year = {2016}, url = {http://eprint.iacr.org/2016/819}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalPY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalR16, author = {Shweta Agrawal and Alon Rosen}, title = {Online-Offline Functional Encryption for Bounded Collusions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {361}, year = {2016}, url = {http://eprint.iacr.org/2016/361}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalW16, author = {Shashank Agrawal and David J. Wu}, title = {Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {482}, year = {2016}, url = {http://eprint.iacr.org/2016/482}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AhmetzyanovaAOS16, author = {Liliya R. Ahmetzyanova and Evgeny K. Alekseev and Igor B. Oshkin and Stanislav V. Smyshlyaev and Lolita A. Sonina}, title = {On the properties of the {CTR} encryption mode of the Magma and Kuznyechik block ciphers with re-keying method based on CryptoPro Key Meshing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {628}, year = {2016}, url = {http://eprint.iacr.org/2016/628}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AhmetzyanovaAOS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AhnH16, author = {Hyunjin Ahn and Dong{-}Guk Han}, title = {Multilateral White-Box Cryptanalysis: Case study on {WB-AES} of {CHES} Challenge 2016}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {807}, year = {2016}, url = {http://eprint.iacr.org/2016/807}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AhnH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AkleylekBBKM16, author = {Sedat Akleylek and Nina Bindel and Johannes Buchmann and Juliane Kr{\"{a}}mer and Giorgia Azzurra Marson}, title = {An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {30}, year = {2016}, url = {http://eprint.iacr.org/2016/030}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AkleylekBBKM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlagicBFGSJ16, author = {Gorjan Alagic and Anne Broadbent and Bill Fefferman and Tommaso Gagliardoni and Christian Schaffner and Michael St. Jules}, title = {Computational Security of Quantum Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {424}, year = {2016}, url = {http://eprint.iacr.org/2016/424}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlagicBFGSJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlagicR16, author = {Gorjan Alagic and Alexander Russell}, title = {Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {960}, year = {2016}, url = {http://eprint.iacr.org/2016/960}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlagicR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlamatiP16, author = {Navid Alamati and Chris Peikert}, title = {Three's Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {110}, year = {2016}, url = {http://eprint.iacr.org/2016/110}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlamatiP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlamelouBCG16, author = {Quentin Alam{\'{e}}lou and Paul{-}Edmond Berthier and St{\'{e}}phane Cauchie and Philippe Gaborit}, title = {Practical Reusable Fuzzy Extractors for the Set Difference Metric and Adaptive Fuzzy Extractors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1100}, year = {2016}, url = {http://eprint.iacr.org/2016/1100}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlamelouBCG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlamelouBCG16a, author = {Quentin Alam{\'{e}}lou and Olivier Blazy and St{\'{e}}phane Cauchie and Philippe Gaborit}, title = {A Code-Based Group Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1119}, year = {2016}, url = {http://eprint.iacr.org/2016/1119}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlamelouBCG16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Alawatugoda16, author = {Janaka Alawatugoda}, title = {On the Leakage-Resilient Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {32}, year = {2016}, url = {http://eprint.iacr.org/2016/032}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Alawatugoda16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbrechtBD16, author = {Martin R. Albrecht and Shi Bai and L{\'{e}}o Ducas}, title = {A subfield lattice attack on overstretched {NTRU} assumptions: Cryptanalysis of some {FHE} and Graded Encoding Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {127}, year = {2016}, url = {http://eprint.iacr.org/2016/127}, timestamp = {Tue, 30 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbrechtBD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbrechtGRRT16, author = {Martin R. Albrecht and Lorenzo Grassi and Christian Rechberger and Arnab Roy and Tyge Tiessen}, title = {MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {492}, year = {2016}, url = {http://eprint.iacr.org/2016/492}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbrechtGRRT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbrechtRSTZ16, author = {Martin R. Albrecht and Christian Rechberger and Thomas Schneider and Tyge Tiessen and Michael Zohner}, title = {Ciphers for {MPC} and {FHE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {687}, year = {2016}, url = {http://eprint.iacr.org/2016/687}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbrechtRSTZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AliC16, author = {Shoukat Ali and Murat Cenk}, title = {A new algorithm for residue multiplication modulo 2\({}^{\mbox{521}}\)-1}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {138}, year = {2016}, url = {http://eprint.iacr.org/2016/138}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AliC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlkimDPS16, author = {Erdem Alkim and L{\'{e}}o Ducas and Thomas P{\"{o}}ppelmann and Peter Schwabe}, title = {NewHope without reconciliation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1157}, year = {2016}, url = {http://eprint.iacr.org/2016/1157}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlkimDPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlkimJS16, author = {Erdem Alkim and Philipp Jakubeit and Peter Schwabe}, title = {A new hope on {ARM} Cortex-M}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {758}, year = {2016}, url = {http://eprint.iacr.org/2016/758}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlkimJS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlonO16, author = {Bar Alon and Eran Omri}, title = {Almost-Optimally Fair Multiparty Coin-Tossing with Nearly Three-Quarters Malicious}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {800}, year = {2016}, url = {http://eprint.iacr.org/2016/800}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlonO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Alperin-Sheriff16, author = {Jacob Alperin{-}Sheriff and Daniel Apon}, title = {Dimension-Preserving Reductions from {LWE} to {LWR}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {589}, year = {2016}, url = {http://eprint.iacr.org/2016/589}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Alperin-Sheriff16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AltFMRO16, author = {St{\'{e}}phanie Alt and Pierre{-}Alain Fouque and Gilles Macario{-}Rat and Benjamin Richard and Cristina Onete}, title = {A Cryptographic Analysis of {UMTS/LTE} {AKA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {371}, year = {2016}, url = {http://eprint.iacr.org/2016/371}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AltFMRO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlwenB16, author = {Jo{\"{e}}l Alwen and Jeremiah Blocki}, title = {Efficiently Computing Data-Independent Memory-Hard Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {115}, year = {2016}, url = {http://eprint.iacr.org/2016/115}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlwenB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlwenB16a, author = {Jo{\"{e}}l Alwen and Jeremiah Blocki}, title = {Towards Practical Attacks on Argon2i and Balloon Hashing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {759}, year = {2016}, url = {http://eprint.iacr.org/2016/759}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlwenB16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlwenBP16, author = {Jo{\"{e}}l Alwen and Jeremiah Blocki and Krzysztof Pietrzak}, title = {Depth-Robust Graphs and Their Cumulative Memory Complexity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {875}, year = {2016}, url = {http://eprint.iacr.org/2016/875}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlwenBP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlwenCKKPT16, author = {Jo{\"{e}}l Alwen and Binyi Chen and Chethan Kamath and Vladimir Kolmogorov and Krzysztof Pietrzak and Stefano Tessaro}, title = {On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {100}, year = {2016}, url = {http://eprint.iacr.org/2016/100}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlwenCKKPT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlwenCPRT16, author = {Jo{\"{e}}l Alwen and Binyi Chen and Krzysztof Pietrzak and Leonid Reyzin and Stefano Tessaro}, title = {Scrypt is Maximally Memory-Hard}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {989}, year = {2016}, url = {http://eprint.iacr.org/2016/989}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlwenCPRT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlwenGKKOPRRR16, author = {Jo{\"{e}}l Alwen and Peter Gazi and Chethan Kamath and Karen Klein and Georg Osang and Krzysztof Pietrzak and Leonid Reyzin and Michal Rol{\'{\i}}nek and Michal Ryb{\'{a}}r}, title = {On the Memory-Hardness of Data-Independent Password-Hashing Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {783}, year = {2016}, url = {http://eprint.iacr.org/2016/783}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlwenGKKOPRRR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AmbronaBS16, author = {Miguel Ambrona and Gilles Barthe and Benedikt Schmidt}, title = {Automated Unbounded Analysis of Cryptographic Constructions in the Generic Group Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {270}, year = {2016}, url = {http://eprint.iacr.org/2016/270}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AmbronaBS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AmbronaBS16a, author = {Miguel Ambrona and Gilles Barthe and Benedikt Schmidt}, title = {Generic Transformations of Predicate Encodings: Constructions and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1105}, year = {2016}, url = {http://eprint.iacr.org/2016/1105}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AmbronaBS16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AmeriMS16, author = {Mohammad Hassan Ameri and Javad Mohajeri and Mahmoud Salmasizadeh}, title = {Efficient and Provable Secure Anonymous Hierarchical Identity-based Broadcast Encryption {(HIBBE)} Scheme without Random Oracle}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {780}, year = {2016}, url = {http://eprint.iacr.org/2016/780}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AmeriMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AminghafariH16, author = {Vahid Aminghafari and Honggang Hu}, title = {Fruit: ultra-lightweight stream cipher with shorter internal state}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {355}, year = {2016}, url = {http://eprint.iacr.org/2016/355}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AminghafariH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AmiriAWA16, author = {Ryan Amiri and Aysajan Abidin and Petros Wallden and Erika Andersson}, title = {Unconditionally Secure Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {739}, year = {2016}, url = {http://eprint.iacr.org/2016/739}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AmiriAWA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AmyMGMPS16, author = {Matthew Amy and Olivia Di Matteo and Vlad Gheorghiu and Michele Mosca and Alex Parent and John M. Schanck}, title = {Estimating the cost of generic quantum pre-image attacks on {SHA-2} and {SHA-3}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {992}, year = {2016}, url = {http://eprint.iacr.org/2016/992}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AmyMGMPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnadaAS16, author = {Hiroaki Anada and Seiko Arita and Kouichi Sakurai}, title = {Proof of Knowledge on Monotone Predicates and its Application to Attribute-Based Identifications and Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {483}, year = {2016}, url = {http://eprint.iacr.org/2016/483}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnadaAS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Anagnostopoulos16, author = {Nikolaos A. Anagnostopoulos and Stefan Katzenbeisser and Markus Rosenstihl and Andr{\'{e}} Schaller and Sebastian Gabmeyer and Tolga Arul}, title = {Low-temperature data remanence attacks against intrinsic {SRAM} PUFs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {769}, year = {2016}, url = {http://eprint.iacr.org/2016/769}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Anagnostopoulos16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnandTTU16, author = {Mayuresh Vivekanand Anand and Ehsan Ebrahimi Targhi and Gelo Noel Tabia and Dominique Unruh}, title = {Post-quantum Security of the CBC, CFB, OFB, CTR, and {XTS} Modes of Operation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {197}, year = {2016}, url = {http://eprint.iacr.org/2016/197}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnandTTU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnanthCJ16, author = {Prabhanjan Ananth and Aloni Cohen and Abhishek Jain}, title = {Cryptography with Updates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {934}, year = {2016}, url = {http://eprint.iacr.org/2016/934}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnanthCJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnanthJNSY16, author = {Prabhanjan Ananth and Aayush Jain and Moni Naor and Amit Sahai and Eylon Yogev}, title = {Universal Obfuscation and Witness Encryption: Boosting Correctness and Combining Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {281}, year = {2016}, url = {http://eprint.iacr.org/2016/281}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnanthJNSY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnanthS16, author = {Prabhanjan Ananth and Amit Sahai}, title = {Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation From Degree-5 Multilinear Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1097}, year = {2016}, url = {http://eprint.iacr.org/2016/1097}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnanthS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AndrychowiczDF16, author = {Marcin Andrychowicz and Stefan Dziembowski and Sebastian Faust}, title = {Circuit Compilers with {O(1/} log(n)) Leakage Rate}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {173}, year = {2016}, url = {http://eprint.iacr.org/2016/173}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AndrychowiczDF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnkeleA16, author = {Ralph Ankele and Robin Ankele}, title = {Software Benchmarking of the 2\({}^{\mbox{nd}}\) round {CAESAR} Candidates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {740}, year = {2016}, url = {http://eprint.iacr.org/2016/740}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnkeleA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnkeleBCLMSW16, author = {Ralph Ankele and Subhadeep Banik and Avik Chakraborti and Eik List and Florian Mendel and Siang Meng Sim and Gaoli Wang}, title = {Related-Key Impossible-Differential Attack on Reduced-Round {SKINNY}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1127}, year = {2016}, url = {http://eprint.iacr.org/2016/1127}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnkeleBCLMSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnshelAGG16, author = {Iris Anshel and Derek Atkins and Dorian Goldfeld and Paul E. Gunnells}, title = {Defeating the Ben-Zvi, Blackburn, and Tsaban Attack on the Algebraic Eraser}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {44}, year = {2016}, url = {http://eprint.iacr.org/2016/044}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnshelAGG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnshelAGG16a, author = {Iris Anshel and Derek Atkins and Dorian Goldfeld and Paul E. Gunnells}, title = {Hickory Hash(TM): Implementing an Instance of an Algebraic Eraser(TM) Hash Function on an {MSP430} Microcontroller}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1052}, year = {2016}, url = {http://eprint.iacr.org/2016/1052}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnshelAGG16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Aono0PW16, author = {Yoshinori Aono and Takuya Hayashi and Le Trieu Phong and Lihua Wang}, title = {Scalable and Secure Logistic Regression via Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {111}, year = {2016}, url = {http://eprint.iacr.org/2016/111}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Aono0PW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AonoWHT16, author = {Yoshinori Aono and Yuntao Wang and Takuya Hayashi and Tsuyoshi Takagi}, title = {Improved Progressive {BKZ} Algorithms and their Precise Cost Estimation by Sharp Simulator}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {146}, year = {2016}, url = {http://eprint.iacr.org/2016/146}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AonoWHT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AponDGM16, author = {Daniel Apon and Nico D{\"{o}}ttling and Sanjam Garg and Pratyay Mukherjee}, title = {Cryptanalysis of Indistinguishability Obfuscations of Circuits over {GGH13}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1003}, year = {2016}, url = {http://eprint.iacr.org/2016/1003}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AponDGM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AponFL16, author = {Daniel Apon and Xiong Fan and Feng{-}Hao Liu}, title = {Fully-Secure Lattice-Based {IBE} as Compact as {PKE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {125}, year = {2016}, url = {http://eprint.iacr.org/2016/125}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AponFL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AponFL16a, author = {Daniel Apon and Xiong Fan and Feng{-}Hao Liu}, title = {Deniable Attribute Based Encryption for Branching Programs from {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {562}, year = {2016}, url = {http://eprint.iacr.org/2016/562}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AponFL16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ApplebaumR16, author = {Benny Applebaum and Pavel Raykov}, title = {On the Relationship between Statistical Zero-Knowledge and Statistical Randomized Encodings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {519}, year = {2016}, url = {http://eprint.iacr.org/2016/519}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ApplebaumR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ApplebaumR16a, author = {Benny Applebaum and Pavel Raykov}, title = {Fast Pseudorandom Functions Based on Expander Graphs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {813}, year = {2016}, url = {http://eprint.iacr.org/2016/813}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ApplebaumR16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArakiFLNO16, author = {Toshinori Araki and Jun Furukawa and Yehuda Lindell and Ariel Nof and Kazuma Ohara}, title = {High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {768}, year = {2016}, url = {http://eprint.iacr.org/2016/768}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArakiFLNO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArapinisCK16, author = {Myrto Arapinis and V{\'{e}}ronique Cortier and Steve Kremer}, title = {When Are Three Voters Enough for Privacy Properties?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {690}, year = {2016}, url = {http://eprint.iacr.org/2016/690}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArapinisCK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AritaN16, author = {Seiko Arita and Shota Nakasato}, title = {Fully Homomorphic Encryption for Point Numbers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {402}, year = {2016}, url = {http://eprint.iacr.org/2016/402}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AritaN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArmknechtBDGT16, author = {Frederik Armknecht and Colin Boyd and Gareth T. Davies and Kristian Gj{\o}steen and Mohsen Toorani}, title = {Side channels in deduplication: trade-offs between leakage and efficiency}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {977}, year = {2016}, url = {http://eprint.iacr.org/2016/977}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArmknechtBDGT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArmknechtBFK16, author = {Frederik Armknecht and Jens{-}Matthias Bohli and David Froelicher and Ghassan O. Karame}, title = {{SPORT:} Sharing Proofs of Retrievability across Tenants}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {724}, year = {2016}, url = {http://eprint.iacr.org/2016/724}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArmknechtBFK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArmknechtMSY16, author = {Frederik Armknecht and Daisuke Moriyama and Ahmad{-}Reza Sadeghi and Moti Yung}, title = {Towards a Unified Security Model for Physically Unclonable Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {33}, year = {2016}, url = {http://eprint.iacr.org/2016/033}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArmknechtMSY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArriagaBF16, author = {Afonso Arriaga and Manuel Barbosa and Pooya Farshim}, title = {Private Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {18}, year = {2016}, url = {http://eprint.iacr.org/2016/018}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArriagaBF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArriagaIT16, author = {Afonso Arriaga and Vincenzo Iovino and Qiang Tang}, title = {Updatable Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1179}, year = {2016}, url = {http://eprint.iacr.org/2016/1179}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArriagaIT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArslanKAE16, author = {Atakan Arslan and S{\"{u}}leyman Kardas and Sultan Aldirmaz {\c{C}}olak and Sarp Ert{\"{u}}rk}, title = {Are RNGs Achilles' heel of {RFID} Security and Privacy Protocols ?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1130}, year = {2016}, url = {http://eprint.iacr.org/2016/1130}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArslanKAE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AsaarSA16, author = {Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh and Mohammad Reza Aref}, title = {A Provably Secure Code-based Concurrent Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {450}, year = {2016}, url = {http://eprint.iacr.org/2016/450}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AsaarSA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AsaarSA16a, author = {Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh and Mohammad Reza Aref}, title = {Code-based Strong Designated Verifier Signatures: Security Analysis and a New Construction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {779}, year = {2016}, url = {http://eprint.iacr.org/2016/779}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AsaarSA16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AsaarSS16, author = {Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh and Willy Susilo}, title = {Proxy-based Authentication Scheme for Vehicular Ad Hoc Networks: Security Analysis and an Efficient Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {822}, year = {2016}, url = {http://eprint.iacr.org/2016/822}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AsaarSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AsharovLSZ16, author = {Gilad Asharov and Yehuda Lindell and Thomas Schneider and Michael Zohner}, title = {More Efficient Oblivious Transfer Extensions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {602}, year = {2016}, url = {http://eprint.iacr.org/2016/602}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AsharovLSZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AsharovNSS16, author = {Gilad Asharov and Moni Naor and Gil Segev and Ido Shahaf}, title = {Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {251}, year = {2016}, url = {http://eprint.iacr.org/2016/251}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AsharovNSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AshurBD16, author = {Tomer Ashur and Achiya Bar{-}On and Orr Dunkelman}, title = {Cryptanalysis of {GOST2}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {532}, year = {2016}, url = {http://eprint.iacr.org/2016/532}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AshurBD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AshurBR16, author = {Tomer Ashur and Tim Beyne and Vincent Rijmen}, title = {Revisiting the Wrong-Key-Randomization Hypothesis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {990}, year = {2016}, url = {http://eprint.iacr.org/2016/990}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AshurBR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AshurL16, author = {Tomer Ashur and Yunwen Liu}, title = {Rotational Cryptanalysis in the Presence of Constants}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {826}, year = {2016}, url = {http://eprint.iacr.org/2016/826}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AshurL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AshurM16, author = {Tomer Ashur and Bart Mennink}, title = {Damaging, Simplifying, and Salvaging p-OMD}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {534}, year = {2016}, url = {http://eprint.iacr.org/2016/534}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AshurM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AshurR16, author = {Tomer Ashur and Vincent Rijmen}, title = {On Linear Hulls and Trails in Simon}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {88}, year = {2016}, url = {http://eprint.iacr.org/2016/088}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AshurR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseKMTV16, author = {Giuseppe Ateniese and Aggelos Kiayias and Bernardo Magri and Yiannis Tselekounis and Daniele Venturi}, title = {Secure Outsourcing of Circuit Manufacturing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {527}, year = {2016}, url = {http://eprint.iacr.org/2016/527}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseKMTV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseMVA16, author = {Giuseppe Ateniese and Bernardo Magri and Daniele Venturi and Ewerton R. Andrade}, title = {Redactable Blockchain - or - Rewriting History in Bitcoin and Friends}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {757}, year = {2016}, url = {http://eprint.iacr.org/2016/757}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseMVA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AticiYS16, author = {Ali Can Atici and Cemal Yilmaz and Erkay Savas}, title = {Remote Cache-Timing Attack without Learning Phase}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {2}, year = {2016}, url = {http://eprint.iacr.org/2016/002}, timestamp = {Wed, 21 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AticiYS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtighehchiB16, author = {Kevin Atighehchi and Alexis Bonnecaze}, title = {On Plausible Tree Hash Modes for {SHA-3}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {658}, year = {2016}, url = {http://eprint.iacr.org/2016/658}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtighehchiB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtkinsG16, author = {Derek Atkins and Dorian Goldfeld}, title = {Addressing the Algebraic Eraser Diffie-Hellman Over-the-Air Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {205}, year = {2016}, url = {http://eprint.iacr.org/2016/205}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtkinsG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtzeiBC16, author = {Nicola Atzei and Massimo Bartoletti and Tiziana Cimoli}, title = {A survey of attacks on Ethereum smart contracts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1007}, year = {2016}, url = {http://eprint.iacr.org/2016/1007}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtzeiBC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Avanzi16, author = {Roberto Avanzi}, title = {The {QARMA} Block Cipher Family - Almost {MDS} Matrices Over Rings With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With Non-Involutory Central Rounds, and Search Heuristics for Low-Latency S-Boxes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {444}, year = {2016}, url = {http://eprint.iacr.org/2016/444}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Avanzi16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Avanzi16a, author = {Roberto Avanzi}, title = {A Salad of Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1171}, year = {2016}, url = {http://eprint.iacr.org/2016/1171}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Avanzi16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AvivCMR16, author = {Adam J. Aviv and Seung Geol Choi and Travis Mayberry and Daniel S. Roche}, title = {ObliviSync: Practical Oblivious File Backup and Synchronization}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {543}, year = {2016}, url = {http://eprint.iacr.org/2016/543}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AvivCMR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AydayTY16, author = {Erman Ayday and Qiang Tang and Arif Yilmaz}, title = {Cryptographic Solutions for Credibility and Liability Issues of Genomic Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {478}, year = {2016}, url = {http://eprint.iacr.org/2016/478}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AydayTY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AzarderakhshJKK16, author = {Reza Azarderakhsh and David Jao and Kassem Kalach and Brian Koziel and Christopher Leonardi}, title = {Key Compression for Isogeny-Based Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {229}, year = {2016}, url = {http://eprint.iacr.org/2016/229}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AzarderakhshJKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AzarderakhshKJK16, author = {Reza Azarderakhsh and Brian Koziel and Amir Jalali and Mehran Mozaffari Kermani and David Jao}, title = {{NEON-SIDH:} Effi cient Implementation of Supersingular Isogeny Diffi e-Hellman Key-Exchange Protocol on {ARM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {669}, year = {2016}, url = {http://eprint.iacr.org/2016/669}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AzarderakhshKJK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayananG16, author = {Saikrishna Badrinarayanan and Vipul Goyal and Aayush Jain and Amit Sahai}, title = {Verifiable Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {629}, year = {2016}, url = {http://eprint.iacr.org/2016/629}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayananG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayananK16, author = {Saikrishna Badrinarayanan and Dakshita Khurana and Rafail Ostrovsky and Ivan Visconti}, title = {New Feasibility Results in Unconditional UC-Secure Computation with (Malicious) PUFs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {636}, year = {2016}, url = {http://eprint.iacr.org/2016/636}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayananK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BagadiaCRMC16, author = {Krishna Bagadia and Urbi Chatterjee and Debapriya Basu Roy and Debdeep Mukhopadhyay and Rajat Subhra Chakraborty}, title = {Exploiting Safe Error based Leakage of {RFID} Authentication Protocol using Hardware Trojan Horse}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1149}, year = {2016}, url = {http://eprint.iacr.org/2016/1149}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BagadiaCRMC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BagheriHJMS16, author = {Nasour Bagheri and Tao Huang and Keting Jia and Florian Mendel and Yu Sasaki}, title = {Cryptanalysis of Reduced {NORX}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {436}, year = {2016}, url = {http://eprint.iacr.org/2016/436}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BagheriHJMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BagheryAE16, author = {Karim Baghery and Behzad Abdolmaleki and Mohammad Javad Emadi}, title = {Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for {EPC} Tags}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {387}, year = {2016}, url = {http://eprint.iacr.org/2016/387}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BagheryAE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BahmaniBBPSSW16, author = {Raad Bahmani and Manuel Barbosa and Ferdinand Brasser and Bernardo Portela and Ahmad{-}Reza Sadeghi and Guillaume Scerri and Bogdan Warinschi}, title = {Secure Multiparty Computation from {SGX}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1057}, year = {2016}, url = {http://eprint.iacr.org/2016/1057}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BahmaniBBPSSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaiDOX16, author = {Ge Bai and Ivan Damg{\aa}rd and Claudio Orlandi and Yu Xia}, title = {Non-Interactive Verifiable Secret Sharing For Monotone Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {78}, year = {2016}, url = {http://eprint.iacr.org/2016/078}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaiDOX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaiLS16, author = {Shi Bai and Thijs Laarhoven and Damien Stehl{\'{e}}}, title = {Tuple lattice sieving}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {713}, year = {2016}, url = {http://eprint.iacr.org/2016/713}, timestamp = {Tue, 30 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaiLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaiSW16, author = {Shi Bai and Damien Stehl{\'{e}} and Weiqiang Wen}, title = {Improved Reduction from the Bounded Distance Decoding Problem to the Unique Shortest Vector Problem in Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {753}, year = {2016}, url = {http://eprint.iacr.org/2016/753}, timestamp = {Tue, 30 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaiSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaiW16, author = {Jian Bai and Dingkang Wang}, title = {The Lightest 4x4 {MDS} Matrices over GL(4, {\unicode{54589}}\({}_{\mbox{2}}\))}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {686}, year = {2016}, url = {http://eprint.iacr.org/2016/686}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaiW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaiW16a, author = {Jian Bai and Dingkang Wang}, title = {A New Class of Differentially 4-uniform Permutations from the Inverse Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {941}, year = {2016}, url = {http://eprint.iacr.org/2016/941}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaiW16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BajardEHZ16, author = {Jean{-}Claude Bajard and Julien Eynard and M. Anwar Hasan and Vincent Zucca}, title = {A Full {RNS} Variant of {FV} like Somewhat Homomorphic Encryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {510}, year = {2016}, url = {http://eprint.iacr.org/2016/510}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BajardEHZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BalakrishnanILV16, author = {Jennifer S. Balakrishnan and Sorina Ionica and Kristin E. Lauter and Christelle Vincent}, title = {Constructing genus 3 hyperelliptic Jacobians with {CM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {328}, year = {2016}, url = {http://eprint.iacr.org/2016/328}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BalakrishnanILV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaldimtsiPPST16, author = {Foteini Baldimtsi and Dimitrios Papadopoulos and Stavros Papadopoulos and Alessandra Scafuro and Nikos Triandopoulos}, title = {Secure Computation in Online Social Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {948}, year = {2016}, url = {http://eprint.iacr.org/2016/948}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BaldimtsiPPST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BallDKM16, author = {Marshall Ball and Dana Dachman{-}Soled and Mukul Kulkarni and Tal Malkin}, title = {Non-Malleable Codes for Bounded Depth, Bounded Fan-in Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {307}, year = {2016}, url = {http://eprint.iacr.org/2016/307}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BallDKM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BallMR16, author = {Marshall Ball and Tal Malkin and Mike Rosulek}, title = {Garbling Gadgets for Boolean and Arithmetic Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {969}, year = {2016}, url = {http://eprint.iacr.org/2016/969}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BallMR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BalticoCF16, author = {Carmen Elisabetta Zaira Baltico and Dario Catalano and Dario Fiore}, title = {Practical Functional Encryption for Bilinear Forms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1104}, year = {2016}, url = {http://eprint.iacr.org/2016/1104}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BalticoCF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BanaC16, author = {Gergei Bana and Rohit Chadha}, title = {Verification Methods for the Computationally Complete Symbolic Attacker Based on Indistinguishability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {69}, year = {2016}, url = {http://eprint.iacr.org/2016/069}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BanaC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BanasikDM16, author = {Waclaw Banasik and Stefan Dziembowski and Daniel Malinowski}, title = {Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies Without Scripts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {451}, year = {2016}, url = {http://eprint.iacr.org/2016/451}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BanasikDM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BanikBR16, author = {Subhadeep Banik and Andrey Bogdanov and Francesco Regazzoni}, title = {Atomic-AES: {A} Compact Implementation of the {AES} Encryption/Decryption Core}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {927}, year = {2016}, url = {http://eprint.iacr.org/2016/927}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BanikBR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BanikBR16a, author = {Subhadeep Banik and Andrey Bogdanov and Francesco Regazzoni}, title = {Atomic-AES v 2.0}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1005}, year = {2016}, url = {http://eprint.iacr.org/2016/1005}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BanikBR16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BanikI16, author = {Subhadeep Banik and Takanori Isobe}, title = {Cryptanalysis of the Full Spritz Stream Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {92}, year = {2016}, url = {http://eprint.iacr.org/2016/092}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BanikI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BannierBF16, author = {Arnaud Bannier and Nicolas Bodin and Eric Filiol}, title = {Partition-Based Trapdoor Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {493}, year = {2016}, url = {http://eprint.iacr.org/2016/493}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BannierBF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BannierBF16a, author = {Arnaud Bannier and Nicolas Bodin and Eric Filiol}, title = {Automatic Search for a Maximum Probability Differential Characteristic in a Substitution-Permutation Network}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {652}, year = {2016}, url = {http://eprint.iacr.org/2016/652}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BannierBF16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BansarkhaniK16, author = {Rachid El Bansarkhani and Ali {El Kaafarani}}, title = {Post-Quantum Attribute-Based Signatures from Lattice Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {823}, year = {2016}, url = {http://eprint.iacr.org/2016/823}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BansarkhaniK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BansarkhaniMP16, author = {Rachid El Bansarkhani and Mohamed Saied Emam Mohamed and Albrecht Petzoldt}, title = {{MQSAS} - {A} Multivariate Sequential Aggregate Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {503}, year = {2016}, url = {http://eprint.iacr.org/2016/503}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BansarkhaniMP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bar-OnBDK16, author = {Achiya Bar{-}On and Eli Biham and Orr Dunkelman and Nathan Keller}, title = {Efficient Slide Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1177}, year = {2016}, url = {http://eprint.iacr.org/2016/1177}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bar-OnBDK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Barak16, author = {Boaz Barak}, title = {Hopes, Fears and Software Obfuscation: {A} Survey}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {210}, year = {2016}, url = {http://eprint.iacr.org/2016/210}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Barak16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarbosaPSW16, author = {Manuel Barbosa and Bernardo Portela and Guillaume Scerri and Bogdan Warinschi}, title = {Foundations of Hardware-Based Attested Computation and Application to {SGX}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {14}, year = {2016}, url = {http://eprint.iacr.org/2016/014}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarbosaPSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarbulescuGGM16, author = {Razvan Barbulescu and Pierrick Gaudry and Aurore Guillevic and Fran{\c{c}}ois Morain}, title = {Improving {NFS} for the discrete logarithm problem in non-prime finite fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {605}, year = {2016}, url = {http://eprint.iacr.org/2016/605}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarbulescuGGM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarbulescuSTS16, author = {Mihai Barbulescu and Adrian Stratulat and Vlad Traista{-}Popescu and Emil Simion}, title = {{RSA} Weak Public Keys available on the Internet}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {515}, year = {2016}, url = {http://eprint.iacr.org/2016/515}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarbulescuSTS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarretoLNRZ16, author = {Paulo S. L. M. Barreto and Patrick Longa and Michael Naehrig and Jefferson E. Ricardini and Gustavo H. M. Zanon}, title = {Sharper Ring-LWE Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1026}, year = {2016}, url = {http://eprint.iacr.org/2016/1026}, timestamp = {Fri, 06 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarretoLNRZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BartheDFGSS16, author = {Gilles Barthe and Fran{\c{c}}ois Dupressoir and Sebastian Faust and Benjamin Gr{\'{e}}goire and Fran{\c{c}}ois{-}Xavier Standaert and Pierre{-}Yves Strub}, title = {Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {912}, year = {2016}, url = {http://eprint.iacr.org/2016/912}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BartheDFGSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BartolettiZ16, author = {Massimo Bartoletti and Roberto Zunino}, title = {Constant-deposit multiparty lotteries on Bitcoin}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {955}, year = {2016}, url = {http://eprint.iacr.org/2016/955}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BartolettiZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BattistelloCPZ16, author = {Alberto Battistello and Jean{-}S{\'{e}}bastien Coron and Emmanuel Prouff and Rina Zeitoun}, title = {Horizontal Side-Channel Attacks and Countermeasures on the {ISW} Masking Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {540}, year = {2016}, url = {http://eprint.iacr.org/2016/540}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BattistelloCPZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Baum16, author = {Carsten Baum}, title = {On Garbling Schemes With And Without Privacy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {150}, year = {2016}, url = {http://eprint.iacr.org/2016/150}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Baum16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaumDLN16, author = {Carsten Baum and Ivan Damg{\aa}rd and Kasper Green Larsen and Michael Nielsen}, title = {How to prove knowledge of small secrets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {538}, year = {2016}, url = {http://eprint.iacr.org/2016/538}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaumDLN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaumDOP16, author = {Carsten Baum and Ivan Damg{\aa}rd and Sabine Oechsner and Chris Peikert}, title = {Efficient Commitments and Zero-Knowledge Protocols from Ring-SIS with Applications to Lattice-based Threshold Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {997}, year = {2016}, url = {http://eprint.iacr.org/2016/997}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaumDOP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaumDTZ16, author = {Carsten Baum and Ivan Damg{\aa}rd and Tomas Toft and Rasmus Winther Zakarias}, title = {Better Preprocessing for Secure Multiparty Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {48}, year = {2016}, url = {http://eprint.iacr.org/2016/048}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaumDTZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaumOS16, author = {Carsten Baum and Emmanuela Orsini and Peter Scholl}, title = {Efficient Secure Multiparty Computation with Identifiable Abort}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {187}, year = {2016}, url = {http://eprint.iacr.org/2016/187}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaumOS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BayEK16, author = {Asl{\'{\i}} Bay and Oguzhan Ersoy and Ferhat Karako{\c{c}}}, title = {Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {640}, year = {2016}, url = {http://eprint.iacr.org/2016/640}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BayEK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaysalCO16, author = {Adnan Baysal and Mustafa {\c{C}}oban and Mehmet {\"{O}}zen}, title = {Feistel Like Construction of Involutory Binary Matrices With High Branch Number}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {751}, year = {2016}, url = {http://eprint.iacr.org/2016/751}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaysalCO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaysalK16, author = {Adnan Baysal and {\"{U}}nal Ko{\c{c}}abas}, title = {ELiF : An Extremely Lightweight {\&} Flexible Block Cipher Family and Its Experimental Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {752}, year = {2016}, url = {http://eprint.iacr.org/2016/752}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaysalK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BazinSHB16, author = {R{\'{e}}mi Bazin and Alexander Schaub and Omar Hasan and Lionel Brunie}, title = {A Decentralized Anonymity-Preserving Reputation System with Constant-time Score Retrieval}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {416}, year = {2016}, url = {http://eprint.iacr.org/2016/416}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BazinSHB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BedoCRT16, author = {Justin Bedo and Thomas C. Conway and Kim Ramchen and Vanessa Teague}, title = {Privately Matching k-mers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {781}, year = {2016}, url = {http://eprint.iacr.org/2016/781}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BedoCRT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Beierle16, author = {Christof Beierle}, title = {Pen and Paper Arguments for {SIMON} and SIMON-like Designs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {651}, year = {2016}, url = {http://eprint.iacr.org/2016/651}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Beierle16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeierleJKL0PSSS16, author = {Christof Beierle and J{\'{e}}r{\'{e}}my Jean and Stefan K{\"{o}}lbl and Gregor Leander and Amir Moradi and Thomas Peyrin and Yu Sasaki and Pascal Sasdrich and Siang Meng Sim}, title = {The {SKINNY} Family of Block Ciphers and its Low-Latency Variant {MANTIS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {660}, year = {2016}, url = {http://eprint.iacr.org/2016/660}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeierleJKL0PSSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeierleKL16, author = {Christof Beierle and Thorsten Kranz and Gregor Leander}, title = {Lightweight Multiplication in GF(2n) with Applications to {MDS} Matrices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {119}, year = {2016}, url = {http://eprint.iacr.org/2016/119}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeierleKL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BelaidBPPTV16, author = {Sonia Bela{\"{\i}}d and Fabrice Benhamouda and Alain Passel{\`{e}}gue and Emmanuel Prouff and Adrian Thillard and Damien Vergnaud}, title = {Randomness Complexity of Private Circuits for Multiplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {211}, year = {2016}, url = {http://eprint.iacr.org/2016/211}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BelaidBPPTV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BelgarricBBDDGH16, author = {Pierre Belgarric and Shivam Bhasin and Nicolas Bruneau and Jean{-}Luc Danger and Nicolas Debande and Sylvain Guilley and Annelie Heuser and Zakaria Najm and Olivier Rioul}, title = {Time-Frequency Analysis for Second-Order Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {772}, year = {2016}, url = {http://eprint.iacr.org/2016/772}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BelgarricBBDDGH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BelgarricFMT16, author = {Pierre Belgarric and Pierre{-}Alain Fouque and Gilles Macario{-}Rat and Mehdi Tibouchi}, title = {Side-Channel Analysis of Weierstrass and Koblitz Curve {ECDSA} on Android Smartphones}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {231}, year = {2016}, url = {http://eprint.iacr.org/2016/231}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BelgarricFMT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareBT16, author = {Mihir Bellare and Daniel J. Bernstein and Stefano Tessaro}, title = {Hash-Function based PRFs: {AMAC} and its Multi-User Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {142}, year = {2016}, url = {http://eprint.iacr.org/2016/142}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareBT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareFS16, author = {Mihir Bellare and Georg Fuchsbauer and Alessandra Scafuro}, title = {NIZKs with an Untrusted {CRS:} Security in the Face of Parameter Subversion}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {372}, year = {2016}, url = {http://eprint.iacr.org/2016/372}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareFS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareHT16, author = {Mihir Bellare and Viet Tung Hoang and Stefano Tessaro}, title = {Message-recovery attacks on Feistel-based Format Preserving Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {794}, year = {2016}, url = {http://eprint.iacr.org/2016/794}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareHT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareKR16, author = {Mihir Bellare and Daniel Kane and Phillip Rogaway}, title = {Big-Key Symmetric Encryption: Resisting Key Exfiltration}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {541}, year = {2016}, url = {http://eprint.iacr.org/2016/541}, timestamp = {Tue, 09 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareKR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellarePS16, author = {Mihir Bellare and Bertram Poettering and Douglas Stebila}, title = {Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1016}, year = {2016}, url = {http://eprint.iacr.org/2016/1016}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellarePS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareSJNS16, author = {Mihir Bellare and Asha Camper Singh and Joseph Jaeger and Maya Nyayapati and Igors Stepanovs}, title = {Ratcheted Encryption and Key Exchange: The Security of Messaging}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1028}, year = {2016}, url = {http://eprint.iacr.org/2016/1028}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareSJNS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareSW16, author = {Mihir Bellare and Igors Stepanovs and Brent Waters}, title = {New Negative Results on Differing-Inputs Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {162}, year = {2016}, url = {http://eprint.iacr.org/2016/162}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareT16, author = {Mihir Bellare and Bj{\"{o}}rn Tackmann}, title = {Nonce-Based Cryptography: Retaining Security when Randomness Fails}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {290}, year = {2016}, url = {http://eprint.iacr.org/2016/290}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareT16a, author = {Mihir Bellare and Bj{\"{o}}rn Tackmann}, title = {The Multi-User Security of Authenticated Encryption: {AES-GCM} in {TLS} 1.3}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {564}, year = {2016}, url = {http://eprint.iacr.org/2016/564}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareT16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ben-EfraimLO16, author = {Aner Ben{-}Efraim and Yehuda Lindell and Eran Omri}, title = {Optimizing Semi-Honest Secure Multiparty Computation for the Internet}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1066}, year = {2016}, url = {http://eprint.iacr.org/2016/1066}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ben-EfraimLO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ben-SassonBCGGH16, author = {Eli Ben{-}Sasson and Iddo Bentov and Alessandro Chiesa and Ariel Gabizon and Daniel Genkin and Matan Hamilis and Evgenya Pergament and Michael Riabzev and Mark Silberstein and Eran Tromer and Madars Virza}, title = {Computational integrity with a public random string from quasi-linear PCPs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {646}, year = {2016}, url = {http://eprint.iacr.org/2016/646}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ben-SassonBCGGH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ben-SassonCFGRS16, author = {Eli Ben{-}Sasson and Alessandro Chiesa and Michael A. Forbes and Ariel Gabizon and Michael Riabzev and Nicholas Spooner}, title = {On Probabilistic Checking in Perfect Zero Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {988}, year = {2016}, url = {http://eprint.iacr.org/2016/988}, timestamp = {Tue, 30 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ben-SassonCFGRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ben-SassonCGRS16, author = {Eli Ben{-}Sasson and Alessandro Chiesa and Ariel Gabizon and Michael Riabzev and Nicholas Spooner}, title = {Short Interactive Oracle Proofs with Constant Query Complexity, via Composition and Sumcheck}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {324}, year = {2016}, url = {http://eprint.iacr.org/2016/324}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ben-SassonCGRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ben-SassonCGV16, author = {Eli Ben{-}Sasson and Alessandro Chiesa and Ariel Gabizon and Madars Virza}, title = {Quasi-Linear Size Zero Knowledge from Linear-Algebraic PCPs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {21}, year = {2016}, url = {http://eprint.iacr.org/2016/021}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ben-SassonCGV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ben-SassonCS16, author = {Eli Ben{-}Sasson and Alessandro Chiesa and Nicholas Spooner}, title = {Interactive Oracle Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {116}, year = {2016}, url = {http://eprint.iacr.org/2016/116}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ben-SassonCS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenhamoudaCTV16, author = {Fabrice Benhamouda and C{\'{e}}line Chevalier and Adrian Thillard and Damien Vergnaud}, title = {Easing Coppersmith Methods using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {7}, year = {2016}, url = {http://eprint.iacr.org/2016/007}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenhamoudaCTV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BenhamoudaLM016, author = {Fabrice Benhamouda and Tancr{\`{e}}de Lepoint and Claire Mathieu and Hang Zhou}, title = {Optimization of Bootstrapping in Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {785}, year = {2016}, url = {http://eprint.iacr.org/2016/785}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BenhamoudaLM016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BentovPS16, author = {Iddo Bentov and Rafael Pass and Elaine Shi}, title = {The Sleepy Model of Consensus}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {918}, year = {2016}, url = {http://eprint.iacr.org/2016/918}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BentovPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BentovPS16a, author = {Iddo Bentov and Rafael Pass and Elaine Shi}, title = {Snow White: Provably Secure Proofs of Stake}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {919}, year = {2016}, url = {http://eprint.iacr.org/2016/919}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BentovPS16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernhardCPSW16, author = {David Bernhard and V{\'{e}}ronique Cortier and Olivier Pereira and Ben Smyth and Bogdan Warinschi}, title = {Adapting Helios for provable ballot privacy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {756}, year = {2016}, url = {http://eprint.iacr.org/2016/756}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernhardCPSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernhardKV16, author = {David Bernhard and Oksana Kulyk and Melanie Volkamer}, title = {Security Proofs for Participation Privacy and Stronger Veri ability for Helios}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {431}, year = {2016}, url = {http://eprint.iacr.org/2016/431}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernhardKV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernhardPW16, author = {David Bernhard and Olivier Pereira and Bogdan Warinschi}, title = {How not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {771}, year = {2016}, url = {http://eprint.iacr.org/2016/771}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernhardPW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernhardW16, author = {David Bernhard and Bogdan Warinschi}, title = {Cryptographic Voting - {A} Gentle Introduction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {765}, year = {2016}, url = {http://eprint.iacr.org/2016/765}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernhardW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinCLV16, author = {Daniel J. Bernstein and Chitchanok Chuengsatiansup and Tanja Lange and Christine van Vredendaal}, title = {{NTRU} Prime}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {461}, year = {2016}, url = {http://eprint.iacr.org/2016/461}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinCLV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinELNPS016, author = {Daniel J. Bernstein and Susanne Engels and Tanja Lange and Ruben Niederhagen and Christof Paar and Peter Schwabe and Ralf Zimmermann}, title = {Faster discrete logarithms on FPGAs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {382}, year = {2016}, url = {http://eprint.iacr.org/2016/382}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinELNPS016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BertiKPPS16, author = {Francesco Berti and Fran{\c{c}}ois Koeune and Olivier Pereira and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Leakage-Resilient and Misuse-Resistant Authenticated Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {996}, year = {2016}, url = {http://eprint.iacr.org/2016/996}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BertiKPPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BertoniDPAK16, author = {Guido Bertoni and Joan Daemen and Micha{\"{e}}l Peeters and Gilles Van Assche and Ronny Van Keer}, title = {KangarooTwelve: fast hashing based on Keccak-p}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {770}, year = {2016}, url = {http://eprint.iacr.org/2016/770}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BertoniDPAK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BertoniDPAK16a, author = {Guido Bertoni and Joan Daemen and Micha{\"{e}}l Peeters and Gilles Van Assche and Ronny Van Keer}, title = {Farfalle: parallel permutation-based cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1188}, year = {2016}, url = {http://eprint.iacr.org/2016/1188}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BertoniDPAK16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BertoniM16, author = {Guido Bertoni and Marco Martinoli}, title = {A Methodology for the Characterisation of Leakages in Combinatorial Logic}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {841}, year = {2016}, url = {http://eprint.iacr.org/2016/841}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BertoniM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeyneB16, author = {Tim Beyne and Beg{\"{u}}l Bilgin}, title = {Uniform First-Order Threshold Implementations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {715}, year = {2016}, url = {http://eprint.iacr.org/2016/715}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeyneB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bhandari16, author = {Anindya Shankar Bhandari}, title = {Near Collisions in the {RC4} Stream Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {881}, year = {2016}, url = {http://eprint.iacr.org/2016/881}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bhandari16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhargavanBFGKB16, author = {Karthikeyan Bhargavan and Christina Brzuska and C{\'{e}}dric Fournet and Matthew Green and Markulf Kohlweiss and Santiago Zanella B{\'{e}}guelin}, title = {Downgrade Resilience in Key-Exchange Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {72}, year = {2016}, url = {http://eprint.iacr.org/2016/072}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BhargavanBFGKB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhargavanDFKPPR16, author = {Karthikeyan Bhargavan and Antoine Delignat{-}Lavaud and C{\'{e}}dric Fournet and Markulf Kohlweiss and Jianyang Pan and Jonathan Protzenko and Aseem Rastogi and Nikhil Swamy and Santiago Zanella B{\'{e}}guelin and Jean Karim Zinzindohoue}, title = {Implementing and Proving the {TLS} 1.3 Record Layer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1178}, year = {2016}, url = {http://eprint.iacr.org/2016/1178}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BhargavanDFKPPR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhargavanL16, author = {Karthikeyan Bhargavan and Ga{\"{e}}tan Leurent}, title = {On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on {HTTP} over {TLS} and OpenVPN}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {798}, year = {2016}, url = {http://eprint.iacr.org/2016/798}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BhargavanL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhattacharyaM16, author = {Sarani Bhattacharya and Debdeep Mukhopadhyay}, title = {Curious case of Rowhammer: Flipping Secret Exponent Bits using Timing Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {618}, year = {2016}, url = {http://eprint.iacr.org/2016/618}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BhattacharyaM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhaumikN16, author = {Ritam Bhaumik and Mridul Nandi}, title = {OleF: An Inverse-Free Online Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1090}, year = {2016}, url = {http://eprint.iacr.org/2016/1090}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BhaumikN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BiagioniMV16, author = {Silvio Biagioni and Daniel Masny and Daniele Venturi}, title = {Naor-Yung Paradigm with Shared Randomness and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {880}, year = {2016}, url = {http://eprint.iacr.org/2016/880}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BiagioniMV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BindelBK16, author = {Nina Bindel and Johannes Buchmann and Juliane Kr{\"{a}}mer}, title = {Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {415}, year = {2016}, url = {http://eprint.iacr.org/2016/415}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BindelBK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BiryukovPU16, author = {Alex Biryukov and L{\'{e}}o Perrin and Aleksei Udovenko}, title = {Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {71}, year = {2016}, url = {http://eprint.iacr.org/2016/071}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BiryukovPU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BiryukovVC16, author = {Alex Biryukov and Vesselin Velichkov and Yann Le Corre}, title = {Automatic Search for the Best Trails in {ARX:} Application to Block Cipher {\textbackslash}textsc\{Speck\}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {409}, year = {2016}, url = {http://eprint.iacr.org/2016/409}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BiryukovVC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BitanskyBKPV16, author = {Nir Bitansky and Zvika Brakerski and Yael Tauman Kalai and Omer Paneth and Vinod Vaikuntanathan}, title = {3-Message Zero Knowledge Against Human Ignorance}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {213}, year = {2016}, url = {http://eprint.iacr.org/2016/213}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BitanskyBKPV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BitanskyDV16, author = {Nir Bitansky and Akshay Degwekar and Vinod Vaikuntanathan}, title = {Structure vs Hardness through the Obfuscation Lens}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {574}, year = {2016}, url = {http://eprint.iacr.org/2016/574}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BitanskyDV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BitanskyLP16, author = {Nir Bitansky and Huijia Lin and Omer Paneth}, title = {On Removing Graded Encodings from Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {962}, year = {2016}, url = {http://eprint.iacr.org/2016/962}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BitanskyLP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BitanskyNPW16, author = {Nir Bitansky and Ryo Nishimaki and Alain Passel{\`{e}}gue and Daniel Wichs}, title = {From Cryptomania to Obfustopia through Secret-Key Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {558}, year = {2016}, url = {http://eprint.iacr.org/2016/558}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BitanskyNPW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlackburnR16, author = {Simon R. Blackburn and Matthew J. B. Robshaw}, title = {On the Security of the Algebraic Eraser Tag Authentication Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {91}, year = {2016}, url = {http://eprint.iacr.org/2016/091}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlackburnR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlazyC16, author = {Olivier Blazy and C{\'{e}}line Chevalier}, title = {Structure-Preserving Smooth Projective Hashing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {258}, year = {2016}, url = {http://eprint.iacr.org/2016/258}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlazyC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlazyCG16, author = {Olivier Blazy and C{\'{e}}line Chevalier and Paul Germouty}, title = {Adaptive Oblivious Transfer and Generalizations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {259}, year = {2016}, url = {http://eprint.iacr.org/2016/259}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlazyCG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlazyDSS16, author = {Olivier Blazy and David Derler and Daniel Slamanig and Raphael Spreitzer}, title = {Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {82}, year = {2016}, url = {http://eprint.iacr.org/2016/082}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlazyDSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlockiDB16, author = {Jeremiah Blocki and Anupam Datta and Joseph Bonneau}, title = {Differentially Private Password Frequency Lists}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {153}, year = {2016}, url = {http://eprint.iacr.org/2016/153}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlockiDB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlockiZ16, author = {Jeremiah Blocki and Hong{-}Sheng Zhou}, title = {Designing Proof of Human-work Puzzles for Cryptocurrency and Beyond}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {145}, year = {2016}, url = {http://eprint.iacr.org/2016/145}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlockiZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlomerL16, author = {Johannes Bl{\"{o}}mer and Gennadij Liske}, title = {Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {206}, year = {2016}, url = {http://eprint.iacr.org/2016/206}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlomerL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BockZDSJ16, author = {Hanno B{\"{o}}ck and Aaron Zauner and Sean Devlin and Juraj Somorovsky and Philipp Jovanovic}, title = {Nonce-Disrespecting Adversaries: Practical Forgery Attacks on {GCM} in {TLS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {475}, year = {2016}, url = {http://eprint.iacr.org/2016/475}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BockZDSJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoelterPP16, author = {Tobias Boelter and Rishabh Poddar and Raluca Ada Popa}, title = {A Secure One-Roundtrip Index for Range Queries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {568}, year = {2016}, url = {http://eprint.iacr.org/2016/568}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoelterPP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BogdanovIVW16, author = {Andrej Bogdanov and Yuval Ishai and Emanuele Viola and Christopher Williamson}, title = {Bounded Indistinguishability and the Complexity of Recovering Secrets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {565}, year = {2016}, url = {http://eprint.iacr.org/2016/565}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BogdanovIVW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BogdanovLT16, author = {Andrey Bogdanov and Martin M. Lauridsen and Elmar Tischhauser}, title = {Comb to Pipeline: Fast Software Encryption Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {47}, year = {2016}, url = {http://eprint.iacr.org/2016/047}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BogdanovLT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BogdanovTV16, author = {Andrey Bogdanov and Elmar Tischhauser and Philip S. Vejre}, title = {Multivariate Linear Cryptanalysis: The Past and Future of {PRESENT}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {667}, year = {2016}, url = {http://eprint.iacr.org/2016/667}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BogdanovTV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BogosGV16, author = {Sonia Bogos and John Gaspoz and Serge Vaudenay}, title = {Cryptanalysis of a Homomorphic Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {775}, year = {2016}, url = {http://eprint.iacr.org/2016/775}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BogosGV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BogosV16, author = {Sonia Bogos and Serge Vaudenay}, title = {Optimization of {LPN} Solving Algorithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {288}, year = {2016}, url = {http://eprint.iacr.org/2016/288}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BogosV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BogosV16a, author = {Sonia Bogos and Serge Vaudenay}, title = {How to Sequentialize Independent Parallel Attacks?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {296}, year = {2016}, url = {http://eprint.iacr.org/2016/296}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BogosV16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BogosV16b, author = {Sonia Bogos and Serge Vaudenay}, title = {Observations on the {LPN} Solving Algorithm from Eurocrypt'16}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {437}, year = {2016}, url = {http://eprint.iacr.org/2016/437}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BogosV16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonnoronF16, author = {Guillaume Bonnoron and Caroline Fontaine}, title = {A note on Ring-LWE security in the case of Fully Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {385}, year = {2016}, url = {http://eprint.iacr.org/2016/385}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonnoronF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoorghanySJ16, author = {Ahmad Boorghany and Siavash Bayat Sarmadi and Rasool Jalili}, title = {Efficient Lattice-based Authenticated Encryption: {A} Practice-Oriented Provable Security Approach}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {268}, year = {2016}, url = {http://eprint.iacr.org/2016/268}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoorghanySJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BootleCCGG16, author = {Jonathan Bootle and Andrea Cerulli and Pyrros Chaidos and Essam Ghadafi and Jens Groth}, title = {Foundations of Fully Dynamic Group Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {368}, year = {2016}, url = {http://eprint.iacr.org/2016/368}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BootleCCGG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BootleCCGP16, author = {Jonathan Bootle and Andrea Cerulli and Pyrros Chaidos and Jens Groth and Christophe Petit}, title = {Efficient Zero-Knowledge Arguments for Arithmetic Circuits in the Discrete Log Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {263}, year = {2016}, url = {http://eprint.iacr.org/2016/263}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BootleCCGP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosCDMNNRS16, author = {Joppe W. Bos and Craig Costello and L{\'{e}}o Ducas and Ilya Mironov and Michael Naehrig and Valeria Nikolaenko and Ananth Raghunathan and Douglas Stebila}, title = {Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {659}, year = {2016}, url = {http://eprint.iacr.org/2016/659}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosCDMNNRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosCIV16, author = {Joppe W. Bos and Wouter Castryck and Ilia Iliashenko and Frederik Vercauteren}, title = {Privacy-friendly Forecasting for the Smart Grid using Homomorphic Encryption and the Group Method of Data Handling}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1117}, year = {2016}, url = {http://eprint.iacr.org/2016/1117}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosCIV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosF16, author = {Joppe W. Bos and Simon Friedberger}, title = {Fast Arithmetic Modulo 2\({}^{\mbox{xp\({}^{\mbox{y{\(\pm\)}}}\)}}\) 1}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {986}, year = {2016}, url = {http://eprint.iacr.org/2016/986}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BossGGL0S16, author = {Erik Boss and Vincent Grosso and Tim G{\"{u}}neysu and Gregor Leander and Amir Moradi and Tobias Schneider}, title = {Strong 8-bit Sboxes with Efficient Masking in Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {647}, year = {2016}, url = {http://eprint.iacr.org/2016/647}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BossGGL0S16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BossiV16, author = {Simone Bossi and Andrea Visconti}, title = {What users should know about Full Disk Encryption based on {LUKS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {274}, year = {2016}, url = {http://eprint.iacr.org/2016/274}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BossiV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bost16, author = {Raphael Bost}, title = {Sophos - Forward Secure Searchable Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {728}, year = {2016}, url = {http://eprint.iacr.org/2016/728}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bost16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BostFP16, author = {Raphael Bost and Pierre{-}Alain Fouque and David Pointcheval}, title = {Verifiable Dynamic Symmetric Searchable Encryption: Optimality and Forward Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {62}, year = {2016}, url = {http://eprint.iacr.org/2016/062}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BostFP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BostS16, author = {Raphael Bost and Olivier Sanders}, title = {Trick or Tweak: On the (In)security of OTR's Tweaks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {234}, year = {2016}, url = {http://eprint.iacr.org/2016/234}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BostS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BouraC16, author = {Christina Boura and Anne Canteaut}, title = {Another view of the division property}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {554}, year = {2016}, url = {http://eprint.iacr.org/2016/554}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BouraC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BouraCLPSSS16, author = {Christina Boura and Avik Chakraborti and Ga{\"{e}}tan Leurent and Goutam Paul and Dhiman Saha and Hadi Soleimany and Valentin Suder}, title = {Key Recovery Attack against 2.5-round pi-Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {502}, year = {2016}, url = {http://eprint.iacr.org/2016/502}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BouraCLPSSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoursePMW16, author = {Florian Bourse and Rafa{\"{e}}l Del Pino and Michele Minelli and Hoeteck Wee}, title = {{FHE} Circuit Privacy Almost For Free}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {381}, year = {2016}, url = {http://eprint.iacr.org/2016/381}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoursePMW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoydC16, author = {Colin Boyd and Christopher Carr}, title = {Fair Client Puzzles from the Bitcoin Blockchain}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {680}, year = {2016}, url = {http://eprint.iacr.org/2016/680}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoydC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyenCH16, author = {Xavier Boyen and Christopher Carr and Thomas Haines}, title = {Blockchain-Free Cryptocurrencies. {A} Rational Framework for Truly Decentralised Fast Transactions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {871}, year = {2016}, url = {http://eprint.iacr.org/2016/871}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyenCH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyenL16, author = {Xavier Boyen and Qinyi Li}, title = {Towards Tightly Secure Short Signature and {IBE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {498}, year = {2016}, url = {http://eprint.iacr.org/2016/498}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyenL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyleGI16, author = {Elette Boyle and Niv Gilboa and Yuval Ishai}, title = {Breaking the Circuit Size Barrier for Secure Computation Under {DDH}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {585}, year = {2016}, url = {http://eprint.iacr.org/2016/585}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyleGI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BradleyFT16, author = {Tatiana Bradley and Sky Faber and Gene Tsudik}, title = {Bounded Size-Hiding Private Set Intersection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {657}, year = {2016}, url = {http://eprint.iacr.org/2016/657}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BradleyFT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiBF16, author = {Zvika Brakerski and Christina Brzuska and Nils Fleischhacker}, title = {On Statistically Secure Obfuscation with Approximate Correctness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {226}, year = {2016}, url = {http://eprint.iacr.org/2016/226}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiBF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiCTW16, author = {Zvika Brakerski and David Cash and Rotem Tsabary and Hoeteck Wee}, title = {Targeted Homomorphic Attribute Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {691}, year = {2016}, url = {http://eprint.iacr.org/2016/691}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiCTW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiD16, author = {Zvika Brakerski and Or Dagmi}, title = {Shorter Circuit Obfuscation in Challenging Security Models}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {418}, year = {2016}, url = {http://eprint.iacr.org/2016/418}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiHK16, author = {Zvika Brakerski and Justin Holmgren and Yael Tauman Kalai}, title = {Non-Interactive {RAM} and Batch {NP} Delegation from any {PIR}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {459}, year = {2016}, url = {http://eprint.iacr.org/2016/459}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiHK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiP16, author = {Zvika Brakerski and Renen Perlman}, title = {Lattice-Based Fully Dynamic Multi-Key {FHE} with Short Ciphertexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {339}, year = {2016}, url = {http://eprint.iacr.org/2016/339}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiV16, author = {Zvika Brakerski and Vinod Vaikuntanathan}, title = {Circuit-ABE from {LWE:} Unbounded Attributes and Semi-Adaptive Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {118}, year = {2016}, url = {http://eprint.iacr.org/2016/118}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BraunBDFGMSW16, author = {Johannes Braun and Johannes Buchmann and Denise Demirel and Mikio Fujiwara and Matthias Geihs and Shiho Moriai and Masahide Sasaki and Atsushi Waseda}, title = {{LINCOS} - {A} Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Full Paper)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {742}, year = {2016}, url = {http://eprint.iacr.org/2016/742}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BraunBDFGMSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Breier16, author = {Jakub Breier}, title = {On Analyzing Program Behavior Under Fault Injection Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1060}, year = {2016}, url = {http://eprint.iacr.org/2016/1060}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Breier16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BreierH16, author = {Jakub Breier and Xiaolu Hou}, title = {Feeding Two Cats with One Bowl: On Designing a Fault and Side-Channel Resistant Software Encoding Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {931}, year = {2016}, url = {http://eprint.iacr.org/2016/931}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BreierH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BreierJB16, author = {Jakub Breier and Dirmanto Jap and Shivam Bhasin}, title = {Mistakes Are Proof That You Are Trying: On Verifying Software Encoding Schemes' Resistance to Fault Injection Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {932}, year = {2016}, url = {http://eprint.iacr.org/2016/932}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BreierJB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BreuerB16, author = {Peter T. Breuer and Jonathan P. Bowen}, title = {On the Security of Practical and Complete Homomorphic Encrypted Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1191}, year = {2016}, url = {http://eprint.iacr.org/2016/1191}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BreuerB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BreuerB16a, author = {Peter T. Breuer and Jonathan P. Bowen}, title = {Superscalar Encrypted {RISC:} {A} Secret Computer in Simulation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1193}, year = {2016}, url = {http://eprint.iacr.org/2016/1193}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BreuerB16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BricoutMPM16, author = {R{\'{e}}mi Bricout and Sean Murphy and Kenneth G. Paterson and Thyla van der Merwe}, title = {Analysing and Exploiting the Mantin Biases in {RC4}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {63}, year = {2016}, url = {http://eprint.iacr.org/2016/063}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BricoutMPM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BroadnaxDHMN16, author = {Brandon Broadnax and Nico D{\"{o}}ttling and Gunnar Hartung and J{\"{o}}rn M{\"{u}}ller{-}Quade and Matthias Nagel}, title = {Concurrently Composable Security With Shielded Super-polynomial Simulators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1043}, year = {2016}, url = {http://eprint.iacr.org/2016/1043}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BroadnaxDHMN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrodyDFP16, author = {Joshua Brody and Stefan Dziembowski and Sebastian Faust and Krzysztof Pietrzak}, title = {Position-Based Cryptography and Multiparty Communication Complexity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {536}, year = {2016}, url = {http://eprint.iacr.org/2016/536}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrodyDFP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrooksJW16, author = {Ernest Hunter Brooks and Dimitar Jetchev and Benjamin Wesolowski}, title = {Isogeny graphs of ordinary abelian varieties}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {947}, year = {2016}, url = {http://eprint.iacr.org/2016/947}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrooksJW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BruinderinkH16, author = {Leon Groot Bruinderink and Andreas H{\"{u}}lsing}, title = {"Oops, {I} did it again" - Security of One-Time Signatures under Two-Message Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1042}, year = {2016}, url = {http://eprint.iacr.org/2016/1042}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BruinderinkH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BruinderinkHLY16, author = {Leon Groot Bruinderink and Andreas H{\"{u}}lsing and Tanja Lange and Yuval Yarom}, title = {Flush, Gauss, and Reload - {A} Cache Attack on the {BLISS} Lattice-Based Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {300}, year = {2016}, url = {http://eprint.iacr.org/2016/300}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BruinderinkHLY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BruneauGHMR16, author = {Nicolas Bruneau and Sylvain Guilley and Annelie Heuser and Damien Marion and Olivier Rioul}, title = {Less is More - Dimensionality Reduction from a Theoretical Perspective}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {359}, year = {2016}, url = {http://eprint.iacr.org/2016/359}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BruneauGHMR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrunetCGO16, author = {Solenn Brunet and S{\'{e}}bastien Canard and S{\'{e}}bastien Gambs and Baptiste Olivier}, title = {Novel differentially private mechanisms for graphs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {745}, year = {2016}, url = {http://eprint.iacr.org/2016/745}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrunetCGO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrzuskaJS16, author = {Christina Brzuska and H{\aa}kon Jacobsen and Douglas Stebila}, title = {Safely Exporting Keys from Secure Channels: On the security of {EAP-TLS} and {TLS} Key Exporters}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {87}, year = {2016}, url = {http://eprint.iacr.org/2016/087}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrzuskaJS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BuchmannGPW16, author = {Johannes Buchmann and Florian G{\"{o}}pfert and Rachel Player and Thomas Wunderer}, title = {On the Hardness of {LWE} with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {89}, year = {2016}, url = {http://eprint.iacr.org/2016/089}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BuchmannGPW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BudaghyanCHL16, author = {Lilya Budaghyan and Claude Carlet and Tor Helleseth and Nian Li}, title = {On the (non-)existence of {APN} (n, n)-functions of algebraic degree n}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {143}, year = {2016}, url = {http://eprint.iacr.org/2016/143}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BudaghyanCHL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BudaghyanHLS16, author = {Lilya Budaghyan and Tor Helleseth and Nian Li and Bo Sun}, title = {Some Results on the Known Classes of Quadratic {APN} Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1183}, year = {2016}, url = {http://eprint.iacr.org/2016/1183}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BudaghyanHLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BunCV16, author = {Mark Bun and Yi{-}Hsiu Chen and Salil P. Vadhan}, title = {Separating Computational and Statistical Differential Privacy in the Client-Server Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {820}, year = {2016}, url = {http://eprint.iacr.org/2016/820}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BunCV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BunS16, author = {Mark Bun and Thomas Steinke}, title = {Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {816}, year = {2016}, url = {http://eprint.iacr.org/2016/816}, timestamp = {Sun, 14 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BunS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BussiDBD16, author = {Khushboo Bussi and Dhananjoy Dey and Manoj Kumar Biswas and B. K. Dass}, title = {Neeva: {A} Lightweight Hash Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {42}, year = {2016}, url = {http://eprint.iacr.org/2016/042}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BussiDBD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CamenischDL16, author = {Jan Camenisch and Manu Drijvers and Anja Lehmann}, title = {Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {663}, year = {2016}, url = {http://eprint.iacr.org/2016/663}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CamenischDL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CamenischDR16, author = {Jan Camenisch and Maria Dubovitskaya and Alfredo Rial}, title = {{UC} Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {581}, year = {2016}, url = {http://eprint.iacr.org/2016/581}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CamenischDR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CamenischEKKR16, author = {Jan Camenisch and Robert R. Enderlein and Stephan Krenn and Ralf K{\"{u}}sters and Daniel Rausch}, title = {Universal Composition with Responsive Environments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {34}, year = {2016}, url = {http://eprint.iacr.org/2016/034}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CamenischEKKR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CamenischEM16, author = {Jan Camenisch and Robert R. Enderlein and Ueli Maurer}, title = {Memory Erasability Amplification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {706}, year = {2016}, url = {http://eprint.iacr.org/2016/706}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CamenischEM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiP16, author = {Ran Canetti and Oxana Poburinnaya}, title = {Better Two-Round Adaptive Multiparty Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {614}, year = {2016}, url = {http://eprint.iacr.org/2016/614}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiPR16, author = {Ran Canetti and Oxana Poburinnaya and Mariana Raykova}, title = {Optimal-Rate Non-Committing Encryption in a {CRS} Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {511}, year = {2016}, url = {http://eprint.iacr.org/2016/511}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiPR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiPV16, author = {Ran Canetti and Oxana Poburinnaya and Muthuramakrishnan Venkitasubramaniam}, title = {Equivocating Yao: Constant-Round Adaptively Secure Multiparty Computation in the Plain Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1190}, year = {2016}, url = {http://eprint.iacr.org/2016/1190}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiPV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanteautDP16, author = {Anne Canteaut and S{\'{e}}bastien Duval and L{\'{e}}o Perrin}, title = {A generalisation of Dillon's {APN} permutation with the best known differential and linear properties for all fields of size 2\({}^{\mbox{4k+2}}\)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {887}, year = {2016}, url = {http://eprint.iacr.org/2016/887}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanteautDP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanteautR16, author = {Anne Canteaut and Yann Rotella}, title = {Attacks against Filter Generators Exploiting Monomial Mappings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {384}, year = {2016}, url = {http://eprint.iacr.org/2016/384}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanteautR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CaoL16, author = {Zhengjun Cao and Lihua Liu}, title = {A Note on "Outsourcing Large Matrix Inversion Computation to a Public Cloud"}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {448}, year = {2016}, url = {http://eprint.iacr.org/2016/448}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CaoL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CaoL16a, author = {Zhengjun Cao and Lihua Liu}, title = {A Note on One Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {698}, year = {2016}, url = {http://eprint.iacr.org/2016/698}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CaoL16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CaoL16b, author = {Zhengjun Cao and Lihua Liu}, title = {A Note on One Privacy-Preserving Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {699}, year = {2016}, url = {http://eprint.iacr.org/2016/699}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CaoL16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CaoL16c, author = {Zhengjun Cao and Lihua Liu}, title = {The Reason Why Some Divide-and-Conquer Algorithms Cannot Be Efficiently Implemented}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {979}, year = {2016}, url = {http://eprint.iacr.org/2016/979}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CaoL16c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Carlet16, author = {Claude Carlet}, title = {On the nonlinearity of monotone Boolean functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {133}, year = {2016}, url = {http://eprint.iacr.org/2016/133}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Carlet16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletPRR16, author = {Claude Carlet and Emmanuel Prouff and Matthieu Rivain and Thomas Roche}, title = {Algebraic Decomposition for Probing Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {321}, year = {2016}, url = {http://eprint.iacr.org/2016/321}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletPRR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarmerR16, author = {Brent Carmer and Mike Rosulek}, title = {Linicrypt: {A} Model for Practical Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {548}, year = {2016}, url = {http://eprint.iacr.org/2016/548}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarmerR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarpentFST16, author = {Xavier Carpent and Sky Faber and Tomas Sander and Gene Tsudik}, title = {Private Projections {\&} Variants}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1144}, year = {2016}, url = {http://eprint.iacr.org/2016/1144}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarpentFST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarterT16, author = {Henry Carter and Patrick Traynor}, title = {{OPFE:} Outsourcing Computation for Private Function Evaluation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {67}, year = {2016}, url = {http://eprint.iacr.org/2016/067}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarterT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CascudoDDDN16, author = {Ignacio Cascudo and Ivan Damg{\aa}rd and Bernardo David and Nico D{\"{o}}ttling and Jesper Buus Nielsen}, title = {Rate-1, Linear Time and Additively Homomorphic {UC} Commitments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {137}, year = {2016}, url = {http://eprint.iacr.org/2016/137}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CascudoDDDN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CascudoDLR16, author = {Ignacio Cascudo and Ivan Damg{\aa}rd and Felipe Lacerda and Samuel Ranellucci}, title = {Oblivious Transfer from Any Non-Trivial Elastic Noisy Channels via Secret Key Agreement}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {120}, year = {2016}, url = {http://eprint.iacr.org/2016/120}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CascudoDLR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CashGPR16, author = {David Cash and Paul Grubbs and Jason Perry and Thomas Ristenpart}, title = {Leakage-Abuse Attacks Against Searchable Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {718}, year = {2016}, url = {http://eprint.iacr.org/2016/718}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CashGPR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CashLOZ16, author = {David Cash and Feng{-}Hao Liu and Adam O'Neill and Cong Zhang}, title = {Reducing the Leakage in Practical Order-Revealing Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {661}, year = {2016}, url = {http://eprint.iacr.org/2016/661}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CashLOZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CastryckIV16, author = {Wouter Castryck and Ilia Iliashenko and Frederik Vercauteren}, title = {Provably Weak Instances of Ring-LWE Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {239}, year = {2016}, url = {http://eprint.iacr.org/2016/239}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CastryckIV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CastryckIV16a, author = {Wouter Castryck and Ilia Iliashenko and Frederik Vercauteren}, title = {On the tightness of the error bound in Ring-LWE}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {240}, year = {2016}, url = {http://eprint.iacr.org/2016/240}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CastryckIV16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CatalanoFN16, author = {Dario Catalano and Dario Fiore and Luca Nizzardo}, title = {On the Security Notions for Homomorphic Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1175}, year = {2016}, url = {http://eprint.iacr.org/2016/1175}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CatalanoFN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CauchoisLM16, author = {Victor Cauchois and Pierre Loidreau and Nabil Merkiche}, title = {Direct construction of quasi-involutory recursive-like {MDS} matrices from 2-cyclic codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1112}, year = {2016}, url = {http://eprint.iacr.org/2016/1112}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CauchoisLM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CetinDDMS16, author = {Gizem S. {\c{C}}etin and Wei Dai and Yarkin Dor{\"{o}}z and William J. Martin and Berk Sunar}, title = {Blind Web Search: How far are we from a privacy preserving search engine?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {801}, year = {2016}, url = {http://eprint.iacr.org/2016/801}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CetinDDMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaigneauG16, author = {Colin Chaigneau and Henri Gilbert}, title = {Is {AEZ} v4.1 Sufficiently Resilient Against Key-Recovery Attacks?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {832}, year = {2016}, url = {http://eprint.iacr.org/2016/832}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaigneauG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chakraborty16, author = {Sumit Chakraborty}, title = {Algorithmic Mechanism Construction bridging Secure Multiparty Computation and Intelligent Reasoning}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {778}, year = {2016}, url = {http://eprint.iacr.org/2016/778}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Chakraborty16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chakraborty16a, author = {Sumit Chakraborty}, title = {Mobile Commerce: Secure Multi-party Computation {\&} Financial Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1167}, year = {2016}, url = {http://eprint.iacr.org/2016/1167}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Chakraborty16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChakrabortyGS16, author = {Debrup Chakraborty and Sebati Ghosh and Palash Sarkar}, title = {A Fast Single-Key Two-Level Universal Hash Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1103}, year = {2016}, url = {http://eprint.iacr.org/2016/1103}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChakrabortyGS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChakrabortyM16, author = {Abhishek Chakraborty and Debdeep Mukhopadhyay}, title = {A Practical Template Attack on {MICKEY-128} 2.0 Using {PSO} Generated IVs and {LS-SVM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {26}, year = {2016}, url = {http://eprint.iacr.org/2016/026}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChakrabortyM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChakrabortyRR16, author = {Suvradip Chakraborty and Srinivasan Raghuraman and C. Pandu Rangan}, title = {A Pairing-Free, One Round Identity Based Authenticated Key Exchange Protocol Secure Against Memory-Scrapers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {354}, year = {2016}, url = {http://eprint.iacr.org/2016/354}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChakrabortyRR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChanS16, author = {T.{-}H. Hubert Chan and Elaine Shi}, title = {Circuit {OPRAM:} {A} (Somewhat) Tight Oblivious Parallel {RAM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1084}, year = {2016}, url = {http://eprint.iacr.org/2016/1084}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChanS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaseGM16, author = {Melissa Chase and Chaya Ganesh and Payman Mohassel}, title = {Efficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving Credentials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {583}, year = {2016}, url = {http://eprint.iacr.org/2016/583}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaseGM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaseM16, author = {Melissa Chase and Sarah Meiklejohn}, title = {Transparency Overlays and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {915}, year = {2016}, url = {http://eprint.iacr.org/2016/915}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaseM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaseMM16, author = {Melissa Chase and Mary Maller and Sarah Meiklejohn}, title = {Deja {Q} All Over Again: Tighter and Broader Reductions of q-Type Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {840}, year = {2016}, url = {http://eprint.iacr.org/2016/840}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaseMM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChatterjeeCM16, author = {Urbi Chatterjee and Rajat Subhra Chakraborty and Debdeep Mukhopadhyay}, title = {A PUF-based Secure Communication Protocol for IoT}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {674}, year = {2016}, url = {http://eprint.iacr.org/2016/674}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChatterjeeCM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChatterjeeKMS16, author = {Sanjit Chatterjee and Neal Koblitz and Alfred Menezes and Palash Sarkar}, title = {Another Look at Tightness {II:} Practical Issues in Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {360}, year = {2016}, url = {http://eprint.iacr.org/2016/360}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChatterjeeKMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChatterjeeMR16, author = {Sanjit Chatterjee and Alfred Menezes and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {On Implementing Pairing-Based Protocols with Elliptic Curves of Embedding Degree One}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {403}, year = {2016}, url = {http://eprint.iacr.org/2016/403}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChatterjeeMR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChattopadhyayG016, author = {Eshan Chattopadhyay and Vipul Goyal and Xin Li}, title = {Non-Malleable Extractors and Codes, with their Many Tampered Extensions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {340}, year = {2016}, url = {http://eprint.iacr.org/2016/340}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChattopadhyayG016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaudhariD16, author = {Payal Chaudhari and Manik Lal Das}, title = {Cryptanalysis of Searchable Anonymous Attribute Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {347}, year = {2016}, url = {http://eprint.iacr.org/2016/347}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaudhariD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CheckowayCG0HMR16, author = {Stephen Checkoway and Shaanan Cohney and Christina Garman and Matthew Green and Nadia Heninger and Jacob Maskiewicz and Eric Rescorla and Hovav Shacham and Ralf{-}Philipp Weinmann}, title = {A Systematic Analysis of the Juniper Dual {EC} Incident}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {376}, year = {2016}, url = {http://eprint.iacr.org/2016/376}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CheckowayCG0HMR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chen16, author = {Yilei Chen}, title = {An Alternative View of the Graph-Induced Multilinear Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {200}, year = {2016}, url = {http://eprint.iacr.org/2016/200}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Chen16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chen16a, author = {Hao Chen}, title = {A Measure Version of Gaussian Heuristic}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {439}, year = {2016}, url = {http://eprint.iacr.org/2016/439}, timestamp = {Wed, 22 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Chen16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenCL16, author = {Yalin Chen and Jue{-}Sam Chou and I{-}Ching Liao}, title = {Improved on an improved remote user authentication scheme with key agreement}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {23}, year = {2016}, url = {http://eprint.iacr.org/2016/023}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenCL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenCW16, author = {Yalin Chen and Jue{-}Sam Chou and Hung{-}Shen Wu}, title = {Improved on an efficient user authentication scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1}, year = {2016}, url = {http://eprint.iacr.org/2016/001}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenCW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenFE16, author = {Cong Chen and Mohammad Farmani and Thomas Eisenbarth}, title = {A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile-and Why it is Not}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {434}, year = {2016}, url = {http://eprint.iacr.org/2016/434}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenFE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenGH16, author = {Yilei Chen and Craig Gentry and Shai Halevi}, title = {Cryptanalyses of Candidate Branching Program Obfuscators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {998}, year = {2016}, url = {http://eprint.iacr.org/2016/998}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenGH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenLM16, author = {Liqun Chen and Thalia M. Laing and Keith M. Martin}, title = {Revisiting and Extending the {AONT-RS} scheme: a Robust Computationally Secure Secret Sharing Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1014}, year = {2016}, url = {http://eprint.iacr.org/2016/1014}, timestamp = {Sat, 28 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenLM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenLS16, author = {Hao Chen and Kristin E. Lauter and Katherine E. Stange}, title = {Vulnerable Galois {RLWE} Families and Improved Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {193}, year = {2016}, url = {http://eprint.iacr.org/2016/193}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenMYSG16, author = {Rongmao Chen and Yi Mu and Guomin Yang and Willy Susilo and Fuchun Guo}, title = {Strongly Leakage-Resilient Authenticated Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {308}, year = {2016}, url = {http://eprint.iacr.org/2016/308}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenMYSG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenMYSGZ16, author = {Rongmao Chen and Yi Mu and Guomin Yang and Willy Susilo and Fuchun Guo and Mingwu Zhang}, title = {Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {873}, year = {2016}, url = {http://eprint.iacr.org/2016/873}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenMYSGZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenQLD16, author = {Xi Chen and Longjiang Qu and Chao Li and Jiao Du}, title = {A New Method to Investigate the CCZ-Equivalence between Functions with Low Differential Uniformity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {744}, year = {2016}, url = {http://eprint.iacr.org/2016/744}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenQLD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenZDC16, author = {Yu Chen and Jiang Zhang and Yi Deng and Jinyong Chang}, title = {{KDM} Security for Identity-Based Encryption: Constructions and Separations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1020}, year = {2016}, url = {http://eprint.iacr.org/2016/1020}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenZDC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChengCNY16, author = {Chen{-}Mou Cheng and Tung Chou and Ruben Niederhagen and Bo{-}Yin Yang}, title = {Solving Quadratic Equations with {XL} on Parallel Architectures - extended version}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {412}, year = {2016}, url = {http://eprint.iacr.org/2016/412}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChengCNY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChengZ16, author = {Qi Cheng and Jincheng Zhuang}, title = {{LWE} from Non-commutative Group Rings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1169}, year = {2016}, url = {http://eprint.iacr.org/2016/1169}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChengZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CheonCKL16, author = {Jung Hee Cheon and HeeWon Chung and Myungsun Kim and Kang{-}Won Lee}, title = {Ghostshell: Secure Biometric Authentication using Integrity-based Homomorphic Evaluations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {484}, year = {2016}, url = {http://eprint.iacr.org/2016/484}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CheonCKL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CheonFLMR16, author = {Jung Hee Cheon and Pierre{-}Alain Fouque and Changmin Lee and Brice Minaud and Hansol Ryu}, title = {Cryptanalysis of the New {CLT} Multilinear Map over the Integers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {135}, year = {2016}, url = {http://eprint.iacr.org/2016/135}, timestamp = {Fri, 26 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CheonFLMR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CheonHKLS16, author = {Jung Hee Cheon and Kyoohyung Han and Jinsu Kim and Changmin Lee and Yongha Son}, title = {A Practical Post-Quantum Public-Key Cryptosystem Based on spLWE}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1055}, year = {2016}, url = {http://eprint.iacr.org/2016/1055}, timestamp = {Fri, 26 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CheonHKLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CheonJL16, author = {Jung Hee Cheon and Jinhyuck Jeong and Changmin Lee}, title = {An Algorithm for {NTRU} Problems and Cryptanalysis of the {GGH} Multilinear Map without an encoding of zero}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {139}, year = {2016}, url = {http://eprint.iacr.org/2016/139}, timestamp = {Fri, 26 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CheonJL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CheonK16, author = {Jung Hee Cheon and Duhyeong Kim}, title = {Probability that the k-gcd of products of positive integers is B-smooth}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {334}, year = {2016}, url = {http://eprint.iacr.org/2016/334}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CheonK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CheonKKS16, author = {Jung Hee Cheon and Andrey Kim and Miran Kim and Yong Soo Song}, title = {Floating-Point Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {421}, year = {2016}, url = {http://eprint.iacr.org/2016/421}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CheonKKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CheonKLS16, author = {Jung Hee Cheon and Duhyeong Kim and Joohee Lee and Yong Soo Song}, title = {Lizard: Cut off the Tail! // Practical Post-Quantum Public-Key Encryption from {LWE} and {LWR}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1126}, year = {2016}, url = {http://eprint.iacr.org/2016/1126}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CheonKLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CheonS16, author = {Jung Hee Cheon and Damien Stehl{\'{e}}}, title = {Fully Homomorphic Encryption over the Integers Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {837}, year = {2016}, url = {http://eprint.iacr.org/2016/837}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CheonS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChevalierLV16, author = {C{\'{e}}line Chevalier and Fabien Laguillaumie and Damien Vergnaud}, title = {Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {309}, year = {2016}, url = {http://eprint.iacr.org/2016/309}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChevalierLV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chiesa0LMMM16, author = {Alessandro Chiesa and Matthew Green and Jingcheng Liu and Peihan Miao and Ian Miers and Pratyush Mishra}, title = {Decentralized Anonymous Micropayments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1033}, year = {2016}, url = {http://eprint.iacr.org/2016/1033}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Chiesa0LMMM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChillottiGG16, author = {Ilaria Chillotti and Nicolas Gama and Louis Goubin}, title = {Attacking FHE-based applications by software fault injections}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1164}, year = {2016}, url = {http://eprint.iacr.org/2016/1164}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChillottiGG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChillottiGGI16, author = {Ilaria Chillotti and Nicolas Gama and Mariya Georgieva and Malika Izabach{\`{e}}ne}, title = {Faster Fully Homomorphic Encryption: Bootstrapping in less than 0.1 Seconds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {870}, year = {2016}, url = {http://eprint.iacr.org/2016/870}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChillottiGGI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChinburgHHS16, author = {Ted Chinburg and Brett Hemenway and Nadia Heninger and Zachary Scherr}, title = {Cryptographic applications of capacity theory: On the optimality of Coppersmith's method for univariate polynomials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {869}, year = {2016}, url = {http://eprint.iacr.org/2016/869}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChinburgHHS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoCDKMV16, author = {Jihoon Cho and Kyu Young Choi and Orr Dunkelman and Nathan Keller and Dukjae Moon and Aviya Vaidberg}, title = {Hybrid {WBC:} Secure and Efficient White-Box Encryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {679}, year = {2016}, url = {http://eprint.iacr.org/2016/679}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoCDKMV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoiDMW16, author = {Seung Geol Choi and Dana Dachman{-}Soled and Tal Malkin and Hoeteck Wee}, title = {A Black-Box Construction of Non-Malleable Encryption from Semantically Secure Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {720}, year = {2016}, url = {http://eprint.iacr.org/2016/720}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoiDMW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoiDMW16a, author = {Seung Geol Choi and Dana Dachman{-}Soled and Tal Malkin and Hoeteck Wee}, title = {Improved, Black-Box, Non-Malleable Encryption from Semantic Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {842}, year = {2016}, url = {http://eprint.iacr.org/2016/842}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoiDMW16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chopra16, author = {Arjun Chopra}, title = {Improved Parameters for the Ring-TESLA Digital Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1099}, year = {2016}, url = {http://eprint.iacr.org/2016/1099}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Chopra16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChotardPP16, author = {J{\'{e}}r{\'{e}}my Chotard and Duong Hieu Phan and David Pointcheval}, title = {Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1089}, year = {2016}, url = {http://eprint.iacr.org/2016/1089}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChotardPP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoudhuriM16, author = {Arka Rai Choudhuri and Subhamoy Maitra}, title = {Differential Cryptanalysis of Salsa and ChaCha - An Evaluation with a Hybrid Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {377}, year = {2016}, url = {http://eprint.iacr.org/2016/377}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoudhuriM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoudhuriM16a, author = {Arka Rai Choudhuri and Subhamoy Maitra}, title = {Significantly Improved Multi-bit Differentials for Reduced Round Salsa and ChaCha}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1034}, year = {2016}, url = {http://eprint.iacr.org/2016/1034}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoudhuriM16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChungCS16, author = {Ping Ngai Chung and Craig Costello and Benjamin Smith}, title = {Fast, uniform scalar multiplication for genus 2 Jacobians with fast Kummers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {777}, year = {2016}, url = {http://eprint.iacr.org/2016/777}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChungCS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChungK16, author = {HeeWon Chung and Myungsun Kim}, title = {Encoding Rational Numbers for FHE-based Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {344}, year = {2016}, url = {http://eprint.iacr.org/2016/344}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChungK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CiampiOSV16, author = {Michele Ciampi and Rafail Ostrovsky and Luisa Siniscalchi and Ivan Visconti}, title = {Concurrent Non-Malleable Commitments (and More) in 3 Rounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {566}, year = {2016}, url = {http://eprint.iacr.org/2016/566}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CiampiOSV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CiampiOSV16a, author = {Michele Ciampi and Rafail Ostrovsky and Luisa Siniscalchi and Ivan Visconti}, title = {On Round-Efficient Non-Malleable Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {621}, year = {2016}, url = {http://eprint.iacr.org/2016/621}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CiampiOSV16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CiampiPSSV16, author = {Michele Ciampi and Giuseppe Persiano and Alessandra Scafuro and Luisa Siniscalchi and Ivan Visconti}, title = {Online/Offline {OR} Composition of Sigma Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {175}, year = {2016}, url = {http://eprint.iacr.org/2016/175}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CiampiPSSV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CioranescoFGN16, author = {Jean{-}Michel Cioranesco and Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and David Naccache}, title = {Process Table Covert Channels: Exploitation and Countermeasures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {227}, year = {2016}, url = {http://eprint.iacr.org/2016/227}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CioranescoFGN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ClearM16, author = {Michael Clear and Ciaran McGoldrick}, title = {Attribute-Based Fully Homomorphic Encryption with a Bounded Number of Inputs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {99}, year = {2016}, url = {http://eprint.iacr.org/2016/099}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ClearM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CnuddeBGNNR16, author = {Thomas De Cnudde and Beg{\"{u}}l Bilgin and Benedikt Gierlichs and Ventzislav Nikov and Svetla Nikova and Vincent Rijmen}, title = {Does Coupling Affect the Security of Masked Implementations?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1080}, year = {2016}, url = {http://eprint.iacr.org/2016/1080}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CnuddeBGNNR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CnuddeRBNNR16, author = {Thomas De Cnudde and Oscar Reparaz and Beg{\"{u}}l Bilgin and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, title = {Masking {AES} with d+1 Shares in Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {631}, year = {2016}, url = {http://eprint.iacr.org/2016/631}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CnuddeRBNNR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CockDHKNNP16, author = {Martine De Cock and Rafael Dowsley and Caleb Horst and Raj S. Katti and Anderson C. A. Nascimento and Stacey C. Newman and Wing{-}Sea Poon}, title = {Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models based on Pre-Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {736}, year = {2016}, url = {http://eprint.iacr.org/2016/736}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CockDHKNNP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoglianiBFGMNCW16, author = {Simon Cogliani and Feng Bao and Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and Diana Maimut and David Naccache and Rodrigo Portella do Canto and Guilin Wang}, title = {Public-Key Based Lightweight Swarm Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {750}, year = {2016}, url = {http://eprint.iacr.org/2016/750}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoglianiBFGMNCW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoglianiFGN16, author = {Simon Cogliani and Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and David Naccache}, title = {Thrifty Zero-Knowledge - When Linear Programming Meets Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {443}, year = {2016}, url = {http://eprint.iacr.org/2016/443}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoglianiFGN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoglianiGN16, author = {Simon Cogliani and R{\'{e}}mi G{\'{e}}raud and David Naccache}, title = {A Fiat-Shamir Implementation Note}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1039}, year = {2016}, url = {http://eprint.iacr.org/2016/1039}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoglianiGN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CogliatiS16, author = {Beno{\^{\i}}t Cogliati and Yannick Seurin}, title = {Strengthening the Known-Key Security Notion for Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {394}, year = {2016}, url = {http://eprint.iacr.org/2016/394}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CogliatiS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CogliatiS16a, author = {Beno{\^{\i}}t Cogliati and Yannick Seurin}, title = {{EWCDM:} An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant {MAC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {525}, year = {2016}, url = {http://eprint.iacr.org/2016/525}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CogliatiS16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CohenCGZ16, author = {Ran Cohen and Sandro Coretti and Juan A. Garay and Vassilis Zikas}, title = {Probabilistic Termination and Composability of Cryptographic Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {350}, year = {2016}, url = {http://eprint.iacr.org/2016/350}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CohenCGZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CohenK16, author = {Aloni Cohen and Saleet Klein}, title = {The {GGM} {PRF} is a Weakly One-Way Family of Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {610}, year = {2016}, url = {http://eprint.iacr.org/2016/610}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CohenK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CohenP16, author = {Ran Cohen and Chris Peikert}, title = {On Adaptively Secure Multiparty Computation with a Short {CRS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {976}, year = {2016}, url = {http://eprint.iacr.org/2016/976}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CohenP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Cohn-GordonCDGS16, author = {Katriel Cohn{-}Gordon and Cas Cremers and Benjamin Dowling and Luke Garratt and Douglas Stebila}, title = {A Formal Security Analysis of the Signal Messaging Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1013}, year = {2016}, url = {http://eprint.iacr.org/2016/1013}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Cohn-GordonCDGS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Cohn-GordonCG16, author = {Katriel Cohn{-}Gordon and Cas Cremers and Luke Garratt}, title = {On Post-Compromise Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {221}, year = {2016}, url = {http://eprint.iacr.org/2016/221}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Cohn-GordonCG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ColombierBHF16, author = {Brice Colombier and Lilian Bossuet and David H{\'{e}}ly and Viktor Fischer}, title = {Key Reconciliation Protocols for Error Correction of Silicon {PUF} Responses}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {939}, year = {2016}, url = {http://eprint.iacr.org/2016/939}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ColombierBHF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CorettiGHZ16, author = {Sandro Coretti and Juan A. Garay and Martin Hirt and Vassilis Zikas}, title = {Constant-Round Asynchronous Multi-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {208}, year = {2016}, url = {http://eprint.iacr.org/2016/208}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CorettiGHZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronGPZ16, author = {Jean{-}S{\'{e}}bastien Coron and Aur{\'{e}}lien Greuet and Emmanuel Prouff and Rina Zeitoun}, title = {Faster Evaluation of SBoxes via Common Shares}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {572}, year = {2016}, url = {http://eprint.iacr.org/2016/572}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronGPZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronLLT16, author = {Jean{-}S{\'{e}}bastien Coron and Moon Sung Lee and Tancr{\`{e}}de Lepoint and Mehdi Tibouchi}, title = {Zeroizing Attacks on Indistinguishability Obfuscation over {CLT13}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1011}, year = {2016}, url = {http://eprint.iacr.org/2016/1011}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronLLT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronZ16, author = {Jean{-}S{\'{e}}bastien Coron and Rina Zeitoun}, title = {Improved Factorization of N=p\({}^{\mbox{rq\({}^{\mbox{s}}\)}}\)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {551}, year = {2016}, url = {http://eprint.iacr.org/2016/551}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Corrigan-GibbsB16, author = {Henry Corrigan{-}Gibbs and Dan Boneh and Stuart E. Schechter}, title = {Balloon Hashing: Provably Space-Hard Hash Functions with Data-Independent Access Patterns}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {27}, year = {2016}, url = {http://eprint.iacr.org/2016/027}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Corrigan-GibbsB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CortierGKMT16, author = {V{\'{e}}ronique Cortier and David Galindo and Ralf K{\"{u}}sters and Johannes M{\"{u}}ller and Tomasz Truderung}, title = {Verifiability Notions for E-Voting Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {287}, year = {2016}, url = {http://eprint.iacr.org/2016/287}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CortierGKMT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CostacheSV16, author = {Anamaria Costache and Nigel P. Smart and Srinivas Vivek}, title = {Faster Homomorphic Evaluation of Discrete Fourier Transforms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1019}, year = {2016}, url = {http://eprint.iacr.org/2016/1019}, timestamp = {Mon, 11 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CostacheSV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CostacheSVW16, author = {Anamaria Costache and Nigel P. Smart and Srinivas Vivek and Adrian Waller}, title = {Fixed Point Arithmetic in {SHE} Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {250}, year = {2016}, url = {http://eprint.iacr.org/2016/250}, timestamp = {Mon, 11 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CostacheSVW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CostanD16, author = {Victor Costan and Srinivas Devadas}, title = {Intel {SGX} Explained}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {86}, year = {2016}, url = {http://eprint.iacr.org/2016/086}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CostanD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CostelloJLNRU16, author = {Craig Costello and David Jao and Patrick Longa and Michael Naehrig and Joost Renes and David Urbanik}, title = {Efficient compression of {SIDH} public keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {963}, year = {2016}, url = {http://eprint.iacr.org/2016/963}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CostelloJLNRU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CostelloLN16, author = {Craig Costello and Patrick Longa and Michael Naehrig}, title = {Efficient algorithms for supersingular isogeny Diffie-Hellman}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {413}, year = {2016}, url = {http://eprint.iacr.org/2016/413}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CostelloLN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Courtois16, author = {Nicolas T. Courtois}, title = {On Splitting a Point with Summation Polynomials in Binary Elliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {3}, year = {2016}, url = {http://eprint.iacr.org/2016/003}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Courtois16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Courtois16a, author = {Nicolas T. Courtois}, title = {High Saturation Complete Graph Approach for {EC} Point Decomposition and {ECDL} Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {704}, year = {2016}, url = {http://eprint.iacr.org/2016/704}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Courtois16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CourtoisSC16, author = {Nicolas T. Courtois and Guangyan Song and Ryan Castellucci}, title = {Speed Optimizations in Bitcoin Key Recovery Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {103}, year = {2016}, url = {http://eprint.iacr.org/2016/103}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CourtoisSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Couteau16, author = {Geoffroy Couteau}, title = {Efficient Secure Comparison Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {544}, year = {2016}, url = {http://eprint.iacr.org/2016/544}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Couteau16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Couteau16a, author = {Geoffroy Couteau}, title = {Revisiting Covert Multiparty Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {951}, year = {2016}, url = {http://eprint.iacr.org/2016/951}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Couteau16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CouteauPP16, author = {Geoffroy Couteau and Thomas Peters and David Pointcheval}, title = {Removing the Strong {RSA} Assumption from Arguments over the Integers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {128}, year = {2016}, url = {http://eprint.iacr.org/2016/128}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CouteauPP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CouvreurOTG16, author = {Alain Couvreur and Ayoub Otmani and Jean{-}Pierre Tillich and Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a}, title = {A Polynomial-Time Attack on the {BBCRS} Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {302}, year = {2016}, url = {http://eprint.iacr.org/2016/302}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CouvreurOTG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerD16, author = {Ronald Cramer and Ivan Damg{\aa}rd}, title = {Amortized Complexity of Zero-Knowledge Proofs Revisited: Achieving Linear Soundness Slack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {681}, year = {2016}, url = {http://eprint.iacr.org/2016/681}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerDDGX16, author = {Ronald Cramer and Ivan Damg{\aa}rd and Nico D{\"{o}}ttling and Irene Giacomelli and Chaoping Xing}, title = {Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {397}, year = {2016}, url = {http://eprint.iacr.org/2016/397}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerDDGX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerDW16, author = {Ronald Cramer and L{\'{e}}o Ducas and Benjamin Wesolowski}, title = {Short Stickelberger Class Relations and application to Ideal-SVP}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {885}, year = {2016}, url = {http://eprint.iacr.org/2016/885}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerDW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerXY16, author = {Ronald Cramer and Chaoping Xing and Chen Yuan}, title = {On Multi-Point Local Decoding of Reed-Muller Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {369}, year = {2016}, url = {http://eprint.iacr.org/2016/369}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerXY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CrockettP16, author = {Eric Crockett and Chris Peikert}, title = {Challenges for Ring-LWE}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {782}, year = {2016}, url = {http://eprint.iacr.org/2016/782}, timestamp = {Thu, 02 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CrockettP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CuiJFCW16, author = {Tingting Cui and Keting Jia and Kai Fu and Shiyao Chen and Meiqin Wang}, title = {New Automatic Search Tool for Impossible Differentials and Zero-Correlation Linear Approximations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {689}, year = {2016}, url = {http://eprint.iacr.org/2016/689}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CuiJFCW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CunninghamFY16, author = {Robert K. Cunningham and Benjamin Fuller and Sophia Yakoubov}, title = {Catching {MPC} Cheaters: Identification and Openability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {611}, year = {2016}, url = {http://eprint.iacr.org/2016/611}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CunninghamFY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Czyzewski16, author = {Maciej A. Czyzewski}, title = {Chaos Machine: Different Approach to the Application and Significance of Numbers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {468}, year = {2016}, url = {http://eprint.iacr.org/2016/468}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Czyzewski16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-Soled16, author = {Dana Dachman{-}Soled}, title = {Towards Non-Black-Box Separations of Public Key Encryption and One Way Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {812}, year = {2016}, url = {http://eprint.iacr.org/2016/812}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-Soled16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledGL16, author = {Dana Dachman{-}Soled and S. Dov Gordon and Feng{-}Hao Liu and Adam O'Neill and Hong{-}Sheng Zhou}, title = {Leakage-Resilient Public-Key Encryption from Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {730}, year = {2016}, url = {http://eprint.iacr.org/2016/730}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledGL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledPN16, author = {Dana Dachman{-}Soled and Angela Park and Ben San Nicolas}, title = {Towards a Characterization of the Related-Key Attack Security of the Iterated Even-Mansour Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {707}, year = {2016}, url = {http://eprint.iacr.org/2016/707}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledPN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Daemen16, author = {Joan Daemen}, title = {Spectral characterization of iterating lossy mappings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {90}, year = {2016}, url = {http://eprint.iacr.org/2016/090}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Daemen16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Daemen16a, author = {Joan Daemen}, title = {Changing of the Guards: a simple and efficient method for achieving uniformity in threshold sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1061}, year = {2016}, url = {http://eprint.iacr.org/2016/1061}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Daemen16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DahlbergPP16, author = {Rasmus Dahlberg and Tobias Pulls and Roel Peeters}, title = {Efficient Sparse Merkle Trees: Caching Strategies and Secure (Non-)Membership Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {683}, year = {2016}, url = {http://eprint.iacr.org/2016/683}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DahlbergPP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaiSSWZ16, author = {Wei Dai and John M. Schanck and Berk Sunar and William Whyte and Zhenfei Zhang}, title = {{NTRU} Modular Lattice Signature Scheme on {CUDA} GPUs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {471}, year = {2016}, url = {http://eprint.iacr.org/2016/471}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DaiSSWZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardHO16, author = {Ivan Damg{\aa}rd and Helene Haagh and Claudio Orlandi}, title = {Access Control Encryption: Enforcing Information Flow with Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {106}, year = {2016}, url = {http://eprint.iacr.org/2016/106}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardHO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardNNR16, author = {Ivan Damg{\aa}rd and Jesper Buus Nielsen and Michael Nielsen and Samuel Ranellucci}, title = {Gate-scrambling Revisited - or: The TinyTable protocol for 2-Party Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {695}, year = {2016}, url = {http://eprint.iacr.org/2016/695}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardNNR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardTZ16, author = {Ivan Damg{\aa}rd and Tomas Toft and Rasmus Winther Zakarias}, title = {Fast Multiparty Multiplications from shared bits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {109}, year = {2016}, url = {http://eprint.iacr.org/2016/109}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardTZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DattaDM16, author = {Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay}, title = {Verifiable and Delegatable Constrained Pseudorandom Functions for Unconstrained Inputs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {784}, year = {2016}, url = {http://eprint.iacr.org/2016/784}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DattaDM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DattaDM16a, author = {Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay}, title = {Succinct Predicate and Online-Offline Multi-Input Inner Product Encryptions under Standard Static Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {904}, year = {2016}, url = {http://eprint.iacr.org/2016/904}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DattaDM16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DavidChaumJKKRS16, author = {David Chaum and Farid Javani and Aniket Kate and Anna Krasnova and Joeri de Ruiter and Alan T. Sherman}, title = {cMix: Anonymization byHigh-Performance Scalable Mixing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {8}, year = {2016}, url = {http://eprint.iacr.org/2016/008}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DavidChaumJKKRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DavidsonC16, author = {Alex Davidson and Carlos Cid}, title = {Computing Private Set Operations with Linear Complexities}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {108}, year = {2016}, url = {http://eprint.iacr.org/2016/108}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DavidsonC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DebnathD16, author = {Sumit Kumar Debnath and Ratna Dutta}, title = {Fair mPSI and mPSI-CA: Efficient Constructions in Prime Order Groups with Security in the Standard Model against Malicious Adversary}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {216}, year = {2016}, url = {http://eprint.iacr.org/2016/216}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DebnathD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DegabrielePSW16, author = {Jean Paul Degabriele and Kenneth G. Paterson and Jacob C. N. Schuldt and Joanne Woodage}, title = {Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {577}, year = {2016}, url = {http://eprint.iacr.org/2016/577}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DegabrielePSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DegwekarVV16, author = {Akshay Degwekar and Vinod Vaikuntanathan and Prashant Nalini Vasudevan}, title = {Fine-grained Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {580}, year = {2016}, url = {http://eprint.iacr.org/2016/580}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DegwekarVV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DehkordiS16, author = {Massoud Hadian Dehkordi and Ali Safi}, title = {The complexity of the connected graph access structure on seven participants}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {928}, year = {2016}, url = {http://eprint.iacr.org/2016/928}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DehkordiS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DehnaviRSMP16, author = {Seyed Mojtaba Dehnavi and Akbar Mahmoodi Rishakani and M. R. Mirzaee Shamsabad and Hamidreza Maimani and Einollah Pasha}, title = {Cryptographic Properties of Addition Modulo 2\({}^{\mbox{n}}\)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {181}, year = {2016}, url = {http://eprint.iacr.org/2016/181}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DehnaviRSMP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DelavarMAM16, author = {Mahshid Delavar and Sattar Mirzakuchaki and Mohammad Hassan Ameri and Javad Mohajeri}, title = {Puf-Based Solutions For Secure Communications In Advanced Metering Infrastructure {(AMI)}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {9}, year = {2016}, url = {http://eprint.iacr.org/2016/009}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DelavarMAM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Delgado-SeguraP16, author = {Sergi Delgado{-}Segura and Cristina P{\'{e}}rez{-}Sol{\`{a}} and Jordi Herrera{-}Joancomart{\'{\i}} and Guillermo Navarro{-}Arribas}, title = {Bitcoin Private Key Locked Transactions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1184}, year = {2016}, url = {http://eprint.iacr.org/2016/1184}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Delgado-SeguraP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DemayGMT16, author = {Gr{\'{e}}gory Demay and Peter Gazi and Ueli Maurer and Bj{\"{o}}rn Tackmann}, title = {Per-Session Security: Password-Based Cryptography Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {166}, year = {2016}, url = {http://eprint.iacr.org/2016/166}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DemayGMT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DemirXZS16, author = {Onur Demir and Wenjie Xiong and Faisal Zaghloul and Jakub Szefer}, title = {Survey of Approaches for Security Verification of Hardware/Software Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {846}, year = {2016}, url = {http://eprint.iacr.org/2016/846}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DemirXZS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Deng16, author = {Yi Deng}, title = {Magic Adversaries Versus Individual Reduction: Science Wins Either Way}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1107}, year = {2016}, url = {http://eprint.iacr.org/2016/1107}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Deng16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DengS16, author = {Yuqiao Deng and Ge Song}, title = {Scalable Attribute-Based Encryption Under the Strictly Weaker Assumption Family}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1029}, year = {2016}, url = {http://eprint.iacr.org/2016/1029}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DengS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DengS16a, author = {Yuqiao Deng and Ge Song}, title = {Novel Inner Product Encryption Resistant to Partial Collusion Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1030}, year = {2016}, url = {http://eprint.iacr.org/2016/1030}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DengS16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Derbez16, author = {Patrick Derbez}, title = {Note on Impossible Differential Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {349}, year = {2016}, url = {http://eprint.iacr.org/2016/349}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Derbez16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DerbezF16, author = {Patrick Derbez and Pierre{-}Alain Fouque}, title = {Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {579}, year = {2016}, url = {http://eprint.iacr.org/2016/579}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DerbezF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DerlerKS16, author = {David Derler and Stephan Krenn and Daniel Slamanig}, title = {Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1064}, year = {2016}, url = {http://eprint.iacr.org/2016/1064}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DerlerKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DerlerORRS16, author = {David Derler and Claudio Orlandi and Sebastian Ramacher and Christian Rechberger and Daniel Slamanig}, title = {Digital Signatures from Symmetric-Key Primitives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1085}, year = {2016}, url = {http://eprint.iacr.org/2016/1085}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DerlerORRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DerlerS16, author = {David Derler and Daniel Slamanig}, title = {Fully-Anonymous Short Dynamic Group Signatures Without Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {154}, year = {2016}, url = {http://eprint.iacr.org/2016/154}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DerlerS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DerlerS16a, author = {David Derler and Daniel Slamanig}, title = {Key-Homomorphic Signatures and Applications to Multiparty Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {792}, year = {2016}, url = {http://eprint.iacr.org/2016/792}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DerlerS16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DeshpandeKW16, author = {Apoorvaa Deshpande and Venkata Koppula and Brent Waters}, title = {Constrained Pseudorandom Functions for Unconstrained Inputs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {301}, year = {2016}, url = {http://eprint.iacr.org/2016/301}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DeshpandeKW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DhanuskodiH16, author = {Siva Nishok Dhanuskodi and Daniel E. Holcomb}, title = {Energy Optimization of Unrolled Block Ciphers using Combinational Checkpointing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1093}, year = {2016}, url = {http://eprint.iacr.org/2016/1093}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DhanuskodiH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DimitrovKKRW16, author = {Vassil S. Dimitrov and Liisi Kerik and Toomas Krips and Jaak Randmets and Jan Willemson}, title = {Alternative Implementations of Secure Real Numbers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {773}, year = {2016}, url = {http://eprint.iacr.org/2016/773}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DimitrovKKRW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DingALRS16, author = {Jintai Ding and Saed Alsayigh and Jean Lancrenon and Saraswathy RV and Michael Snook}, title = {Provably Secure Password Authenticated Key Exchange Based on {RLWE} for the Post-QuantumWorld}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {552}, year = {2016}, url = {http://eprint.iacr.org/2016/552}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DingALRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DingARF16, author = {Jintai Ding and Saed Alsayigh and Saraswathy RV and Scott R. Fluhrer}, title = {Leakage of Signal function with reused keys in {RLWE} key exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1176}, year = {2016}, url = {http://eprint.iacr.org/2016/1176}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DingARF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DinuPUVGB16, author = {Daniel Dinu and L{\'{e}}o Perrin and Aleksei Udovenko and Vesselin Velichkov and Johann Gro{\ss}sch{\"{a}}dl and Alex Biryukov}, title = {Design Strategies for {ARX} with Provable Bounds: {SPARX} and {LAX} (Full Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {984}, year = {2016}, url = {http://eprint.iacr.org/2016/984}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DinuPUVGB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dinur16, author = {Itai Dinur}, title = {New Attacks on the Concatenation and {XOR} Hash Combiners}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {131}, year = {2016}, url = {http://eprint.iacr.org/2016/131}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dinur16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DinurDKS16, author = {Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {Memory-Efficient Algorithms for Finding Needles in Haystacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {560}, year = {2016}, url = {http://eprint.iacr.org/2016/560}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DinurDKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DittlerTDS16, author = {Tim Dittler and Florian Tschorsch and Stefan Dietzel and Bj{\"{o}}rn Scheuermann}, title = {{ANOTEL:} Cellular Networks with Location Privacy (Extended Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {764}, year = {2016}, url = {http://eprint.iacr.org/2016/764}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DittlerTDS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEKLM16, author = {Christoph Dobraunig and Maria Eichlseder and Thomas Korak and Victor Lomn{\'{e}} and Florian Mendel}, title = {Practical Fault Attacks on Authenticated Encryption Modes for {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {616}, year = {2016}, url = {http://eprint.iacr.org/2016/616}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEKLM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEKM16, author = {Christoph Dobraunig and Maria Eichlseder and Thomas Korak and Florian Mendel}, title = {Side-Channel Analysis of Keymill}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {793}, year = {2016}, url = {http://eprint.iacr.org/2016/793}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEKM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEM16, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, title = {Cryptanalysis of Simpira}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {244}, year = {2016}, url = {http://eprint.iacr.org/2016/244}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEM16a, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, title = {Square Attack on 7-Round Kiasu-BC}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {326}, year = {2016}, url = {http://eprint.iacr.org/2016/326}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEM16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEM16b, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, title = {Analysis of {SHA-512/224} and {SHA-512/256}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {374}, year = {2016}, url = {http://eprint.iacr.org/2016/374}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEM16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEM16c, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, title = {Key Recovery for {MANTIS-5}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {754}, year = {2016}, url = {http://eprint.iacr.org/2016/754}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEM16c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigEMMU16, author = {Christoph Dobraunig and Maria Eichlseder and Stefan Mangard and Florian Mendel and Thomas Unterluggauer}, title = {{ISAP} - Authenticated Encryption Inherently Secure Against Passive Side-Channel Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {952}, year = {2016}, url = {http://eprint.iacr.org/2016/952}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigEMMU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobraunigL16, author = {Christoph Dobraunig and Eik List}, title = {Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1170}, year = {2016}, url = {http://eprint.iacr.org/2016/1170}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobraunigL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisGGJR16, author = {Yevgeniy Dodis and Chaya Ganesh and Alexander Golovnev and Ari Juels and Thomas Ristenpart}, title = {A Formal Treatment of Backdoored Pseudorandom Generators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {306}, year = {2016}, url = {http://eprint.iacr.org/2016/306}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisGGJR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisHRW16, author = {Yevgeniy Dodis and Shai Halevi and Ron D. Rothblum and Daniel Wichs}, title = {Spooky Encryption and its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {272}, year = {2016}, url = {http://eprint.iacr.org/2016/272}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisHRW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DoernerES16, author = {Jack Doerner and David Evans and Abhi Shelat}, title = {Secure Stable Matching at Scale}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {861}, year = {2016}, url = {http://eprint.iacr.org/2016/861}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DoernerES16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DongS16, author = {Xiaoyang Dong and Yanzhao Shen}, title = {Cryptanalysis of Reduced-Round Midori64 Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {676}, year = {2016}, url = {http://eprint.iacr.org/2016/676}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DongS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DongW16, author = {Xiaoyang Dong and Xiaoyun Wang}, title = {Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {509}, year = {2016}, url = {http://eprint.iacr.org/2016/509}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DongW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DoreyCE16, author = {Kristen Dorey and Nicholas Chang{-}Fong and Aleksander Essex}, title = {Indiscreet Logs: Persistent Diffie-Hellman Backdoors in {TLS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {999}, year = {2016}, url = {http://eprint.iacr.org/2016/999}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DoreyCE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DorozS16, author = {Yarkin Dor{\"{o}}z and Berk Sunar}, title = {Flattening {NTRU} for Evaluation Key Free Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {315}, year = {2016}, url = {http://eprint.iacr.org/2016/315}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DorozS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingG0MM16, author = {Nico D{\"{o}}ttling and Sanjam Garg and Divya Gupta and Peihan Miao and Pratyay Mukherjee}, title = {Obfuscation from Low Noise Multilinear Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {599}, year = {2016}, url = {http://eprint.iacr.org/2016/599}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingG0MM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingKMN16, author = {Nico D{\"{o}}ttling and Daniel Kraschewski and J{\"{o}}rn M{\"{u}}ller{-}Quade and Tobias Nilges}, title = {From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {201}, year = {2016}, url = {http://eprint.iacr.org/2016/201}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingKMN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DowlingFGS16, author = {Benjamin Dowling and Marc Fischlin and Felix G{\"{u}}nther and Douglas Stebila}, title = {A Cryptographic Analysis of the {TLS} 1.3 draft-10 Full and Pre-shared Key Handshake Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {81}, year = {2016}, url = {http://eprint.iacr.org/2016/081}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DowlingFGS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DowlingGHS16, author = {Benjamin Dowling and Felix G{\"{u}}nther and Udyani Herath and Douglas Stebila}, title = {Secure Logging Schemes and Certificate Transparency}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {452}, year = {2016}, url = {http://eprint.iacr.org/2016/452}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DowlingGHS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuB16, author = {Chaohui Du and Guoqiang Bai}, title = {A Family of Scalable Polynomial Multiplier Architectures for Ring-LWE Based Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {323}, year = {2016}, url = {http://eprint.iacr.org/2016/323}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DubrovaT16, author = {Elena Dubrova and Maxim Teslenko}, title = {A SAT-Based Algorithm for Finding Short Cycles in Shift Register Based Stream Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1068}, year = {2016}, url = {http://eprint.iacr.org/2016/1068}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DubrovaT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DucasS16, author = {L{\'{e}}o Ducas and Damien Stehl{\'{e}}}, title = {Sanitization of {FHE} Ciphertexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {164}, year = {2016}, url = {http://eprint.iacr.org/2016/164}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DucasS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DucasW16, author = {L{\'{e}}o Ducas and Wessel P. J. van Woerden}, title = {The closest vector problem in tensored root lattices of type {A} and in their duals}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {910}, year = {2016}, url = {http://eprint.iacr.org/2016/910}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DucasW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DugardinGDNR16, author = {Margaux Dugardin and Sylvain Guilley and Jean{-}Luc Danger and Zakaria Najm and Olivier Rioul}, title = {Correlated Extra-Reductions Defeat Blinded Regular Exponentiation - Extended Version}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {597}, year = {2016}, url = {http://eprint.iacr.org/2016/597}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DugardinGDNR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DulekSS16, author = {Yfke Dulek and Christian Schaffner and Florian Speelman}, title = {Quantum homomorphic encryption for polynomial-sized circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {559}, year = {2016}, url = {http://eprint.iacr.org/2016/559}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DulekSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuongFVZ16, author = {Tuyet Duong and Lei Fan and Thomas Veale and Hong{-}Sheng Zhou}, title = {Securing Bitcoin-like Backbone Protocols against a Malicious Majority of Computing Power}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {716}, year = {2016}, url = {http://eprint.iacr.org/2016/716}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DuongFVZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuongPT16, author = {Dung Hoang Duong and Albrecht Petzoldt and Tsuyoshi Takagi}, title = {Reducing the Key Size of the {SRP} Encryption Scheme - Extended version}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {383}, year = {2016}, url = {http://eprint.iacr.org/2016/383}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuongPT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuongPWT16, author = {Dung Hoang Duong and Albrecht Petzoldt and Yacheng Wang and Tsuyoshi Takagi}, title = {Revisiting the Cubic {UOV} Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1079}, year = {2016}, url = {http://eprint.iacr.org/2016/1079}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuongPWT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DurakDC16, author = {F. Bet{\"{u}}l Durak and Thomas DuBuisson and David Cash}, title = {What Else is Revealed by Order-Revealing Encryption?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {786}, year = {2016}, url = {http://eprint.iacr.org/2016/786}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DurakDC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuttaBA16, author = {Sabyasachi Dutta and Tamal Bhore and Avishek Adhikari}, title = {Efficient Construction of Visual Cryptographic Scheme for Compartmented Access Structures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1113}, year = {2016}, url = {http://eprint.iacr.org/2016/1113}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuttaBA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuttaJN16, author = {Avijit Dutta and Ashwin Jha and Mridul Nandi}, title = {Exact Security Analysis of Hash-then-Mask Type Probabilistic {MAC} Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {983}, year = {2016}, url = {http://eprint.iacr.org/2016/983}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuttaJN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuvalLR16, author = {S{\'{e}}bastien Duval and Virginie Lallemand and Yann Rotella}, title = {Cryptanalysis of the {FLIP} Family of Stream Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {271}, year = {2016}, url = {http://eprint.iacr.org/2016/271}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuvalLR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DwivediKMNPW16, author = {Ashutosh Dhar Dwivedi and Milos Kloucek and Pawel Morawiecki and Ivica Nikolic and Josef Pieprzyk and Sebastian W{\'{o}}jtowicz}, title = {SAT-based Cryptanalysis of Authenticated Ciphers from the {CAESAR} Competition}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1053}, year = {2016}, url = {http://eprint.iacr.org/2016/1053}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DwivediKMNPW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DworkNR16, author = {Cynthia Dwork and Moni Naor and Guy N. Rothblum}, title = {Spooky Interaction and its Discontents: Compilers for Succinct Two-Message Argument Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {291}, year = {2016}, url = {http://eprint.iacr.org/2016/291}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DworkNR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DziembowskiFHJM16, author = {Stefan Dziembowski and Sebastian Faust and Gottfried Herold and Anthony Journault and Daniel Masny and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Towards Sound Fresh Re-Keying with Hard (Physical) Learning Problems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {573}, year = {2016}, url = {http://eprint.iacr.org/2016/573}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DziembowskiFHJM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DziembowskiFS16, author = {Stefan Dziembowski and Sebastian Faust and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Private Circuits {III:} Hardware Trojan-Resilience via Testing Amplification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1004}, year = {2016}, url = {http://eprint.iacr.org/2016/1004}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DziembowskiFS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EgbertCO16, author = {Andrew Egbert and Brad Chun and Thomas Otte}, title = {Identity Chains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {469}, year = {2016}, url = {http://eprint.iacr.org/2016/469}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EgbertCO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ekera16, author = {Martin Eker{\aa}}, title = {Modifying Shor's algorithm to compute short discrete logarithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1128}, year = {2016}, url = {http://eprint.iacr.org/2016/1128}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ekera16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EspitauFGK16, author = {Thomas Espitau and Pierre{-}Alain Fouque and Alexandre G{\'{e}}lin and Paul Kirchner}, title = {Computing generator in cyclotomic integer rings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {957}, year = {2016}, url = {http://eprint.iacr.org/2016/957}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EspitauFGK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EspitauFGT16, author = {Thomas Espitau and Pierre{-}Alain Fouque and Beno{\^{\i}}t G{\'{e}}rard and Mehdi Tibouchi}, title = {Loop abort Faults on Lattice-Based Fiat-Shamir {\&} Hash'n Sign signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {449}, year = {2016}, url = {http://eprint.iacr.org/2016/449}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EspitauFGT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EspitauJ16, author = {Thomas Espitau and Antoine Joux}, title = {Adaptive precision {LLL} and Potential-LLL reductions with Interval arithmetic}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {528}, year = {2016}, url = {http://eprint.iacr.org/2016/528}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EspitauJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EtemadK16, author = {Mohammad Etemad and Alptekin K{\"{u}}p{\c{c}}{\"{u}}}, title = {A Generic Dynamic Provable Data Possession Framework}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {748}, year = {2016}, url = {http://eprint.iacr.org/2016/748}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EtemadK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FanGM16, author = {Xiong Fan and Juan A. Garay and Payman Mohassel}, title = {Short and Adjustable Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {549}, year = {2016}, url = {http://eprint.iacr.org/2016/549}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FanGM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FanL16, author = {Xiong Fan and Feng{-}Hao Liu}, title = {Various Proxy Re-Encryption Schemes from Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {278}, year = {2016}, url = {http://eprint.iacr.org/2016/278}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FanL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaonioN16, author = {Antonio Faonio and Jesper Buus Nielsen}, title = {Non-Malleable Codes with Split-State Refresh}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1192}, year = {2016}, url = {http://eprint.iacr.org/2016/1192}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FaonioN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaonioV16, author = {Antonio Faonio and Daniele Venturi}, title = {Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {529}, year = {2016}, url = {http://eprint.iacr.org/2016/529}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FaonioV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FarrasRR16, author = {Oriol Farr{\`{a}}s and Jordi Ribes{-}Gonz{\'{a}}lez and Sara Ricci}, title = {Bounds on the Information Ratios of Secret Sharing Schemes for Close Access Structures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {726}, year = {2016}, url = {http://eprint.iacr.org/2016/726}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FarrasRR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FarshimM16, author = {Pooya Farshim and Arno Mittelbach}, title = {Modeling Random Oracles under Unpredictable Queries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {423}, year = {2016}, url = {http://eprint.iacr.org/2016/423}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FarshimM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FauziL016, author = {Prastudy Fauzi and Helger Lipmaa and Michal Zajac}, title = {A Shuffle Argument Secure in the Generic Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {866}, year = {2016}, url = {http://eprint.iacr.org/2016/866}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FauziL016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FehrF16, author = {Serge Fehr and Max Fillinger}, title = {On the Composition of Two-Prover Commitments, and Applications to Multi-Round Relativistic Commitments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {113}, year = {2016}, url = {http://eprint.iacr.org/2016/113}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FehrF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FeitenS16, author = {Linus Feiten and Matthias Sauer}, title = {Extracting the {RC4} secret key of the Open Smart Grid Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {455}, year = {2016}, url = {http://eprint.iacr.org/2016/455}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FeitenS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FeitenSB16, author = {Linus Feiten and Matthias Sauer and Bernd Becker}, title = {On Metrics to Quantify the Inter-Device Uniqueness of PUFs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {320}, year = {2016}, url = {http://eprint.iacr.org/2016/320}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FeitenSB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FernandoRS16, author = {Rex Fernando and Peter M. R. Rasmussen and Amit Sahai}, title = {Preventing {CLT} Zeroizing Attacks on Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1070}, year = {2016}, url = {http://eprint.iacr.org/2016/1070}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FernandoRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FerradiGMNP16, author = {Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and Diana Maimut and David Naccache and David Pointcheval}, title = {Legally Fair Contract Signing Without Keystones}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {363}, year = {2016}, url = {http://eprint.iacr.org/2016/363}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FerradiGMNP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FerradiGN16, author = {Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and David Naccache}, title = {Slow Motion Zero Knowledge Identifying With Colliding Commitments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {399}, year = {2016}, url = {http://eprint.iacr.org/2016/399}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FerradiGN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FerradiGN16a, author = {Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and David Naccache}, title = {Human Public-Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {763}, year = {2016}, url = {http://eprint.iacr.org/2016/763}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FerradiGN16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FillingerS16, author = {Max Fillinger and Marc Stevens}, title = {Reverse-Engineering of the Cryptanalytic Attack Used in the Flame Super-Malware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {298}, year = {2016}, url = {http://eprint.iacr.org/2016/298}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FillingerS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FioreFGKOP16, author = {Dario Fiore and C{\'{e}}dric Fournet and Esha Ghosh and Markulf Kohlweiss and Olga Ohrimenko and Bryan Parno}, title = {Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {985}, year = {2016}, url = {http://eprint.iacr.org/2016/985}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FioreFGKOP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FioreMNP16, author = {Dario Fiore and Aikaterini Mitrokotsa and Luca Nizzardo and Elena Pagnin}, title = {Multi-Key Homomorphic Authenticators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {804}, year = {2016}, url = {http://eprint.iacr.org/2016/804}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FioreMNP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FioreN16, author = {Dario Fiore and Anca Nitulescu}, title = {On the (In)security of SNARKs in the Presence of Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {112}, year = {2016}, url = {http://eprint.iacr.org/2016/112}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FioreN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FischlinHNS16, author = {Marc Fischlin and Amir Herzberg and Hod Bin Noon and Haya Schulmann}, title = {Obfuscation Combiners}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {289}, year = {2016}, url = {http://eprint.iacr.org/2016/289}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FischlinHNS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FischlinLP16, author = {Marc Fischlin and Anja Lehmann and Krzysztof Pietrzak}, title = {Robust Multi-Property Combiners for Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {723}, year = {2016}, url = {http://eprint.iacr.org/2016/723}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FischlinLP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Flori16, author = {Jean{-}Pierre Flori}, title = {A conjecture about Gauss sums and bentness of binomial Boolean functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {767}, year = {2016}, url = {http://eprint.iacr.org/2016/767}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Flori16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Fluhrer16, author = {Scott R. Fluhrer}, title = {Cryptanalysis of ring-LWE based key exchange with key share reuse}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {85}, year = {2016}, url = {http://eprint.iacr.org/2016/085}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Fluhrer16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ForlerLLW16, author = {Christian Forler and Eik List and Stefan Lucks and Jakob Wenzel}, title = {Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {395}, year = {2016}, url = {http://eprint.iacr.org/2016/395}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ForlerLLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ForteRS16, author = {Pasquale Forte and Diego Romano and Giovanni Schmid}, title = {Beyond Bitcoin - Part {II:} Blockchain-based systems without mining}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {747}, year = {2016}, url = {http://eprint.iacr.org/2016/747}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ForteRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FouotsaMP16, author = {Emmanuel Fouotsa and Nadia El Mrabet and Aminatou Pecha}, title = {Optimal Ate Pairing on Elliptic Curves with Embedding Degree 9, 15 and 27}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1187}, year = {2016}, url = {http://eprint.iacr.org/2016/1187}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FouotsaMP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FouqueKKM16, author = {Pierre{-}Alain Fouque and Pierre Karpman and Paul Kirchner and Brice Minaud}, title = {Efficient and Provable White-Box Primitives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {642}, year = {2016}, url = {http://eprint.iacr.org/2016/642}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FouqueKKM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FouqueOR16, author = {Pierre{-}Alain Fouque and Cristina Onete and Benjamin Richard}, title = {Achieving Better Privacy for the 3GPP {AKA} Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {480}, year = {2016}, url = {http://eprint.iacr.org/2016/480}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FouqueOR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FriedGHT16, author = {Joshua Fried and Pierrick Gaudry and Nadia Heninger and Emmanuel Thom{\'{e}}}, title = {A kilobit hidden {SNFS} discrete logarithm computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {961}, year = {2016}, url = {http://eprint.iacr.org/2016/961}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FriedGHT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuWGSH16, author = {Kai Fu and Meiqin Wang and Yinghua Guo and Siwei Sun and Lei Hu}, title = {MILP-Based Automatic Search Algorithms for Diff erential and Linear Trails for Speck}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {407}, year = {2016}, url = {http://eprint.iacr.org/2016/407}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuWGSH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuchsbauerHKS16, author = {Georg Fuchsbauer and Christian Hanser and Chethan Kamath and Daniel Slamanig}, title = {Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {662}, year = {2016}, url = {http://eprint.iacr.org/2016/662}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuchsbauerHKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuchsbauerJP16, author = {Georg Fuchsbauer and Zahra Jafargholi and Krzysztof Pietrzak}, title = {A Quasipolynomial Reduction for Generalized Selective Decryption on Trees}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {389}, year = {2016}, url = {http://eprint.iacr.org/2016/389}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuchsbauerJP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FujimotoBND16, author = {Daisuke Fujimoto and Shivam Bhasin and Makoto Nagata and Jean{-}Luc Danger}, title = {A Novel Methodology for Testing Hardware Security and Trust Exploiting On-Chip Power Noise Measurements (Extended Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {522}, year = {2016}, url = {http://eprint.iacr.org/2016/522}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FujimotoBND16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Fujisaki16, author = {Eiichiro Fujisaki}, title = {Improving Practical UC-Secure Commitments based on the {DDH} Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {656}, year = {2016}, url = {http://eprint.iacr.org/2016/656}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Fujisaki16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FurukawaLNW16, author = {Jun Furukawa and Yehuda Lindell and Ariel Nof and Or Weinstein}, title = {High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {944}, year = {2016}, url = {http://eprint.iacr.org/2016/944}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FurukawaLNW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GabrisS16, author = {Martin G{\'{a}}bris and Martin Stanek}, title = {State recovery of {RC4} and Spritz Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {337}, year = {2016}, url = {http://eprint.iacr.org/2016/337}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GabrisS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GadiyarP16, author = {H. Gopalakrishna Gadiyar and R. Padma}, title = {The Discrete Logarithm Problem over Prime Fields can be transformed to a Linear Multivariable Chinese Remainder Theorem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {836}, year = {2016}, url = {http://eprint.iacr.org/2016/836}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GadiyarP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithGM16, author = {Steven D. Galbraith and Shishay W. Gebregiyorgis and Sean Murphy}, title = {Algorithms for the Approximate Common Divisor Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {215}, year = {2016}, url = {http://eprint.iacr.org/2016/215}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithGM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithLS16, author = {Steven D. Galbraith and Joel Laity and Barak Shani}, title = {Finding Significant Fourier Coefficients: Clarifications, Simplifications, Applications and Limitations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {682}, year = {2016}, url = {http://eprint.iacr.org/2016/682}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithPS16, author = {Steven D. Galbraith and Christophe Petit and Javier Silva}, title = {Signature Schemes Based On Supersingular Isogeny Problems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1154}, year = {2016}, url = {http://eprint.iacr.org/2016/1154}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithPST16, author = {Steven D. Galbraith and Christophe Petit and Barak Shani and Yan Bo Ti}, title = {On the Security of Supersingular Isogeny Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {859}, year = {2016}, url = {http://eprint.iacr.org/2016/859}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithPST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gallegos-Garcia16, author = {Gina Gallegos{-}Garc{\'{\i}}a and Vincenzo Iovino and Alfredo Rial and Peter B. R{\o}nne and Peter Y. A. Ryan}, title = {(Universal) Unconditional Verifiability in E-Voting without Trusted Parties}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {975}, year = {2016}, url = {http://eprint.iacr.org/2016/975}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gallegos-Garcia16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaltelandMO16, author = {Herman Galteland and Stig Fr. Mj{\o}lsnes and Ruxandra F. Olimid}, title = {Attacks on cMix - Some Small Overlooked Details}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {729}, year = {2016}, url = {http://eprint.iacr.org/2016/729}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaltelandMO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GanjiTFS16, author = {Fatemeh Ganji and Shahin Tajik and Fabian F{\"{a}}{\ss}ler and Jean{-}Pierre Seifert}, title = {Strong Machine Learning Attack against PUFs with No Mathematical Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {606}, year = {2016}, url = {http://eprint.iacr.org/2016/606}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GanjiTFS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaoCWFCM16, author = {Si Gao and Hua Chen and Wenling Wu and Limin Fan and Weiqiong Cao and Xiangliang Ma}, title = {My traces learn what you did in the dark: recovering secret signals without key guesses}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1082}, year = {2016}, url = {http://eprint.iacr.org/2016/1082}, timestamp = {Fri, 04 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaoCWFCM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarayKL16, author = {Juan A. Garay and Aggelos Kiayias and Nikos Leonardos}, title = {The Bitcoin Backbone Protocol with Chains of Variable Difficulty}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1048}, year = {2016}, url = {http://eprint.iacr.org/2016/1048}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarayKL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarayKLP16, author = {Juan A. Garay and Aggelos Kiayias and Nikos Leonardos and Giorgos Panagiotakos}, title = {Bootstrapping the Blockchain - Directly}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {991}, year = {2016}, url = {http://eprint.iacr.org/2016/991}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarayKLP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Garcia-MorchonR16, author = {{\'{O}}scar Garc{\'{\i}}a{-}Morch{\'{o}}n and Ronald Rietman and Ludo Tolhuizen and Jose Luis Torre{-}Arce and Sauvik Bhattacharya and Maarten P. Bodlaender}, title = {Efficient quantum-resistant trust Infrastructure based on {HIMMO}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {410}, year = {2016}, url = {http://eprint.iacr.org/2016/410}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Garcia-MorchonR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarciaB16, author = {Cesar Pereida Garc{\'{\i}}a and Billy Bob Brumley}, title = {Constant-Time Callees with Variable-Time Callers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1195}, year = {2016}, url = {http://eprint.iacr.org/2016/1195}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarciaB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarciaBY16, author = {Cesar Pereida Garc{\'{\i}}a and Billy Bob Brumley and Yuval Yarom}, title = {"Make Sure {DSA} Signing Exponentiations Really are Constant-Time"}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {594}, year = {2016}, url = {http://eprint.iacr.org/2016/594}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarciaBY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Garg0MP16, author = {Sanjam Garg and Divya Gupta and Peihan Miao and Omkant Pandey}, title = {Secure Multiparty {RAM} Computation in Constant Rounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {815}, year = {2016}, url = {http://eprint.iacr.org/2016/815}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Garg0MP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargMMSSZ16, author = {Sanjam Garg and Eric Miles and Pratyay Mukherjee and Amit Sahai and Akshayaram Srinivasan and Mark Zhandry}, title = {Secure Obfuscation in a Weak Multilinear Map Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {817}, year = {2016}, url = {http://eprint.iacr.org/2016/817}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargMMSSZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargMPP16, author = {Sanjam Garg and Pratyay Mukherjee and Omkant Pandey and Antigoni Polychroniadou}, title = {The Exact Round Complexity of Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {252}, year = {2016}, url = {http://eprint.iacr.org/2016/252}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargMPP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargMS16, author = {Sanjam Garg and Pratyay Mukherjee and Akshayaram Srinivasan}, title = {Obfuscation without the Vulnerabilities of Multilinear Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {390}, year = {2016}, url = {http://eprint.iacr.org/2016/390}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargPSZ16, author = {Sanjam Garg and Omkant Pandey and Akshayaram Srinivasan and Mark Zhandry}, title = {Breaking the Sub-Exponential Barrier in Obfustopia}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {102}, year = {2016}, url = {http://eprint.iacr.org/2016/102}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargPSZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargS16, author = {Sanjam Garg and Akshayaram Srinivasan}, title = {Unifying Security Notions of Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {524}, year = {2016}, url = {http://eprint.iacr.org/2016/524}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Garman0M16, author = {Christina Garman and Matthew Green and Ian Miers}, title = {Accountable Privacy for Decentralized Anonymous Payments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {61}, year = {2016}, url = {http://eprint.iacr.org/2016/061}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Garman0M16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GasconSB0DZE16, author = {Adri{\`{a}} Gasc{\'{o}}n and Phillipp Schoppmann and Borja Balle and Mariana Raykova and Jack Doerner and Samee Zahur and David Evans}, title = {Secure Linear Regression on Vertically Partitioned Datasets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {892}, year = {2016}, url = {http://eprint.iacr.org/2016/892}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GasconSB0DZE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaudryGV16, author = {Pierrick Gaudry and Laurent Gr{\'{e}}my and Marion Videau}, title = {Collecting relations for the Number Field Sieve in GF(p\({}^{\mbox{6)}}\)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {124}, year = {2016}, url = {http://eprint.iacr.org/2016/124}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaudryGV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gavin16, author = {G{\'{e}}rald Gavin}, title = {An efficient somewhat homomorphic encryption scheme based on factorization}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {897}, year = {2016}, url = {http://eprint.iacr.org/2016/897}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gavin16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GawelKVWZ16, author = {Dawid Gawel and Maciej Kosarzecki and Poorvi L. Vora and Hua Wu and Filip Zag{\'{o}}rski}, title = {Apollo - End-to-end Verifiable Internet Voting with Recovery from Vote Manipulation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1037}, year = {2016}, url = {http://eprint.iacr.org/2016/1037}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GawelKVWZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gay16, author = {Romain Gay}, title = {Functional Encryption for Quadratic Functions, and Applications to Predicate Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1106}, year = {2016}, url = {http://eprint.iacr.org/2016/1106}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gay16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GayHKW16, author = {Romain Gay and Dennis Hofheinz and Eike Kiltz and Hoeteck Wee}, title = {Tightly Secure CCA-Secure Encryption without Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {94}, year = {2016}, url = {http://eprint.iacr.org/2016/094}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GayHKW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaziT16, author = {Peter Gazi and Stefano Tessaro}, title = {Provably Robust Sponge-Based PRNGs and KDFs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {169}, year = {2016}, url = {http://eprint.iacr.org/2016/169}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaziT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GeYCH16, author = {Qian Ge and Yuval Yarom and David A. Cock and Gernot Heiser}, title = {A Survey of Microarchitectural Timing Attacks and Countermeasures on Contemporary Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {613}, year = {2016}, url = {http://eprint.iacr.org/2016/613}, timestamp = {Wed, 21 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GeYCH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GelernterHL16, author = {Nethanel Gelernter and Amir Herzberg and Hemi Leibowitz}, title = {Two Cents for Strong Anonymity: The Anonymous Post-office Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {489}, year = {2016}, url = {http://eprint.iacr.org/2016/489}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GelernterHL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GelinJ16, author = {Alexandre G{\'{e}}lin and Antoine Joux}, title = {Reducing number field defining polynomials: An application to class group computations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {531}, year = {2016}, url = {http://eprint.iacr.org/2016/531}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GelinJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GelinKL16, author = {Alexandre G{\'{e}}lin and Thorsten Kleinjung and Arjen K. Lenstra}, title = {Parametrizations for Families of ECM-friendly curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1092}, year = {2016}, url = {http://eprint.iacr.org/2016/1092}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GelinKL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GenkinIW16, author = {Daniel Genkin and Yuval Ishai and Mor Weiss}, title = {Binary {AMD} Circuits from Secure Multiparty Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {809}, year = {2016}, url = {http://eprint.iacr.org/2016/809}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GenkinIW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GenkinPPT16, author = {Daniel Genkin and Lev Pachmanov and Itamar Pipman and Eran Tromer}, title = {{ECDH} Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {129}, year = {2016}, url = {http://eprint.iacr.org/2016/129}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GenkinPPT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GenkinPPTY16, author = {Daniel Genkin and Lev Pachmanov and Itamar Pipman and Eran Tromer and Yuval Yarom}, title = {{ECDSA} Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {230}, year = {2016}, url = {http://eprint.iacr.org/2016/230}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GenkinPPTY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GennaroGN16, author = {Rosario Gennaro and Steven Goldfeder and Arvind Narayanan}, title = {Threshold-optimal {DSA/ECDSA} signatures and an application to Bitcoin wallet security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {13}, year = {2016}, url = {http://eprint.iacr.org/2016/013}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GennaroGN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GervaisFLC16, author = {Arthur Gervais and Alexandros Filios and Vincent Lenders and Srdjan Capkun}, title = {Quantifying Web Adblocker Privacy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {900}, year = {2016}, url = {http://eprint.iacr.org/2016/900}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GervaisFLC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GervaisKWGRC16, author = {Arthur Gervais and Ghassan O. Karame and Karl W{\"{u}}st and Vasileios Glykantzis and Hubert Ritzdorf and Srdjan Capkun}, title = {On the Security and Performance of Proof of Work Blockchains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {555}, year = {2016}, url = {http://eprint.iacr.org/2016/555}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GervaisKWGRC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ghadafi16, author = {Essam Ghadafi}, title = {More Efficient Structure-Preserving Signatures - Or: Bypassing the Type-III Lower Bounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {255}, year = {2016}, url = {http://eprint.iacr.org/2016/255}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ghadafi16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhammamF16, author = {Loubna Ghammam and Emmanuel Fouotsa}, title = {On the Computation of the Optimal Ate Pairing at the 192-bit Security Level}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {130}, year = {2016}, url = {http://eprint.iacr.org/2016/130}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GhammamF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhammamF16a, author = {Loubna Ghammam and Emmanuel Fouotsa}, title = {Adequate Elliptic Curve for Computing the Product of n Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {472}, year = {2016}, url = {http://eprint.iacr.org/2016/472}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GhammamF16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhandaliBHP16, author = {Samaneh Ghandali and Georg T. Becker and Daniel E. Holcomb and Christof Paar}, title = {A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {600}, year = {2016}, url = {http://eprint.iacr.org/2016/600}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GhandaliBHP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GiacomelliMO16, author = {Irene Giacomelli and Jesper Madsen and Claudio Orlandi}, title = {ZKBoo: Faster Zero-Knowledge for Boolean Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {163}, year = {2016}, url = {http://eprint.iacr.org/2016/163}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GiacomelliMO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GiechaskielCR16, author = {Ilias Giechaskiel and Cas Cremers and Kasper Bonne Rasmussen}, title = {On Bitcoin Security in the Presence of Broken Crypto Primitives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {167}, year = {2016}, url = {http://eprint.iacr.org/2016/167}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GiechaskielCR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gilad-BachrachL16, author = {Ran Gilad{-}Bachrach and Kim Laine and Kristin E. Lauter and Peter Rindal and Mike Rosulek}, title = {Secure Data Exchange: {A} Marketplace in the Cloud}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {620}, year = {2016}, url = {http://eprint.iacr.org/2016/620}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gilad-BachrachL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GiladCHSS16, author = {Yossi Gilad and Avichai Cohen and Amir Herzberg and Michael Schapira and Haya Schulmann}, title = {Are We There Yet? On RPKI's Deployment and Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1010}, year = {2016}, url = {http://eprint.iacr.org/2016/1010}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GiladCHSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GiladSG16, author = {Yossi Gilad and Omar Sagga and Sharon Goldberg}, title = {MaxLength Considered Harmful to the {RPKI}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1015}, year = {2016}, url = {http://eprint.iacr.org/2016/1015}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GiladSG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gjosteen016, author = {Kristian Gj{\o}steen and Martin Strand}, title = {Fully homomorphic encryption must be fat or ugly?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {105}, year = {2016}, url = {http://eprint.iacr.org/2016/105}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gjosteen016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GligoroskiS16, author = {Danilo Gligoroski and Simona Samardjiska}, title = {Semantic Security and Key-Privacy With Random Split of St-Gen Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {218}, year = {2016}, url = {http://eprint.iacr.org/2016/218}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GligoroskiS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GligoroskiS16a, author = {Danilo Gligoroski and Simona Samardjiska}, title = {A Digital Signature Scheme Based on Random Split of St-Gen Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {391}, year = {2016}, url = {http://eprint.iacr.org/2016/391}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GligoroskiS16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldbergNPR16, author = {Sharon Goldberg and Moni Naor and Dimitrios Papadopoulos and Leonid Reyzin}, title = {{NSEC5} from Elliptic Curves: Provably Preventing {DNSSEC} Zone Enumeration with Shorter Responses}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {83}, year = {2016}, url = {http://eprint.iacr.org/2016/083}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GoldbergNPR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldfederCZ16, author = {Steven Goldfeder and Melissa Chase and Greg Zaverucha}, title = {Efficient Post-Quantum Zero-Knowledge and Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1110}, year = {2016}, url = {http://eprint.iacr.org/2016/1110}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoldfederCZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GologluRW16, author = {Faruk G{\"{o}}loglu and Vincent Rijmen and Qingju Wang}, title = {On the division property of S-boxes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {188}, year = {2016}, url = {http://eprint.iacr.org/2016/188}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GologluRW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GongD0C16, author = {Junqing Gong and Xiaolei Dong and Jie Chen and Zhenfu Cao}, title = {Efficient {IBE} with Tight Reduction to Standard Assumption in the Multi-challenge Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {860}, year = {2016}, url = {http://eprint.iacr.org/2016/860}, timestamp = {Thu, 07 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GongD0C16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GongZ16, author = {Boru Gong and Yunlei Zhao}, title = {Small Field Attack, and Revisiting RLWE-Based Authenticated Key Exchange from Eurocrypt'15}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {913}, year = {2016}, url = {http://eprint.iacr.org/2016/913}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GongZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoodrichKMT16, author = {Michael T. Goodrich and Evgenios M. Kornaropoulos and Michael Mitzenmacher and Roberto Tamassia}, title = {More Practical and Secure History-Independent Hash Tables}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {134}, year = {2016}, url = {http://eprint.iacr.org/2016/134}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoodrichKMT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoodrichKMT16a, author = {Michael T. Goodrich and Evgenios M. Kornaropoulos and Michael Mitzenmacher and Roberto Tamassia}, title = {Auditable Data Structures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {755}, year = {2016}, url = {http://eprint.iacr.org/2016/755}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoodrichKMT16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GorbunovV16, author = {Sergey Gorbunov and Dhinakaran Vinayagamurthy}, title = {Functional Encryption from Secure Enclaves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1071}, year = {2016}, url = {http://eprint.iacr.org/2016/1071}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GorbunovV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gorodilova16, author = {Anastasiya Gorodilova}, title = {On a remarkable property of {APN} Gold functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {286}, year = {2016}, url = {http://eprint.iacr.org/2016/286}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gorodilova16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoudarziR16, author = {Dahmun Goudarzi and Matthieu Rivain}, title = {How Fast Can Higher-Order Masking Be in Software?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {264}, year = {2016}, url = {http://eprint.iacr.org/2016/264}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoudarziR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoudarziR16a, author = {Dahmun Goudarzi and Matthieu Rivain}, title = {On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher-Order Masking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {557}, year = {2016}, url = {http://eprint.iacr.org/2016/557}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoudarziR16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalKW16, author = {Rishab Goyal and Venkata Koppula and Brent Waters}, title = {Semi-Adaptive Security and Bundling Functionalities Made Generic and Easy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {317}, year = {2016}, url = {http://eprint.iacr.org/2016/317}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalKW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrassiRR16, author = {Lorenzo Grassi and Christian Rechberger and Sondre R{\o}njom}, title = {Subspace Trail Cryptanalysis and its Applications to {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {592}, year = {2016}, url = {http://eprint.iacr.org/2016/592}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrassiRR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrassiRRSS16, author = {Lorenzo Grassi and Christian Rechberger and Dragos Rotaru and Peter Scholl and Nigel P. Smart}, title = {MPC-Friendly Symmetric Key Primitives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {542}, year = {2016}, url = {http://eprint.iacr.org/2016/542}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrassiRRSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GreenM16, author = {Matthew D. Green and Ian Miers}, title = {Bolt: Anonymous Payment Channels for Decentralized Currencies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {701}, year = {2016}, url = {http://eprint.iacr.org/2016/701}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GreenM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GroceLMY16, author = {Adam Groce and Alex Ledger and Alex J. Malozemoff and Arkady Yerukhimovich}, title = {CompGC: Efficient Offline/Online Semi-honest Two-party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {458}, year = {2016}, url = {http://eprint.iacr.org/2016/458}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GroceLMY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrootPPSB16, author = {Wouter de Groot and Kostas Papagiannopoulos and Antonio de la Piedra and Erik Schneider and Lejla Batina}, title = {Bitsliced Masking and {ARM:} Friends or Foes?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {946}, year = {2016}, url = {http://eprint.iacr.org/2016/946}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrootPPSB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrossJMUW16, author = {Hannes Gro{\ss} and Manuel Jelinek and Stefan Mangard and Thomas Unterluggauer and Mario Werner}, title = {Concealing Secrets in Embedded Processors Designs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {935}, year = {2016}, url = {http://eprint.iacr.org/2016/935}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrossJMUW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrossMK16, author = {Hannes Gro{\ss} and Stefan Mangard and Thomas Korak}, title = {Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {486}, year = {2016}, url = {http://eprint.iacr.org/2016/486}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrossMK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Groth16, author = {Jens Groth}, title = {On the Size of Pairing-based Non-interactive Arguments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {260}, year = {2016}, url = {http://eprint.iacr.org/2016/260}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Groth16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrubbsMNRS16, author = {Paul Grubbs and Richard McPherson and Muhammad Naveed and Thomas Ristenpart and Vitaly Shmatikov}, title = {Breaking Web Applications Built On Top of Encrypted Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {920}, year = {2016}, url = {http://eprint.iacr.org/2016/920}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrubbsMNRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrubbsSB0R16, author = {Paul Grubbs and Kevin Sekniqi and Vincent Bindschaedler and Muhammad Naveed and Thomas Ristenpart}, title = {Leakage-Abuse Attacks against Order-Revealing Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {895}, year = {2016}, url = {http://eprint.iacr.org/2016/895}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrubbsSB0R16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gu16, author = {Chunsheng Gu}, title = {Cryptanalysis of Simple Matrix Scheme for Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1075}, year = {2016}, url = {http://eprint.iacr.org/2016/1075}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gu16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gueron16, author = {Shay Gueron}, title = {A Memory Encryption Engine Suitable for General Purpose Processors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {204}, year = {2016}, url = {http://eprint.iacr.org/2016/204}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gueron16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GueronM16, author = {Shay Gueron and Nicky Mouha}, title = {Simpira v2: {A} Family of Efficient Permutations Using the {AES} Round Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {122}, year = {2016}, url = {http://eprint.iacr.org/2016/122}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GueronM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GueronS16, author = {Shay Gueron and Fabian Schlieker}, title = {Speeding up {R-LWE} post-quantum key exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {467}, year = {2016}, url = {http://eprint.iacr.org/2016/467}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GueronS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuerriniIW16, author = {Eleonora Guerrini and Laurent Imbert and Th{\'{e}}o Winterhalter}, title = {Randomized Mixed-Radix Scalar Multiplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1022}, year = {2016}, url = {http://eprint.iacr.org/2016/1022}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuerriniIW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Guillevic16, author = {Aurore Guillevic}, title = {Faster individual discrete logarithms in non-prime finite fields with the {NFS} and {FFS} algorithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {684}, year = {2016}, url = {http://eprint.iacr.org/2016/684}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Guillevic16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuillevicMT16, author = {Aurore Guillevic and Fran{\c{c}}ois Morain and Emmanuel Thom{\'{e}}}, title = {Solving discrete logarithms on a 170-bit {MNT} curve by pairing reduction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {507}, year = {2016}, url = {http://eprint.iacr.org/2016/507}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuillevicMT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuilleyHR16, author = {Sylvain Guilley and Annelie Heuser and Olivier Rioul}, title = {A Key to Success - Success Exponents for Side-Channel Distinguishers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {987}, year = {2016}, url = {http://eprint.iacr.org/2016/987}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuilleyHR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Guo016, author = {Qian Guo and Thomas Johansson}, title = {A New Birthday-Type Algorithm for Attacking the Fresh Re-Keying Countermeasure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {225}, year = {2016}, url = {http://eprint.iacr.org/2016/225}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Guo016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Guo0S16, author = {Qian Guo and Thomas Johansson and Paul Stankovski}, title = {Coded-BKW: Solving {LWE} Using Lattice Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {310}, year = {2016}, url = {http://eprint.iacr.org/2016/310}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Guo0S16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Guo0S16a, author = {Qian Guo and Thomas Johansson and Paul Stankovski}, title = {A Key Recovery Attack on {MDPC} with {CCA} Security Using Decoding Errors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {858}, year = {2016}, url = {http://eprint.iacr.org/2016/858}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Guo0S16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoJNS16, author = {Jian Guo and J{\'{e}}r{\'{e}}my Jean and Ivica Nikolic and Yu Sasaki}, title = {Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1162}, year = {2016}, url = {http://eprint.iacr.org/2016/1162}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoJNS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoLWL16, author = {Zhiyuan Guo and Renzhang Liu and Wenling Wu and Dongdai Lin}, title = {Direct Construction of Lightweight Rotational-XOR {MDS} Diffusion Layers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1036}, year = {2016}, url = {http://eprint.iacr.org/2016/1036}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoLWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoSMCLY16, author = {Fuchun Guo and Willy Susilo and Yi Mu and Rongmao Chen and Jianchang Lai and Guomin Yang}, title = {Iterated Random Oracle: {A} Universal Approach for Finding Loss in Security Reduction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {872}, year = {2016}, url = {http://eprint.iacr.org/2016/872}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoSMCLY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoWLZ16, author = {Zhiyuan Guo and Wenling Wu and Renzhang Liu and Liting Zhang}, title = {Multi-key Analysis of Tweakable Even-Mansour with Applications to Minalpher and {OPP}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1098}, year = {2016}, url = {http://eprint.iacr.org/2016/1098}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoWLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaaghJLOS16, author = {Helene Haagh and Yue Ji and Chenxing Li and Claudio Orlandi and Yifan Song}, title = {Revealing Encryption for Partial Ordering}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {972}, year = {2016}, url = {http://eprint.iacr.org/2016/972}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaaghJLOS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaberHZ16, author = {Stuart Haber and William G. Horne and Miaomiao Zhang}, title = {Efficient Transparent Redactable Signatures with a Single Signature Invocation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1165}, year = {2016}, url = {http://eprint.iacr.org/2016/1165}, timestamp = {Mon, 11 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaberHZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HalakWI16, author = {Basel Halak and Said Subhan Waizi and Asad Islam}, title = {A Survey of Hardware Implementations of Elliptic Curve Cryptographic Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {712}, year = {2016}, url = {http://eprint.iacr.org/2016/712}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HalakWI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hamann0M16, author = {Matthias Hamann and Matthias Krause and Willi Meier}, title = {{LIZARD} - {A} Lightweight Stream Cipher for Power-constrained Devices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {926}, year = {2016}, url = {http://eprint.iacr.org/2016/926}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hamann0M16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HamlinSSVYY16, author = {Ariel Hamlin and Nabil Schear and Emily Shen and Mayank Varia and Sophia Yakoubov and Arkady Yerukhimovich}, title = {Cryptography for Big Data Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {12}, year = {2016}, url = {http://eprint.iacr.org/2016/012}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HamlinSSVYY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HanLL16, author = {Shuai Han and Shengli Liu and Lin Lyu}, title = {Efficient {KDM-CCA} Secure Public-Key Encryption for Polynomial Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {829}, year = {2016}, url = {http://eprint.iacr.org/2016/829}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HanLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HanLL16a, author = {Shuai Han and Shengli Liu and Lin Lyu}, title = {Super-Strong {RKA} Secure MAC, {PKE} and {SE} from Tag-based Hash Proof System}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1051}, year = {2016}, url = {http://eprint.iacr.org/2016/1051}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HanLL16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HanzlikK16, author = {Lucjan Hanzlik and Kamil Kluczniak}, title = {Security Analysis of ePrint Report 2016/500 "Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups"}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {512}, year = {2016}, url = {http://eprint.iacr.org/2016/512}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HanzlikK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hao16, author = {Yonglin Hao}, title = {Improved Meet-in-the-Middle Attacks on Round-Reduced Crypton-256}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {267}, year = {2016}, url = {http://eprint.iacr.org/2016/267}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hao16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaoM16, author = {Yonglin Hao and Willi Meier}, title = {Truncated Differential Based Known-Key Attacks on Round-Reduced Simon}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {20}, year = {2016}, url = {http://eprint.iacr.org/2016/020}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaoM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hartung16, author = {Gunnar Hartung}, title = {Secure Audit Logs with Verifiable Excerpts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {283}, year = {2016}, url = {http://eprint.iacr.org/2016/283}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hartung16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HartungKKKR16, author = {Gunnar Hartung and Bj{\"{o}}rn Kaidel and Alexander Koch and Jessica Koch and Andy Rupp}, title = {Fault-Tolerant Aggregate Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {52}, year = {2016}, url = {http://eprint.iacr.org/2016/052}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HartungKKKR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hashimoto16, author = {Yasufumi Hashimoto}, title = {A note on Tensor Simple Matrix Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {65}, year = {2016}, url = {http://eprint.iacr.org/2016/065}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hashimoto16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hashimoto16a, author = {Yasufumi Hashimoto}, title = {On the security of new vinegar-like variant of multivariate signature scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {787}, year = {2016}, url = {http://eprint.iacr.org/2016/787}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hashimoto16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hashimoto16b, author = {Yasufumi Hashimoto}, title = {On the security of Cubic {UOV}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {788}, year = {2016}, url = {http://eprint.iacr.org/2016/788}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hashimoto16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HazayV16, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam}, title = {On the Power of Secure Two-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {74}, year = {2016}, url = {http://eprint.iacr.org/2016/074}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HazayV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HazayV16a, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam}, title = {Composable Adaptive Secure Protocols without Setup under Polytime Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {818}, year = {2016}, url = {http://eprint.iacr.org/2016/818}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HazayV16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HazayY16, author = {Carmit Hazay and Avishay Yanai}, title = {Constant-Round Maliciously Secure Two-Party Computation in the {RAM} Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {805}, year = {2016}, url = {http://eprint.iacr.org/2016/805}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HazayY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeYXQ16, author = {Libo He and Chen Yuan and Hu Xiong and Zhiguang Qin}, title = {Certificateless Key Insulated Encryption: Cryptographic Primitive for Achieving Key-escrow free and Key-exposure Resilience}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {501}, year = {2016}, url = {http://eprint.iacr.org/2016/501}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeYXQ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeilmanBASG16, author = {Ethan Heilman and Foteini Baldimtsi and Leen Alshenibr and Alessandra Scafuro and Sharon Goldberg}, title = {TumbleBit: An Untrusted Tumbler for Bitcoin-Compatible Anonymous Payments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {575}, year = {2016}, url = {http://eprint.iacr.org/2016/575}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeilmanBASG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeilmanBG16, author = {Ethan Heilman and Foteini Baldimtsi and Sharon Goldberg}, title = {Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {56}, year = {2016}, url = {http://eprint.iacr.org/2016/056}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeilmanBG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HemenwayLOW16, author = {Brett Hemenway and Steve Lu and Rafail Ostrovsky and William Welser IV}, title = {High-precision Secure Computation of Satellite Collision Probabilities}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {319}, year = {2016}, url = {http://eprint.iacr.org/2016/319}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HemenwayLOW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HemenwayO16, author = {Brett Hemenway and Rafail Ostrovsky}, title = {Efficient Robust Secret Sharing from Expander Graphs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {735}, year = {2016}, url = {http://eprint.iacr.org/2016/735}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HemenwayO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Henry16, author = {Ryan Henry}, title = {Polynomial Batch Codes for Efficient {IT-PIR}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {598}, year = {2016}, url = {http://eprint.iacr.org/2016/598}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Henry16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HerzbergK16, author = {Amir Herzberg and Yehonatan Kfir}, title = {Topology-based Plug-and-Play Key-Setup}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {60}, year = {2016}, url = {http://eprint.iacr.org/2016/060}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HerzbergK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeuerJKS16, author = {Felix Heuer and Tibor Jager and Eike Kiltz and Sven Sch{\"{a}}ge}, title = {On the Selective Opening Security of Practical Public-Key Encryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {342}, year = {2016}, url = {http://eprint.iacr.org/2016/342}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeuerJKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HeuerP16, author = {Felix Heuer and Bertram Poettering}, title = {Selective Opening Security from Simulatable Data Encapsulation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {845}, year = {2016}, url = {http://eprint.iacr.org/2016/845}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HeuerP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HieuK16, author = {Duong Hieu Phan and Neal Koblitz}, title = {Cryptography during the French and American Wars in Vietnam}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1136}, year = {2016}, url = {http://eprint.iacr.org/2016/1136}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HieuK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HigoTYY16, author = {Haruna Higo and Keisuke Tanaka and Akihiro Yamada and Kenji Yasunaga}, title = {Game-Theoretic Security for Two-Party Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1072}, year = {2016}, url = {http://eprint.iacr.org/2016/1072}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HigoTYY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HillerPKS16, author = {Matthias Hiller and Michael Pehl and Gerhard Kramer and Georg Sigl}, title = {Algebraic Security Analysis of Key Generation with Physical Unclonable Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {854}, year = {2016}, url = {http://eprint.iacr.org/2016/854}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HillerPKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hirose16, author = {Shoichi Hirose}, title = {May-Ozerov Algorithm for Nearest-Neighbor Problem over {\(\mathbb{F}\)}\({}_{\mbox{q}}\) and Its Application to Information Set Decoding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {237}, year = {2016}, url = {http://eprint.iacr.org/2016/237}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hirose16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HiroseY16, author = {Shoichi Hirose and Atsushi Yabumoto}, title = {A Tweak for a {PRF} Mode of a Compression Function and Its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {638}, year = {2016}, url = {http://eprint.iacr.org/2016/638}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HiroseY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HirtMTZ16, author = {Martin Hirt and Ueli Maurer and Daniel Tschudi and Vassilis Zikas}, title = {Network-Hiding Communication and Applications to Multi-Party Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {556}, year = {2016}, url = {http://eprint.iacr.org/2016/556}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HirtMTZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoangKOZ16, author = {Viet Tung Hoang and Jonathan Katz and Adam O'Neill and Mohammad Zaheri}, title = {Selective-Opening Security in the Presence of Randomness Failures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {868}, year = {2016}, url = {http://eprint.iacr.org/2016/868}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HoangKOZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoangT16, author = {Viet Tung Hoang and Stefano Tessaro}, title = {Key-alternating Ciphers and Key-length Extension: Exact Bounds and Multi-user Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {578}, year = {2016}, url = {http://eprint.iacr.org/2016/578}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HoangT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hofheinz16, author = {Dennis Hofheinz}, title = {Adaptive partitioning}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {373}, year = {2016}, url = {http://eprint.iacr.org/2016/373}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hofheinz16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HofheinzJR16, author = {Dennis Hofheinz and Tibor Jager and Andy Rupp}, title = {Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {180}, year = {2016}, url = {http://eprint.iacr.org/2016/180}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HofheinzJR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HomsirikamolDFF16, author = {Ekawat Homsirikamol and William Diehl and Ahmed Ferozpuri and Farnoud Farahmand and Panasayya Yalla and Jens{-}Peter Kaps and Kris Gaj}, title = {{CAESAR} Hardware {API}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {626}, year = {2016}, url = {http://eprint.iacr.org/2016/626}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HomsirikamolDFF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuZZW16, author = {Yongbo Hu and Chen Zhang and Yeyang Zheng and Mathias Wagner}, title = {Ciphertext and Plaintext Leakage Reveals the Entire {TDES} Key}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1143}, year = {2016}, url = {http://eprint.iacr.org/2016/1143}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuZZW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuangVLN16, author = {Jialin Huang and Serge Vaudenay and Xuejia Lai and Kaisa Nyberg}, title = {Capacity and Data Complexity in Multidimensional Linear Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {51}, year = {2016}, url = {http://eprint.iacr.org/2016/051}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuangVLN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuangWXWZ16, author = {Senyang Huang and Xiaoyun Wang and Guangwu Xu and Meiqin Wang and Jingyuan Zhao}, title = {Conditional Cube Attack on Reduced-Round Keccak Sponge Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {790}, year = {2016}, url = {http://eprint.iacr.org/2016/790}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuangWXWZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HulsingRSS16, author = {Andreas H{\"{u}}lsing and Joost Rijneveld and Simona Samardjiska and Peter Schwabe}, title = {From 5-pass MQ-based identification to MQ-based signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {708}, year = {2016}, url = {http://eprint.iacr.org/2016/708}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HulsingRSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Hutchinson16, author = {Daniel Hutchinson}, title = {A Robust and Sponge-Like {PRNG} with Improved Efficiency}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {886}, year = {2016}, url = {http://eprint.iacr.org/2016/886}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Hutchinson16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuthBGDG16, author = {Christopher Huth and Daniela Becker and Jorge Guajardo and Paul Duplys and Tim G{\"{u}}neysu}, title = {Securing Systems with Scarce Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the IoT}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {982}, year = {2016}, url = {http://eprint.iacr.org/2016/982}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuthBGDG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HutterSSW16, author = {Michael Hutter and J{\"{u}}rgen Schilling and Peter Schwabe and Wolfgang Wieser}, title = {NaCl's Crypto{\_}Box in Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {330}, year = {2016}, url = {http://eprint.iacr.org/2016/330}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HutterSSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HutterT16, author = {Michael Hutter and Michael Tunstall}, title = {Constant-Time Higher-Order Boolean-to-Arithmetic Masking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1023}, year = {2016}, url = {http://eprint.iacr.org/2016/1023}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HutterT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IgierV16, author = {Mathilde Igier and Serge Vaudenay}, title = {Distance Bounding based on {PUF}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {901}, year = {2016}, url = {http://eprint.iacr.org/2016/901}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IgierV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IkematsuDPT16, author = {Yasuhiko Ikematsu and Dung Hoang Duong and Albrecht Petzoldt and Tsuyoshi Takagi}, title = {Revisiting the Efficient Key Generation of {ZHFE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1065}, year = {2016}, url = {http://eprint.iacr.org/2016/1065}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IkematsuDPT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ImamuraMI16, author = {Kazuya Imamura and Kazuhiko Minematsu and Tetsu Iwata}, title = {Integrity Analysis of Authenticated Encryption Based on Stream Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1124}, year = {2016}, url = {http://eprint.iacr.org/2016/1124}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ImamuraMI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ImpagliazzoJKKK16, author = {Russell Impagliazzo and Ragesh Jaiswal and Valentine Kabanets and Bruce M. Kapron and Valerie King and Stefano Tessaro}, title = {Simultaneous Secrecy and Reliability Amplification for a General Channel Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {760}, year = {2016}, url = {http://eprint.iacr.org/2016/760}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ImpagliazzoJKKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/InciGES16, author = {Mehmet Sinan Inci and Berk G{\"{u}}lmezoglu and Thomas Eisenbarth and Berk Sunar}, title = {Co-location detection on the Cloud}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {284}, year = {2016}, url = {http://eprint.iacr.org/2016/284}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/InciGES16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/InciGIES16, author = {Mehmet Sinan Inci and Berk G{\"{u}}lmezoglu and Gorka Irazoqui and Thomas Eisenbarth and Berk Sunar}, title = {Cache Attacks Enable Bulk Key Recovery on the Cloud}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {596}, year = {2016}, url = {http://eprint.iacr.org/2016/596}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/InciGIES16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IrazoquiES16, author = {Gorka Irazoqui and Thomas Eisenbarth and Berk Sunar}, title = {{MASCAT:} Stopping Microarchitectural Attacks Before Execution}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1196}, year = {2016}, url = {http://eprint.iacr.org/2016/1196}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IrazoquiES16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiKPSY16, author = {Yuval Ishai and Eyal Kushilevitz and Manoj Prabhakaran and Amit Sahai and Ching{-}Hua Yu}, title = {Secure Protocol Transformations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {456}, year = {2016}, url = {http://eprint.iacr.org/2016/456}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiKPSY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshiiDGIF16, author = {Masahiro Ishii and J{\'{e}}r{\'{e}}mie Detrey and Pierrick Gaudry and Atsuo Inomata and Kazutoshi Fujikawa}, title = {Fast Modular Arithmetic on the Kalray {MPPA-256} Processor for an Energy-Efficient Implementation of {ECM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {365}, year = {2016}, url = {http://eprint.iacr.org/2016/365}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshiiDGIF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IwataM16, author = {Tetsu Iwata and Kazuhiko Minematsu}, title = {Stronger Security Variants of {GCM-SIV}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {853}, year = {2016}, url = {http://eprint.iacr.org/2016/853}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IwataM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IwataMV16, author = {Tetsu Iwata and Bart Mennink and Damian Viz{\'{a}}r}, title = {{CENC} is Optimally Secure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1087}, year = {2016}, url = {http://eprint.iacr.org/2016/1087}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IwataMV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JaberiM16, author = {Mehrad Jaberi and Hamid Mala}, title = {Protocols for Authenticated Oblivious Transfer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {607}, year = {2016}, url = {http://eprint.iacr.org/2016/607}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JaberiM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JaegerRT16, author = {Joseph Jaeger and Thomas Ristenpart and Qiang Tang}, title = {Honey Encryption Beyond Message Recovery Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {174}, year = {2016}, url = {http://eprint.iacr.org/2016/174}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JaegerRT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JafargholiW16, author = {Zahra Jafargholi and Daniel Wichs}, title = {Adaptive Security of Yao's Garbled Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {814}, year = {2016}, url = {http://eprint.iacr.org/2016/814}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JafargholiW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JainG16, author = {Shalabh Jain and Jorge Guajardo}, title = {Physical Layer Group Key Agreement for Automotive Controller Area Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {601}, year = {2016}, url = {http://eprint.iacr.org/2016/601}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JainG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JakobsenNO16, author = {Thomas P. Jakobsen and Jesper Buus Nielsen and Claudio Orlandi}, title = {A Framework for Outsourcing of Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {37}, year = {2016}, url = {http://eprint.iacr.org/2016/037}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JakobsenNO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JanaP16, author = {Amit Jana and Goutam Paul}, title = {Revisiting {RC4} Key Collision: Faster Search Algorithm and New 22-byte Colliding Key Pairs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1001}, year = {2016}, url = {http://eprint.iacr.org/2016/1001}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JanaP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Jarecki16, author = {Stanislaw Jarecki}, title = {Efficient Covert Two-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1032}, year = {2016}, url = {http://eprint.iacr.org/2016/1032}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Jarecki16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JareckiKKX16, author = {Stanislaw Jarecki and Aggelos Kiayias and Hugo Krawczyk and Jiayu Xu}, title = {Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {144}, year = {2016}, url = {http://eprint.iacr.org/2016/144}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JareckiKKX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JarvinenMAL16, author = {Kimmo J{\"{a}}rvinen and Andrea Miele and Reza Azarderakhsh and Patrick Longa}, title = {FourQ on {FPGA:} New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Characteristic Fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {569}, year = {2016}, url = {http://eprint.iacr.org/2016/569}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JarvinenMAL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JaschkeA16, author = {Angela J{\"{a}}schke and Frederik Armknecht}, title = {Accelerating Homomorphic Computations on Rational Numbers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {675}, year = {2016}, url = {http://eprint.iacr.org/2016/675}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JaschkeA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JaveedW16, author = {Khalid Javeed and Xiaojun Wang}, title = {Speed and Area Optimized Parallel Higher-Radix Modular Multipliers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {53}, year = {2016}, url = {http://eprint.iacr.org/2016/053}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JaveedW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Jean16, author = {J{\'{e}}r{\'{e}}my Jean}, title = {Cryptanalysis of Haraka}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {396}, year = {2016}, url = {http://eprint.iacr.org/2016/396}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Jean16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JeanN16, author = {J{\'{e}}r{\'{e}}my Jean and Ivica Nikolic}, title = {Efficient Design Strategies Based on the {AES} Round Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {299}, year = {2016}, url = {http://eprint.iacr.org/2016/299}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JeanN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JeongK16, author = {Jinhyuck Jeong and Taechan Kim}, title = {Extended Tower Number Field Sieve with Application to Finite Fields of Arbitrary Composite Extension Degree}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {526}, year = {2016}, url = {http://eprint.iacr.org/2016/526}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JeongK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JhaN16, author = {Ashwin Jha and Mridul Nandi}, title = {Revisiting Structure Graph and Its Applications to {CBC-MAC} and {EMAC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {161}, year = {2016}, url = {http://eprint.iacr.org/2016/161}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JhaN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JiaLL16, author = {Dingding Jia and Xianhui Lu and Bao Li}, title = {Constructions Secure against Receiver Selective Opening and Chosen Ciphertext Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1083}, year = {2016}, url = {http://eprint.iacr.org/2016/1083}, timestamp = {Wed, 07 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JiaLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JivanyanKOR16, author = {Aram Jivanyan and Gurgen Khachatryan and Andriy Oliynyk and Mykola Raievskyi}, title = {Efficient Oblivious Transfer Protocols based on White-Box Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {734}, year = {2016}, url = {http://eprint.iacr.org/2016/734}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JivanyanKOR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Jones16, author = {John Jones}, title = {A Columnar Transposition cipher in a contemporary setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {5}, year = {2016}, url = {http://eprint.iacr.org/2016/005}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Jones16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JoyeP16, author = {Marc Joye and Alain Passel{\`{e}}gue}, title = {Practical Trade-Offs for Multi-Input Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {622}, year = {2016}, url = {http://eprint.iacr.org/2016/622}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JoyeP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JuelsKS16, author = {Ari Juels and Ahmed E. Kosba and Elaine Shi}, title = {The Ring of Gyges: Investigating the Future of Criminal Smart Contracts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {358}, year = {2016}, url = {http://eprint.iacr.org/2016/358}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JuelsKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JutlaR16, author = {Charanjit S. Jutla and Arnab Roy}, title = {Smooth {NIZK} Arguments with Applications to Asymmetric {UC-PAKE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {233}, year = {2016}, url = {http://eprint.iacr.org/2016/233}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JutlaR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KahrobaeiS16, author = {Delaram Kahrobaei and Vladimir Shpilrain}, title = {Using semidirect product of (semi)groups in public key cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {378}, year = {2016}, url = {http://eprint.iacr.org/2016/378}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KahrobaeiS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KalaiRR16, author = {Yael Tauman Kalai and Guy N. Rothblum and Ron D. Rothblum}, title = {From Obfuscation to the Security of Fiat-Shamir for Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {303}, year = {2016}, url = {http://eprint.iacr.org/2016/303}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KalaiRR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KamaraM16, author = {Seny Kamara and Tarik Moataz}, title = {{SQL} on Structurally-Encrypted Databases}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {453}, year = {2016}, url = {http://eprint.iacr.org/2016/453}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KamaraM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KammerstetterMB16, author = {Markus Kammerstetter and Markus Muellner and Daniel Burian and Christian Kudera and Wolfgang Kastner}, title = {Efficient High-Speed {WPA2} Brute Force Attacks using Scalable Low-Cost {FPGA} Clustering}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {547}, year = {2016}, url = {http://eprint.iacr.org/2016/547}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KammerstetterMB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kar16, author = {Jayaprakash Kar}, title = {Certi cateless Aggregate Short Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {305}, year = {2016}, url = {http://eprint.iacr.org/2016/305}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kar16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KarN16, author = {Jayaprakash Kar and Sagar Naik}, title = {Generic Construction of Certificateless Signcryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {318}, year = {2016}, url = {http://eprint.iacr.org/2016/318}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KarN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KaratiS16, author = {Sabyasachi Karati and Palash Sarkar}, title = {Kummer for Genus One over Prime Order Fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {938}, year = {2016}, url = {http://eprint.iacr.org/2016/938}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KaratiS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KarmakarRVV16, author = {Angshuman Karmakar and Sujoy Sinha Roy and Frederik Vercauteren and Ingrid Verbauwhede}, title = {Efficient Finite field multiplication for isogeny based post quantum cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1046}, year = {2016}, url = {http://eprint.iacr.org/2016/1046}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KarmakarRVV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KarvelasPK16, author = {Nikolaos P. Karvelas and Andreas Peter and Stefan Katzenbeisser}, title = {Blurry-ORAM: {A} Multi-Client Oblivious Storage Architecture}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1077}, year = {2016}, url = {http://eprint.iacr.org/2016/1077}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KarvelasPK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Katsumata016, author = {Shuichi Katsumata and Shota Yamada}, title = {Partitioning via Non-Linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {843}, year = {2016}, url = {http://eprint.iacr.org/2016/843}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Katsumata016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KatzMW16, author = {Jonathan Katz and Alex J. Malozemoff and Xiao Wang}, title = {Efficiently Enforcing Input Validity in Secure Two-party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {184}, year = {2016}, url = {http://eprint.iacr.org/2016/184}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KatzMW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KawamuraYKS16, author = {Shin{-}ichi Kawamura and Tomoko Yonemura and Yuichi Komano and Hideo Shimizu}, title = {Exact Error Bound of Cox-Rower Architecture for {RNS} Arithmetic}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {266}, year = {2016}, url = {http://eprint.iacr.org/2016/266}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KawamuraYKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KellerOS16, author = {Marcel Keller and Emmanuela Orsini and Peter Scholl}, title = {{MASCOT:} Faster Malicious Arithmetic Secure Computation with Oblivious Transfer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {505}, year = {2016}, url = {http://eprint.iacr.org/2016/505}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KellerOS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KempkaKKS16, author = {Carmen Kempka and Ryo Kikuchi and Susumu Kiyoshima and Koutarou Suzuki}, title = {Garbling Scheme for Formulas with Constant Size of Garbled Gates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {563}, year = {2016}, url = {http://eprint.iacr.org/2016/563}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KempkaKKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KennedyKW16, author = {W. Sean Kennedy and Vladimir Kolesnikov and Gordon T. Wilfong}, title = {Overlaying Circuit Clauses for Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {685}, year = {2016}, url = {http://eprint.iacr.org/2016/685}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KennedyKW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhairallahG16, author = {Mustafa Khairallah and Maged Ghoneima}, title = {Tile-Based Modular Architecture for Accelerating Homomorphic Function Evaluation on {FPGA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {725}, year = {2016}, url = {http://eprint.iacr.org/2016/725}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhairallahG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhatiMV16, author = {Louiza Khati and Nicky Mouha and Damien Vergnaud}, title = {Full Disk Encryption: Bridging Theory and Practice}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1114}, year = {2016}, url = {http://eprint.iacr.org/2016/1114}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhatiMV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhedrG16, author = {Alhassan Khedr and P. Glenn Gulak}, title = {SecureMed: Secure Medical Computation using GPU-Accelerated Homomorphic Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {445}, year = {2016}, url = {http://eprint.iacr.org/2016/445}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhedrG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhooLPS16, author = {Khoongming Khoo and Eugene Lee and Thomas Peyrin and Siang Meng Sim}, title = {Human-readable Proof of the Related-Key Security of {AES-128}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {25}, year = {2016}, url = {http://eprint.iacr.org/2016/025}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhooLPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhuranaMS16, author = {Dakshita Khurana and Hemanta K. Maji and Amit Sahai}, title = {Secure Computation from Elastic Noisy Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {497}, year = {2016}, url = {http://eprint.iacr.org/2016/497}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhuranaMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasKRDO16, author = {Aggelos Kiayias and Ioannis Konstantinou and Alexander Russell and Bernardo David and Roman Oliynykov}, title = {A Provably Secure Proof-of-Stake Blockchain Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {889}, year = {2016}, url = {http://eprint.iacr.org/2016/889}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasKRDO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiayiasP16, author = {Aggelos Kiayias and Giorgos Panagiotakos}, title = {On Trees, Chains and Fast Transactions in the Blockchain}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {545}, year = {2016}, url = {http://eprint.iacr.org/2016/545}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiayiasP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KieferM16, author = {Franziskus Kiefer and Mark Manulis}, title = {Blind Password Registration for Verifier-based {PAKE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {442}, year = {2016}, url = {http://eprint.iacr.org/2016/442}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KieferM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KieferM16a, author = {Franziskus Kiefer and Mark Manulis}, title = {Universally Composable Two-Server {PAKE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {520}, year = {2016}, url = {http://eprint.iacr.org/2016/520}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KieferM16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiltzMP16, author = {Eike Kiltz and Daniel Masny and Jiaxin Pan}, title = {Optimal Security Proofs for Signatures from Identification Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {191}, year = {2016}, url = {http://eprint.iacr.org/2016/191}, timestamp = {Tue, 21 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiltzMP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimKKKYS16, author = {Sungwook Kim and Jinsu Kim and Dongyoung Koo and Yuna Kim and Hyunsoo Yoon and Jun{-}Bum Shin}, title = {Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {232}, year = {2016}, url = {http://eprint.iacr.org/2016/232}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimKKKYS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimLLRTW16, author = {Myungsun Kim and Hyung Tae Lee and San Ling and Shu Qin Ren and Benjamin Hong Meng Tan and Huaxiong Wang}, title = {Better Security for Queries on Encrypted Databases}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {470}, year = {2016}, url = {http://eprint.iacr.org/2016/470}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimLLRTW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimLMMRW16, author = {Sam Kim and Kevin Lewi and Avradip Mandal and Hart William Montgomery and Arnab Roy and David J. Wu}, title = {Function-Hiding Inner Product Encryption is Practical}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {440}, year = {2016}, url = {http://eprint.iacr.org/2016/440}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimLMMRW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimSGA16, author = {Jongkil Kim and Willy Susilo and Fuchun Guo and Man Ho Au}, title = {A Tag Based Encoding: An Efficient Encoding for Predicate Encoding in Prime Order Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {655}, year = {2016}, url = {http://eprint.iacr.org/2016/655}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimSGA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimSGA16a, author = {Jongkil Kim and Willy Susilo and Fuchun Guo and Man Ho Au}, title = {Functional Encryption for Computational Hiding in Prime Order Groups via Pair Encodings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {949}, year = {2016}, url = {http://eprint.iacr.org/2016/949}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimSGA16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kiraz16, author = {Mehmet Sabir Kiraz}, title = {Solving the Secure Storage Dilemma: An Efficient Scheme for Secure Deduplication with Privacy-Preserving Public Auditing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {696}, year = {2016}, url = {http://eprint.iacr.org/2016/696}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kiraz16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KirazU16, author = {Mehmet Sabir Kiraz and Osmanbey Uzunkol}, title = {Still Wrong Use of Pairings in Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {223}, year = {2016}, url = {http://eprint.iacr.org/2016/223}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KirazU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kirchner16, author = {Paul Kirchner}, title = {Algorithms on Ideal over Complex Multiplication order}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {220}, year = {2016}, url = {http://eprint.iacr.org/2016/220}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kirchner16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KirchnerF16, author = {Paul Kirchner and Pierre{-}Alain Fouque}, title = {Time-Memory Trade-Off for Lattice Enumeration in a Ball}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {222}, year = {2016}, url = {http://eprint.iacr.org/2016/222}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KirchnerF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KirchnerF16a, author = {Paul Kirchner and Pierre{-}Alain Fouque}, title = {Comparison between Subfield and Straightforward Attacks on {NTRU}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {717}, year = {2016}, url = {http://eprint.iacr.org/2016/717}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KirchnerF16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kirshanova0W16, author = {Elena Kirshanova and Alexander May and Friedrich Wiemer}, title = {Parallel Implementation of {BDD} enumeration for {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {380}, year = {2016}, url = {http://eprint.iacr.org/2016/380}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kirshanova0W16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kiss016, author = {{\'{A}}gnes Kiss and Thomas Schneider}, title = {Valiant's Universal Circuit is Practical}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {93}, year = {2016}, url = {http://eprint.iacr.org/2016/093}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kiss016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KissKRS16, author = {{\'{A}}gnes Kiss and Juliane Kr{\"{a}}mer and Pablo Rauzy and Jean{-}Pierre Seifert}, title = {Algorithmic Countermeasures Against Fault Attacks and Power Analysis for {RSA-CRT}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {238}, year = {2016}, url = {http://eprint.iacr.org/2016/238}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KissKRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kitagawa0HT16, author = {Fuyuki Kitagawa and Takahiro Matsuda and Goichiro Hanaoka and Keisuke Tanaka}, title = {On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {243}, year = {2016}, url = {http://eprint.iacr.org/2016/243}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kitagawa0HT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kluczniak16, author = {Kamil Kluczniak}, title = {Domain-Specific Pseudonymous Signatures Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {70}, year = {2016}, url = {http://eprint.iacr.org/2016/070}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kluczniak16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kohl16, author = {Lisa Kohl}, title = {New Tools for Multi-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {417}, year = {2016}, url = {http://eprint.iacr.org/2016/417}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kohl16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KolblLMR16, author = {Stefan K{\"{o}}lbl and Martin M. Lauridsen and Florian Mendel and Christian Rechberger}, title = {Haraka - Efficient Short-Input Hashing for Post-Quantum Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {98}, year = {2016}, url = {http://eprint.iacr.org/2016/098}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KolblLMR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KolesnikovKLMR16, author = {Vladimir Kolesnikov and Hugo Krawczyk and Yehuda Lindell and Alex J. Malozemoff and Tal Rabin}, title = {Attribute-based Key Exchange with General Policies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {518}, year = {2016}, url = {http://eprint.iacr.org/2016/518}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KolesnikovKLMR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KolesnikovKRT16, author = {Vladimir Kolesnikov and Ranjit Kumaresan and Mike Rosulek and Ni Trieu}, title = {Efficient Batched Oblivious {PRF} with Applications to Private Set Intersection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {799}, year = {2016}, url = {http://eprint.iacr.org/2016/799}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KolesnikovKRT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Komargodski16, author = {Ilan Komargodski}, title = {Leakage Resilient One-Way Functions: The Auxiliary-Input Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {791}, year = {2016}, url = {http://eprint.iacr.org/2016/791}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Komargodski16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KomargodskiNY16, author = {Ilan Komargodski and Moni Naor and Eylon Yogev}, title = {How to Share a Secret, Infinitely}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {194}, year = {2016}, url = {http://eprint.iacr.org/2016/194}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KomargodskiNY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KondoSI16, author = {Kota Kondo and Yu Sasaki and Tetsu Iwata}, title = {On the Design Rationale of {SIMON} Block Cipher: Integral Attacks and Impossible Differential Attacks against {SIMON} Variants}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {625}, year = {2016}, url = {http://eprint.iacr.org/2016/625}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KondoSI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KoppulaW16, author = {Venkata Koppula and Brent Waters}, title = {Circular Security Counterexamples for Arbitrary Length Cycles from {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {117}, year = {2016}, url = {http://eprint.iacr.org/2016/117}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KoppulaW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KoshibaT16, author = {Takeshi Koshiba and Katsuyuki Takashima}, title = {Pairing Cryptography Meets Isogeny: {A} New Framework of Isogenous Pairing Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1138}, year = {2016}, url = {http://eprint.iacr.org/2016/1138}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KoshibaT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KowalczykMUZ16, author = {Lucas Kowalczyk and Tal Malkin and Jonathan R. Ullman and Mark Zhandry}, title = {Strong Hardness of Privacy from Weak Traitor Tracing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {721}, year = {2016}, url = {http://eprint.iacr.org/2016/721}, timestamp = {Tue, 27 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KowalczykMUZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KozielAJK16, author = {Brian Koziel and Reza Azarderakhsh and David Jao and Mehran Mozaffari Kermani}, title = {On Fast Calculation of Addition Chains for Isogeny-Based Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1045}, year = {2016}, url = {http://eprint.iacr.org/2016/1045}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KozielAJK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KozielAK16, author = {Brian Koziel and Reza Azarderakhsh and Mehran Mozaffari Kermani}, title = {Fast Hardware Architectures for Supersingular Isogeny Diffie-Hellman Key Exchange on {FPGA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1044}, year = {2016}, url = {http://eprint.iacr.org/2016/1044}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KozielAK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KraschewskiKMPS16, author = {Daniel Kraschewski and Dakshita Khurana and Hemanta K. Maji and Manoj Prabhakaran and Amit Sahai}, title = {All Complete Functionalities are Reversible}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {496}, year = {2016}, url = {http://eprint.iacr.org/2016/496}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KraschewskiKMPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Krawczyk16, author = {Hugo Krawczyk}, title = {A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in {TLS} 1.3)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {711}, year = {2016}, url = {http://eprint.iacr.org/2016/711}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Krawczyk16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KrishnaR16, author = {Duggirala Meher Krishna and Duggirala Ravi}, title = {Multivariate Cryptography with Mappings of Discrete Logarithms and Polynomials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {821}, year = {2016}, url = {http://eprint.iacr.org/2016/821}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KrishnaR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kudo16, author = {Momonari Kudo}, title = {Attacks against search Poly-LWE}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1153}, year = {2016}, url = {http://eprint.iacr.org/2016/1153}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kudo16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KukkalaSI16, author = {Varsha Bhat Kukkala and Jaspal Singh Saini and S. R. S. Iyengar}, title = {Network Deprived {SNA} : An Alternative To Anonymization}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {427}, year = {2016}, url = {http://eprint.iacr.org/2016/427}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KukkalaSI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KuldeepYS16, author = {Gajraj Kuldeep and Devendra Kumar Yadav and A. K. Sharma}, title = {Weaknesses in Hadamard Based Symmetric Key Encryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {75}, year = {2016}, url = {http://eprint.iacr.org/2016/075}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KuldeepYS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KulisLZ16, author = {Michal Kulis and Pawel Lorek and Filip Zag{\'{o}}rski}, title = {Randomized stopping times and provably secure pseudorandom permutation generators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1049}, year = {2016}, url = {http://eprint.iacr.org/2016/1049}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KulisLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KulshresthaK16, author = {Preeti Kulshrestha and Arun Kumar}, title = {A {NEW} {UNLINKABLE} {SECRET} {HANDSHAKES} {SCHEME} {BASED} {ON} {ZSS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {41}, year = {2016}, url = {http://eprint.iacr.org/2016/041}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KulshresthaK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KumaresanRS16, author = {Ranjit Kumaresan and Srinivasan Raghuraman and Adam Sealfon}, title = {Network Oblivious Transfer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {584}, year = {2016}, url = {http://eprint.iacr.org/2016/584}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KumaresanRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KunihiroT16, author = {Noboru Kunihiro and Yuki Takahashi}, title = {Improved Key Recovery Algorithms from Noisy {RSA} Secret Keys with Analog Noise}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1095}, year = {2016}, url = {http://eprint.iacr.org/2016/1095}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KunihiroT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KustersMST16, author = {Ralf K{\"{u}}sters and Johannes M{\"{u}}ller and Enrico Scapin and Tomasz Truderung}, title = {sElect: {A} Lightweight Verifiable Remote Voting System}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {438}, year = {2016}, url = {http://eprint.iacr.org/2016/438}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KustersMST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LaVigne16, author = {Rio LaVigne}, title = {Simple Homomorphisms of Cocks {IBE} and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1150}, year = {2016}, url = {http://eprint.iacr.org/2016/1150}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LaVigne16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Laarhoven16, author = {Thijs Laarhoven}, title = {Randomized lattice sieving for the closest vector problem (with preprocessing)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {888}, year = {2016}, url = {http://eprint.iacr.org/2016/888}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Laarhoven16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LabrandeT16, author = {Hugo Labrande and Emmanuel Thom{\'{e}}}, title = {Computing theta functions in quasi-linear time in genus 2 and above}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {179}, year = {2016}, url = {http://eprint.iacr.org/2016/179}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LabrandeT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LafitteLMH16, author = {Fr{\'{e}}d{\'{e}}ric Lafitte and Liran Lerman and Olivier Markowitch and Dirk Van Heule}, title = {SAT-based cryptanalysis of {ACORN}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {521}, year = {2016}, url = {http://eprint.iacr.org/2016/521}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LafitteLMH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LaiTWC16, author = {Russell W. F. Lai and Raymond K. H. Tai and Harry W. H. Wong and Sherman S. M. Chow}, title = {A Zoo of Homomorphic Signatures: Multi-Key and Key-Homomorphism}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {834}, year = {2016}, url = {http://eprint.iacr.org/2016/834}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LaiTWC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lambaek16, author = {Mikkel Lamb{\ae}k}, title = {Breaking and Fixing Private Set Intersection Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {665}, year = {2016}, url = {http://eprint.iacr.org/2016/665}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lambaek16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LampertWLL16, author = {Ben Lampert and Riad S. Wahby and Shane Leonard and Philip Alexander Levis}, title = {Robust, low-cost, auditable random number generation for embedded system security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {884}, year = {2016}, url = {http://eprint.iacr.org/2016/884}, timestamp = {Mon, 30 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LampertWLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LancrenonST16, author = {Jean Lancrenon and Marjan Skrobot and Qiang Tang}, title = {Two More Efficient Variants of the {J-PAKE} Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {379}, year = {2016}, url = {http://eprint.iacr.org/2016/379}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LancrenonST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LaudP16, author = {Peeter Laud and Alisa Pankova}, title = {Securing Multiparty Protocols against the Exposure of Data to Honest Parties}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {650}, year = {2016}, url = {http://eprint.iacr.org/2016/650}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LaudP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LaudP16a, author = {Peeter Laud and Alisa Pankova}, title = {Optimizing Secure Computation Programs with Private Conditionals}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {942}, year = {2016}, url = {http://eprint.iacr.org/2016/942}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LaudP16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lee16, author = {Kwangsu Lee}, title = {Revocable Hierarchical Identity-Based Encryption with Adaptive Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {749}, year = {2016}, url = {http://eprint.iacr.org/2016/749}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lee16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeKHSH16, author = {Hochang Lee and HyungChul Kang and Deukjo Hong and Jaechul Sung and Seokhie Hong}, title = {New Impossible Differential Characteristic of {SPECK64} using {MILP}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1137}, year = {2016}, url = {http://eprint.iacr.org/2016/1137}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeKHSH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeL16, author = {Kwangsu Lee and Dong Hoon Lee}, title = {Two-Input Functional Encryption for Inner Products from Bilinear Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {432}, year = {2016}, url = {http://eprint.iacr.org/2016/432}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeLSWY16, author = {Hyung Tae Lee and San Ling and Jae Hong Seo and Huaxiong Wang and Taek{-}Young Youn}, title = {Public Key Encryption with Equality Test in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1182}, year = {2016}, url = {http://eprint.iacr.org/2016/1182}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeLSWY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeLW16, author = {Hyung Tae Lee and San Ling and Huaxiong Wang}, title = {Analysis of Gong et al.'s CCA2-Secure Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {19}, year = {2016}, url = {http://eprint.iacr.org/2016/019}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeP16, author = {Kwangsu Lee and Seunghwan Park}, title = {Revocable Hierarchical Identity-Based Encryption with Shorter Private Keys and Update Keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {460}, year = {2016}, url = {http://eprint.iacr.org/2016/460}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeS16, author = {Peter Hyun{-}Jeen Lee and Siamak Fayyaz Shahandashti}, title = {Theoretical Attacks on {E2E} Voting Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {447}, year = {2016}, url = {http://eprint.iacr.org/2016/447}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LermanMV16, author = {Liran Lerman and Olivier Markowitch and Nikita Veshchikov}, title = {Comparing Sboxes of Ciphers from the Perspective of Side-Channel Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {993}, year = {2016}, url = {http://eprint.iacr.org/2016/993}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LermanMV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LewiMACFWABK016, author = {Kevin Lewi and Alex J. Malozemoff and Daniel Apon and Brent Carmer and Adam Foltzer and Daniel Wagner and David W. Archer and Dan Boneh and Jonathan Katz and Mariana Raykova}, title = {5Gen: {A} Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {619}, year = {2016}, url = {http://eprint.iacr.org/2016/619}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LewiMACFWABK016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LewiW16, author = {Kevin Lewi and David J. Wu}, title = {Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {612}, year = {2016}, url = {http://eprint.iacr.org/2016/612}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LewiW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Li16, author = {Jianwei Li}, title = {On the smallest ratio problem of lattice bases}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {847}, year = {2016}, url = {http://eprint.iacr.org/2016/847}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Li16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiGM16, author = {Zengpeng Li and Steven D. Galbraith and Chunguang Ma}, title = {Preventing Adaptive Key Recovery Attacks on the Gentry-Sahai-Waters Leveled Homomorphic Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1146}, year = {2016}, url = {http://eprint.iacr.org/2016/1146}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiGM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiL16, author = {Ming Li and Dongdai Lin}, title = {The Adjacency Graphs of Linear Feedback Shift Registers with Primitive-like Characteristic Polynomials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {269}, year = {2016}, url = {http://eprint.iacr.org/2016/269}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiL16a, author = {Ming Li and Dongdai Lin}, title = {Adjacency Graphs, Irreducible Polynomials and Cyclotomy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {393}, year = {2016}, url = {http://eprint.iacr.org/2016/393}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiL16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiLLW16, author = {Xiaoyi Li and Kaitai Liang and Zhen Liu and Duncan S. Wong}, title = {Attribute Based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1140}, year = {2016}, url = {http://eprint.iacr.org/2016/1140}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiLLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiM16, author = {Baiyu Li and Daniele Micciancio}, title = {Compactness vs Collusion Resistance in Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {561}, year = {2016}, url = {http://eprint.iacr.org/2016/561}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiM16a, author = {Baiyu Li and Daniele Micciancio}, title = {Equational Security Proofs of Oblivious Transfer Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {624}, year = {2016}, url = {http://eprint.iacr.org/2016/624}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiM16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiMZQ16, author = {Yin Li and Xingpo Ma and Yu Zhang and Chuanda Qi}, title = {Mastrovito form of Karatsuba Multiplier for All Trinomials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {694}, year = {2016}, url = {http://eprint.iacr.org/2016/694}, timestamp = {Thu, 15 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiMZQ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiW16, author = {Yongqiang Li and Mingsheng Wang}, title = {On the Construction of Lightweight Circulant Involutory {MDS} Matrices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {406}, year = {2016}, url = {http://eprint.iacr.org/2016/406}, timestamp = {Mon, 31 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiYZ16, author = {Jiguo Li and Hong Yuan and Yichen Zhang}, title = {Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {692}, year = {2016}, url = {http://eprint.iacr.org/2016/692}, timestamp = {Thu, 09 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiYZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertLMNW16, author = {Beno{\^{\i}}t Libert and San Ling and Fabrice Mouhartem and Khoa Nguyen and Huaxiong Wang}, title = {Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {101}, year = {2016}, url = {http://eprint.iacr.org/2016/101}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LibertLMNW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertLMNW16a, author = {Beno{\^{\i}}t Libert and San Ling and Fabrice Mouhartem and Khoa Nguyen and Huaxiong Wang}, title = {Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {879}, year = {2016}, url = {http://eprint.iacr.org/2016/879}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LibertLMNW16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LibertRY16, author = {Beno{\^{\i}}t Libert and Somindu C. Ramanna and Moti Yung}, title = {Functional Commitment Schemes: From Polynomial Commitments to Pairing-Based Accumulators from Simple Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {766}, year = {2016}, url = {http://eprint.iacr.org/2016/766}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LibertRY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lin16, author = {Huijia Lin}, title = {Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {257}, year = {2016}, url = {http://eprint.iacr.org/2016/257}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lin16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lin16a, author = {Huijia Lin}, title = {Indistinguishability Obfuscation from {DDH} on 5-linear Maps and Locality-5 PRGs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1096}, year = {2016}, url = {http://eprint.iacr.org/2016/1096}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lin16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinPST16, author = {Huijia Lin and Rafael Pass and Karn Seth and Sidharth Telang}, title = {Indistinguishability Obfuscation with Non-trivial Efficiency}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {6}, year = {2016}, url = {http://eprint.iacr.org/2016/006}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinPST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinQZ16, author = {Xi Jun Lin and Haipeng Qu and Xiaoshuai Zhang}, title = {New Efficient and Flexible Algorithms for Secure Outsourcing of Bilinear Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {76}, year = {2016}, url = {http://eprint.iacr.org/2016/076}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinQZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinQZ16a, author = {Xi Jun Lin and Haipeng Qu and Xiaoshuai Zhang}, title = {Public Key Encryption Supporting Equality Test and Flexible Authorization without Bilinear Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {277}, year = {2016}, url = {http://eprint.iacr.org/2016/277}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinQZ16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinSQZ16, author = {Xi Jun Lin and Lin Sun and Haipeng Qu and Xiaoshuai Zhang}, title = {New Approaches for Secure Outsourcing Algorithm for Modular Exponentiations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {45}, year = {2016}, url = {http://eprint.iacr.org/2016/045}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinSQZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinV16, author = {Huijia Lin and Vinod Vaikuntanathan}, title = {Indistinguishability Obfuscation from DDH-like Assumptions on Constant-Degree Graded Encodings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {795}, year = {2016}, url = {http://eprint.iacr.org/2016/795}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinW16, author = {Li Lin and Wenling Wu}, title = {Improved Meet-in-the-Middle Attacks on Reduced-Round Kalyna-128/256 and Kalyna-256/512}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {722}, year = {2016}, url = {http://eprint.iacr.org/2016/722}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LinW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinWZ16, author = {Li Lin and Wenling Wu and Yafei Zheng}, title = {Automatic Search for Key-Bridging Technique: Applications to LBlock and {TWINE} (Full Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {414}, year = {2016}, url = {http://eprint.iacr.org/2016/414}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LinWZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lindell16, author = {Yehuda Lindell}, title = {How To Simulate It - {A} Tutorial on the Simulation Proof Technique}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {46}, year = {2016}, url = {http://eprint.iacr.org/2016/046}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lindell16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LindellSS16, author = {Yehuda Lindell and Nigel P. Smart and Eduardo Soria{-}Vazquez}, title = {More Efficient Constant-Round Multi-Party Computation from {BMR} and {SHE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {156}, year = {2016}, url = {http://eprint.iacr.org/2016/156}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LindellSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Linder16, author = {Peter Linder}, title = {DEcryption Contract ENforcement Tool {(DECENT):} {A} Practical Alternative to Government Decryption Backdoors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {245}, year = {2016}, url = {http://eprint.iacr.org/2016/245}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Linder16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LipmaaMS16, author = {Helger Lipmaa and Payman Mohassel and Seyed Saeed Sadeghian}, title = {Valiant's Universal Circuit: Improvements, Implementation, and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {17}, year = {2016}, url = {http://eprint.iacr.org/2016/017}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LipmaaMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ListN16, author = {Eik List and Mridul Nandi}, title = {Revisiting Full-PRF-Secure {PMAC} and Using It for Beyond-Birthday Authenticated Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1174}, year = {2016}, url = {http://eprint.iacr.org/2016/1174}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ListN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Liu16, author = {Tianren Liu}, title = {On Basing Search {SIVP} on NP-Hardness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {906}, year = {2016}, url = {http://eprint.iacr.org/2016/906}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Liu16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuCM16, author = {Jian Liu and Lusheng Chen and Sihem Mesnager}, title = {Partially homomorphic encryption schemes over finite fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {430}, year = {2016}, url = {http://eprint.iacr.org/2016/430}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuCM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuGL16, author = {Guozhen Liu and Mohona Ghosh and Song Ling}, title = {Security Analysis of {SKINNY} under Related-Tweakey Settings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1108}, year = {2016}, url = {http://eprint.iacr.org/2016/1108}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuGL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuLWQNF16, author = {Weiran Liu and Jianwei Liu and Qianhong Wu and Bo Qin and David Naccache and Houda Ferradi}, title = {Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {634}, year = {2016}, url = {http://eprint.iacr.org/2016/634}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuLWQNF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuS16, author = {Meicheng Liu and Siang Meng Sim}, title = {Lightweight {MDS} Generalized Circulant Matrices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {186}, year = {2016}, url = {http://eprint.iacr.org/2016/186}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuW16, author = {Bin Liu and Bogdan Warinschi}, title = {Universally Composable Cryptographic Role-Based Access Control}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {902}, year = {2016}, url = {http://eprint.iacr.org/2016/902}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LohrkeTBS16, author = {Heiko Lohrke and Shahin Tajik and Christian Boit and Jean{-}Pierre Seifert}, title = {No Place to Hide: Contactless Probing of Secret Data on FPGAs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {593}, year = {2016}, url = {http://eprint.iacr.org/2016/593}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LohrkeTBS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Longa16, author = {Patrick Longa}, title = {FourQNEON: Faster Elliptic Curve Scalar Multiplications on {ARM} Processors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {645}, year = {2016}, url = {http://eprint.iacr.org/2016/645}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Longa16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LongaN16, author = {Patrick Longa and Michael Naehrig}, title = {Speeding up the Number Theoretic Transform for Faster Ideal Lattice-Based Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {504}, year = {2016}, url = {http://eprint.iacr.org/2016/504}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LongaN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Longo0MOSS16, author = {Jake Longo and Daniel P. Martin and Luke Mather and Elisabeth Oswald and Benjamin Sach and Martijn Stam}, title = {How low can you go? Using side-channel data to enhance brute-force key recovery}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {609}, year = {2016}, url = {http://eprint.iacr.org/2016/609}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Longo0MOSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LongoMS16, author = {Riccardo Longo and Chiara Marcolla and Massimiliano Sala}, title = {Collaborative Multi-Authority {KP-ABE} for Shorter Keys and Parameters}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {262}, year = {2016}, url = {http://eprint.iacr.org/2016/262}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LongoMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuD16, author = {Yi Lu and Yvo Desmedt}, title = {Walsh-Hadamard Transform and Cryptographic Applications in Bias Computing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {419}, year = {2016}, url = {http://eprint.iacr.org/2016/419}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuKS16, author = {Wenjie Lu and Shohei Kawasaki and Jun Sakuma}, title = {Using Fully Homomorphic Encryption for Statistical Analysis of Categorical, Ordinal and Numerical Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1163}, year = {2016}, url = {http://eprint.iacr.org/2016/1163}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lund016, author = {Anders Smedstuen Lund and Martin Strand}, title = {Decryption phase in Norwegian electronic voting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1002}, year = {2016}, url = {http://eprint.iacr.org/2016/1002}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lund016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuoF16, author = {Pei Luo and Yunsi Fei}, title = {Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {967}, year = {2016}, url = {http://eprint.iacr.org/2016/967}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuoF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuoFZD16, author = {Pei Luo and Yunsi Fei and Liwei Zhang and A. Adam Ding}, title = {Differential Fault Analysis of {SHA3-224} and {SHA3-256}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {709}, year = {2016}, url = {http://eprint.iacr.org/2016/709}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuoFZD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuoLF16, author = {Pei Luo and Chao Luo and Yunsi Fei}, title = {System Clock and Power Supply Cross-Checking for Glitch Detection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {968}, year = {2016}, url = {http://eprint.iacr.org/2016/968}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuoLF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuoZFD16, author = {Pei Luo and Liwei Zhang and Yunsi Fei and A. Adam Ding}, title = {An Improvement of Both Security and Reliability for Keccak Implementations on Smart Card}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {214}, year = {2016}, url = {http://eprint.iacr.org/2016/214}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuoZFD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuuCOSH16, author = {Loi Luu and Duc{-}Hiep Chu and Hrishi Olickel and Prateek Saxena and Aquinas Hobor}, title = {Making Smart Contracts Smarter}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {633}, year = {2016}, url = {http://eprint.iacr.org/2016/633}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuuCOSH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuykxMN16, author = {Atul Luykx and Bart Mennink and Samuel Neves}, title = {Security Analysis of BLAKE2's Modes of Operation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {827}, year = {2016}, url = {http://eprint.iacr.org/2016/827}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuykxMN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuykxPSY16, author = {Atul Luykx and Bart Preneel and Alan Szepieniec and Kan Yasuda}, title = {On the Influence of Message Length in PMAC's Security Bounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {185}, year = {2016}, url = {http://eprint.iacr.org/2016/185}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuykxPSY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuykxPTY16, author = {Atul Luykx and Bart Preneel and Elmar Tischhauser and Kan Yasuda}, title = {A {MAC} Mode for Lightweight Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {190}, year = {2016}, url = {http://eprint.iacr.org/2016/190}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuykxPTY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Lyubashevsky16, author = {Vadim Lyubashevsky}, title = {Digital Signatures Based on the Hardness of Ideal Lattice Problems in all Rings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {796}, year = {2016}, url = {http://eprint.iacr.org/2016/796}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Lyubashevsky16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ma0ZQ16, author = {Qiumao Ma and Jinsheng Zhang and Wensheng Zhang and Daji Qiao}, title = {{SE-ORAM:} {A} Storage-Efficient Oblivious {RAM} for Privacy-Preserving Access to Cloud Storage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {256}, year = {2016}, url = {http://eprint.iacr.org/2016/256}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ma0ZQ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaLJ16, author = {Yuan Ma and Jingqiang Lin and Jiwu Jing}, title = {On the Entropy of Oscillator-Based True Random Number Generators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1091}, year = {2016}, url = {http://eprint.iacr.org/2016/1091}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaLJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaghrebiPP16, author = {Houssem Maghrebi and Thibault Portigliatti and Emmanuel Prouff}, title = {Breaking Cryptographic Implementations Using Deep Learning Techniques}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {921}, year = {2016}, url = {http://eprint.iacr.org/2016/921}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaghrebiPP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaghrebiSB16, author = {Houssem Maghrebi and Victor Servant and Julien Bringer}, title = {There is Wisdom in Harnessing the Strengths of your Enemy: Customized Encoding to Thwart Side-Channel Attacks - Extended Version -}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {183}, year = {2016}, url = {http://eprint.iacr.org/2016/183}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaghrebiSB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MahmoodyMNPS16, author = {Mohammad Mahmoody and Ameer Mohammed and Soheil Nematihaji and Rafael Pass and Abhi Shelat}, title = {A Note on Black-Box Complexity of Indistinguishability Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {316}, year = {2016}, url = {http://eprint.iacr.org/2016/316}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MahmoodyMNPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MahmudluBBB16, author = {Rauf Mahmudlu and Valentina Banciu and Lejla Batina and Ileana Buhan}, title = {LDA-Based Clustering as a Side-Channel Distinguisher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1024}, year = {2016}, url = {http://eprint.iacr.org/2016/1024}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MahmudluBBB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MalavoltaMKM16, author = {Giulio Malavolta and Pedro Moreno{-}Sanchez and Aniket Kate and Matteo Maffei}, title = {SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1054}, year = {2016}, url = {http://eprint.iacr.org/2016/1054}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MalavoltaMKM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MalekiRD16, author = {Hoda Maleki and Reza Rahaeimehr and Marten van Dijk}, title = {LightSource: Ultra Lightweight Clone Detection of {RFID} Tags from Software Unclonable Responses}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {608}, year = {2016}, url = {http://eprint.iacr.org/2016/608}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MalekiRD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MalhotraG16, author = {Aanchal Malhotra and Sharon Goldberg}, title = {Attacking NTP's Authenticated Broadcast Mode}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {55}, year = {2016}, url = {http://eprint.iacr.org/2016/055}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MalhotraG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MalhotraGVKGG16, author = {Aanchal Malhotra and Matthew Van Gundy and Mayank Varia and Haydn Kennedy and Jonathan Gardner and Sharon Goldberg}, title = {The Security of NTP's Datagram Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1006}, year = {2016}, url = {http://eprint.iacr.org/2016/1006}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MalhotraGVKGG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MandalAP16, author = {Kalikinkar Mandal and Basel Alomair and Radha Poovendran}, title = {Secure Error-Tolerant Graph Matching Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {908}, year = {2016}, url = {http://eprint.iacr.org/2016/908}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MandalAP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MarcedonePS16, author = {Antonio Marcedone and Rafael Pass and Abhi Shelat}, title = {Bounded {KDM} Security from iO and {OWF}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {688}, year = {2016}, url = {http://eprint.iacr.org/2016/688}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MarcedonePS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MarianoLB16, author = {Artur Mariano and Thijs Laarhoven and Christian H. Bischof}, title = {A Parallel Variant of LDSieve for the {SVP} on Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {890}, year = {2016}, url = {http://eprint.iacr.org/2016/890}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MarianoLB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MarinASP16, author = {Eduard Marin and Enrique Argones{-}R{\'{u}}a and Dave Singel{\'{e}}e and Bart Preneel}, title = {A survey on physiological-signal-based security for medical devices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {867}, year = {2016}, url = {http://eprint.iacr.org/2016/867}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MarinASP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MassolinoBCM16, author = {Pedro Maat C. Massolino and Lejla Batina and Ricardo Chaves and Nele Mentens}, title = {Low Power Montgomery Modular Multiplication on Reconfigurable Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {280}, year = {2016}, url = {http://eprint.iacr.org/2016/280}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MassolinoBCM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MassolinoRB16, author = {Pedro Maat C. Massolino and Joost Renes and Lejla Batina}, title = {Implementing Complete Formulas on Weierstrass Curves in Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1133}, year = {2016}, url = {http://eprint.iacr.org/2016/1133}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MassolinoRB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MatsumotoR16, author = {Stephanos Matsumoto and Raphael M. Reischuk}, title = {{IKP:} Turning a {PKI} Around with Blockchains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1018}, year = {2016}, url = {http://eprint.iacr.org/2016/1018}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MatsumotoR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaurerR16, author = {Ueli Maurer and Renato Renner}, title = {From Indifferentiability to Constructive Cryptography (and Back)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {903}, year = {2016}, url = {http://eprint.iacr.org/2016/903}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaurerR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Mayer16, author = {Christoph M. Mayer}, title = {Implementing a Toolkit for Ring-LWE Based Cryptography in Arbitrary Cyclotomic Number Fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {49}, year = {2016}, url = {http://eprint.iacr.org/2016/049}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Mayer16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/McCannWO16, author = {David McCann and Carolyn Whitnall and Elisabeth Oswald}, title = {{ELMO:} Emulating Leaks for the {ARM} Cortex-M0 without Access to a Side Channel Lab}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {517}, year = {2016}, url = {http://eprint.iacr.org/2016/517}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/McCannWO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/McCorryMSH16, author = {Patrick McCorry and Malte M{\"{o}}ser and Siamak Fayyaz Shahandashti and Feng Hao}, title = {Towards Bitcoin Payment Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {408}, year = {2016}, url = {http://eprint.iacr.org/2016/408}, timestamp = {Tue, 10 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/McCorryMSH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/McCorrySH16, author = {Patrick McCorry and Siamak Fayyaz Shahandashti and Feng Hao}, title = {Refund attacks on Bitcoin's Payment Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {24}, year = {2016}, url = {http://eprint.iacr.org/2016/024}, timestamp = {Tue, 10 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/McCorrySH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/McGrewKFGBB16, author = {David A. McGrew and Panos Kampanakis and Scott R. Fluhrer and Stefan{-}Lukas Gazdag and Denis Butin and Johannes Buchmann}, title = {State Management for Hash Based Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {357}, year = {2016}, url = {http://eprint.iacr.org/2016/357}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/McGrewKFGBB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MeauxJSC16, author = {Pierrick M{\'{e}}aux and Anthony Journault and Fran{\c{c}}ois{-}Xavier Standaert and Claude Carlet}, title = {Towards Stream Ciphers for Efficient {FHE} with Low-Noise Ciphertexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {254}, year = {2016}, url = {http://eprint.iacr.org/2016/254}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MeauxJSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MechlerMN16, author = {Jeremias Mechler and J{\"{o}}rn M{\"{u}}ller{-}Quade and Tobias Nilges}, title = {Universally Composable (Non-Interactive) Two-Party Computation from Untrusted Reusable Hardware Tokens}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {615}, year = {2016}, url = {http://eprint.iacr.org/2016/615}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MechlerMN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MelchorBDGZ16, author = {Carlos Aguilar Melchor and Olivier Blazy and Jean{-}Christophe Deneuville and Philippe Gaborit and Gilles Z{\'{e}}mor}, title = {Efficient Encryption from Random Quasi-Cyclic Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1194}, year = {2016}, url = {http://eprint.iacr.org/2016/1194}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MelchorBDGZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MenezesSS16, author = {Alfred Menezes and Palash Sarkar and Shashank Singh}, title = {Challenges with Assessing the Impact of {NFS} Advances on the Security of Pairing-based Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1102}, year = {2016}, url = {http://eprint.iacr.org/2016/1102}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MenezesSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Miao16, author = {Peihan Miao}, title = {Cut-and-Choose for Garbled {RAM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {907}, year = {2016}, url = {http://eprint.iacr.org/2016/907}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Miao16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MiersM16, author = {Ian Miers and Payman Mohassel}, title = {{IO-DSSE:} Scaling Dynamic Searchable Encryption to Millions of Indexes By Improving Locality}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {830}, year = {2016}, url = {http://eprint.iacr.org/2016/830}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MiersM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MilesSZ16, author = {Eric Miles and Amit Sahai and Mark Zhandry}, title = {Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over {GGH13}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {147}, year = {2016}, url = {http://eprint.iacr.org/2016/147}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MilesSZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MilesSZ16a, author = {Eric Miles and Amit Sahai and Mark Zhandry}, title = {Secure obfuscation in a weak multilinear map model: {A} simple construction secure against all known attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {588}, year = {2016}, url = {http://eprint.iacr.org/2016/588}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MilesSZ16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MilesV16, author = {Eric Miles and Emanuele Viola}, title = {On the complexity of constructing pseudorandom functions (especially when they don't exist)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {343}, year = {2016}, url = {http://eprint.iacr.org/2016/343}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MilesV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MillerSSV16, author = {Douglas Miller and Adam Scrivener and Jesse Stern and Muthuramakrishnan Venkitasubramaniam}, title = {On Negation Complexity of Injections, Surjections and Collision-Resistance in Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {192}, year = {2016}, url = {http://eprint.iacr.org/2016/192}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MillerSSV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MillerXCSS16, author = {Andrew Miller and Yu Xia and Kyle Croman and Elaine Shi and Dawn Song}, title = {The Honey Badger of {BFT} Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {199}, year = {2016}, url = {http://eprint.iacr.org/2016/199}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MillerXCSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MiracleY16, author = {Sarah Miracle and Scott Yilek}, title = {Reverse Cycle Walking and Its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {865}, year = {2016}, url = {http://eprint.iacr.org/2016/865}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MiracleY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MittelbachV16, author = {Arno Mittelbach and Daniele Venturi}, title = {Fiat-Shamir for Highly Sound Protocols is Instantiable}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {313}, year = {2016}, url = {http://eprint.iacr.org/2016/313}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MittelbachV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MohamedP16, author = {Mohamed Saied Emam Mohamed and Albrecht Petzoldt}, title = {The Shortest Signatures Ever}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {911}, year = {2016}, url = {http://eprint.iacr.org/2016/911}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MohamedP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MohamedWZ16, author = {Mojahed Mohamed and Xiaofen Wang and Xiaosong Zhang}, title = {Tightly-Secure Authenticated Key Exchange without NAXOS' approach based on Decision Linear Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {388}, year = {2016}, url = {http://eprint.iacr.org/2016/388}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MohamedWZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MolleviMP16, author = {Oriol Farr{\`{a}}s and Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and Carles Padr{\'{o}}}, title = {A Note on Non-Perfect Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {348}, year = {2016}, url = {http://eprint.iacr.org/2016/348}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MolleviMP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoosMR16, author = {Thorben Moos and Amir Moradi and Bastian Richter}, title = {Static Power Side-Channel Analysis of a Threshold Implementation Prototype Chip}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1135}, year = {2016}, url = {http://eprint.iacr.org/2016/1135}, timestamp = {Mon, 10 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoosMR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoradiS16, author = {Amir Moradi and Tobias Schneider}, title = {Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {249}, year = {2016}, url = {http://eprint.iacr.org/2016/249}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoradiS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoradiS16a, author = {Amir Moradi and Tobias Schneider}, title = {Side-Channel Analysis Protection and Low-Latency in Action - case study of {PRINCE} and Midori}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {481}, year = {2016}, url = {http://eprint.iacr.org/2016/481}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoradiS16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoranO16, author = {Tal Moran and Ilan Orlov}, title = {Proofs of Space-Time and Rational Proofs of Storage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {35}, year = {2016}, url = {http://eprint.iacr.org/2016/035}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoranO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MorchonRTTLG0S16, author = {Oscar Garc{\'{\i}}a Morchon and Ronald Rietman and Ludo Tolhuizen and Jose Luis Torre{-}Arce and Moon Sung Lee and Domingo G{\'{o}}mez{-}P{\'{e}}rez and Jaime Gutierrez and Berry Schoenmakers}, title = {Attacks and parameter choices in {HIMMO}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {152}, year = {2016}, url = {http://eprint.iacr.org/2016/152}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MorchonRTTLG0S16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MortazaviSD16, author = {Amir S. Mortazavi and Mahmoud Salmasizadeh and Amir Daneshgar}, title = {Strong Continuous Non-malleable Encoding Schemes with Tamper-Detection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {43}, year = {2016}, url = {http://eprint.iacr.org/2016/043}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MortazaviSD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MortazaviSD16a, author = {Amir S. Mortazavi and Mahmoud Salmasizadeh and Amir Daneshgar}, title = {{FMNV} Continuous Non-malleable Encoding Scheme is More Efficient Than Believed}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {604}, year = {2016}, url = {http://eprint.iacr.org/2016/604}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MortazaviSD16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MrabetMLRBMM16, author = {Amine Mrabet and Nadia El Mrabet and Ronan Lashermes and Jean{-}Baptiste Rigaud and Belgacem Bouallegue and Sihem Mesnager and Mohsen Machhout}, title = {A Systolic Hardware Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {487}, year = {2016}, url = {http://eprint.iacr.org/2016/487}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MrabetMLRBMM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Munilla16, author = {Jorge Munilla}, title = {{KP+} : Fixing Availability Issues on {KP} Ownership Transfer Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1008}, year = {2016}, url = {http://eprint.iacr.org/2016/1008}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Munilla16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nadeem16, author = {Muhammad Nadeem}, title = {Standard quantum bit commitment - an indefinite commitment time}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {39}, year = {2016}, url = {http://eprint.iacr.org/2016/039}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nadeem16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nadeem16a, author = {Muhammad Nadeem}, title = {Secure positioning and quantum non-local correlations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {59}, year = {2016}, url = {http://eprint.iacr.org/2016/059}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nadeem16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nagao16, author = {Koh{-}ichi Nagao}, title = {Bit Coincidence Mining Algorithm {II}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {924}, year = {2016}, url = {http://eprint.iacr.org/2016/924}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nagao16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaitoY16, author = {Yusuke Naito and Kan Yasuda}, title = {New Bounds for Keyed Sponges with Extendable Output: Independence between Capacity and Message Length}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {292}, year = {2016}, url = {http://eprint.iacr.org/2016/292}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaitoY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NascimentoCOS16, author = {Erick Nascimento and Lukasz Chmielewski and David F. Oswald and Peter Schwabe}, title = {Attacking embedded {ECC} implementations through cmov side channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {923}, year = {2016}, url = {http://eprint.iacr.org/2016/923}, timestamp = {Thu, 07 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/NascimentoCOS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NayakK16, author = {Kartik Nayak and Jonathan Katz}, title = {An Oblivious Parallel {RAM} with O(log\({}^{\mbox{2}}\) {N)} Parallel Runtime Blowup}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1141}, year = {2016}, url = {http://eprint.iacr.org/2016/1141}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NayakK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NayakRAP16, author = {Kartik Nayak and Ling Ren and Ittai Abraham and Benny Pinkas}, title = {An Oblivious {RAM} with Sub-logarithmic Bandwidth Blowup}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {849}, year = {2016}, url = {http://eprint.iacr.org/2016/849}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NayakRAP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NemanaV16, author = {Lalitha Kiran Nemana and V. Ch. Venkaiah}, title = {An Empirical Study towards Refining the {AKS} Primality Testing Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {362}, year = {2016}, url = {http://eprint.iacr.org/2016/362}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NemanaV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Neumaier16, author = {Arnold Neumaier}, title = {Bounding basis reduction properties}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {4}, year = {2016}, url = {http://eprint.iacr.org/2016/004}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Neumaier16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NeumaierS16, author = {Arnold Neumaier and Damien Stehl{\'{e}}}, title = {Faster LLL-type Reduction of Lattice Bases}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {852}, year = {2016}, url = {http://eprint.iacr.org/2016/852}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NeumaierS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NguyenS16, author = {Phuong Ha Nguyen and Durga Prasad Sahoo}, title = {An Efficient and Scalable Modeling Attack on Lightweight Secure Physically Unclonable Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {428}, year = {2016}, url = {http://eprint.iacr.org/2016/428}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NguyenS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NguyenWZ16, author = {Khoa Nguyen and Huaxiong Wang and Juanyang Zhang}, title = {Server-Aided Revocable Identity-Based Encryption from Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {974}, year = {2016}, url = {http://eprint.iacr.org/2016/974}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/NguyenWZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NielsenO16, author = {Jesper Buus Nielsen and Claudio Orlandi}, title = {Cross{\&}Clean: Amortized Garbled Circuits with Constant Overhead}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {495}, year = {2016}, url = {http://eprint.iacr.org/2016/495}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NielsenO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NielsenR16, author = {Jesper Buus Nielsen and Samuel Ranellucci}, title = {On the Computational Overhead of {MPC} with Dishonest Majority}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {643}, year = {2016}, url = {http://eprint.iacr.org/2016/643}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NielsenR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NielsenST16, author = {Jesper Buus Nielsen and Thomas Schneider and Roberto Trifiletti}, title = {Constant Round Maliciously Secure 2PC with Function-independent Preprocessing using {LEGO}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1069}, year = {2016}, url = {http://eprint.iacr.org/2016/1069}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NielsenST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NikolicS16, author = {Ivica Nikolic and Yu Sasaki}, title = {Refinements of the k-tree Algorithm for the Generalized Birthday Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {312}, year = {2016}, url = {http://eprint.iacr.org/2016/312}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NikolicS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NikolicS16a, author = {Ivica Nikolic and Yu Sasaki}, title = {A New Algorithm for the Unbalanced Meet-in-the-Middle Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {851}, year = {2016}, url = {http://eprint.iacr.org/2016/851}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NikolicS16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nilges16, author = {Tobias Nilges}, title = {Efficient Resettably Secure Two-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1009}, year = {2016}, url = {http://eprint.iacr.org/2016/1009}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nilges16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NitajST16, author = {Abderrahmane Nitaj and Willy Susilo and Joseph Tonien}, title = {Dirichlet Product for Boolean Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {673}, year = {2016}, url = {http://eprint.iacr.org/2016/673}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NitajST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NunezAL16, author = {David Nu{\~{n}}ez and Isaac Agudo and Javier L{\'{o}}pez}, title = {A Parametric Family of Attack Models for Proxy Re-Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {293}, year = {2016}, url = {http://eprint.iacr.org/2016/293}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NunezAL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NunezAL16a, author = {David Nu{\~{n}}ez and Isaac Agudo and Javier L{\'{o}}pez}, title = {Attacks to a proxy-mediated key agreement protocol based on symmetric encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1081}, year = {2016}, url = {http://eprint.iacr.org/2016/1081}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NunezAL16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OFlynn16, author = {Colin O'Flynn}, title = {Fault Injection using Crowbars on Embedded Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {810}, year = {2016}, url = {http://eprint.iacr.org/2016/810}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OFlynn16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OderSPG16, author = {Tobias Oder and Tobias Schneider and Thomas P{\"{o}}ppelmann and Tim G{\"{u}}neysu}, title = {Practical CCA2-Secure and Masked Ring-LWE Implementation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1109}, year = {2016}, url = {http://eprint.iacr.org/2016/1109}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OderSPG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OgataK16, author = {Wakaha Ogata and Kaoru Kurosawa}, title = {Efficient No-dictionary Verifiable {SSE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {981}, year = {2016}, url = {http://eprint.iacr.org/2016/981}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OgataK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OharaEHIOS16, author = {Kazuma Ohara and Keita Emura and Goichiro Hanaoka and Ai Ishida and Kazuo Ohta and Yusuke Sakai}, title = {Shortening the Libert-Peters-Yung Revocable Group Signature Scheme by Using the Random Oracle Methodology}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {477}, year = {2016}, url = {http://eprint.iacr.org/2016/477}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OharaEHIOS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ohata0M16, author = {Satsuya Ohata and Takahiro Matsuda and Kanta Matsuura}, title = {Provably Secure Password Reset Protocol: Model, Definition, and Generic Construction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {345}, year = {2016}, url = {http://eprint.iacr.org/2016/345}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ohata0M16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OliveiraLR16, author = {Thomaz Oliveira and Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {Software implementation of Koblitz curves over quadratic fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {603}, year = {2016}, url = {http://eprint.iacr.org/2016/603}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OliveiraLR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OrruOS16, author = {Michele Orr{\`{u}} and Emmanuela Orsini and Peter Scholl}, title = {Actively Secure 1-out-of-N {OT} Extension with Application to Private Set Intersection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {933}, year = {2016}, url = {http://eprint.iacr.org/2016/933}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OrruOS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OsadchyHGDe16, author = {Margarita Osadchy and Julio C. Hernandez{-}Castro and Stuart J. Gibson and Orr Dunkelman and Daniel P{\'{e}}rez{-}Cabo}, title = {No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples with Applications to {CAPTCHA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {336}, year = {2016}, url = {http://eprint.iacr.org/2016/336}, timestamp = {Fri, 08 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OsadchyHGDe16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PakniatN16, author = {Nasrollah Pakniat and Mahnaz Noroozi}, title = {Cryptanalysis of a certificateless aggregate signature scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1147}, year = {2016}, url = {http://eprint.iacr.org/2016/1147}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PakniatN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PanBLL16, author = {Wenlun Pan and Zhenzhen Bao and Dongdai Lin and Feng Liu}, title = {An Algorithm for Counting the Number of 2\({}^{\mbox{n}}\)-Periodic Binary Sequences with Fixed k-Error Linear Complexity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1025}, year = {2016}, url = {http://eprint.iacr.org/2016/1025}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PanBLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PanaitPSVS16, author = {Ioana{-}Cristina Panait and Cristian Pop and Alexandru Sirbu and Adelina Vidovici and Emil Simion}, title = {{TOR} - Didactic pluggable transport}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {506}, year = {2016}, url = {http://eprint.iacr.org/2016/506}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PanaitPSVS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PandeyMD16, author = {Shashi Kant Pandey and Prasanna Raghaw Mishra and B. K. Dass}, title = {A Maiorana-McFarland Construction of a {GBF} on Galois ring}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {97}, year = {2016}, url = {http://eprint.iacr.org/2016/097}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PandeyMD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Papapagiannopoulos16, author = {Kostas Papapagiannopoulos}, title = {High throughput in slices: the case of PRESENT, {PRINCE} and {KATAN64} ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {945}, year = {2016}, url = {http://eprint.iacr.org/2016/945}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Papapagiannopoulos16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ParkLL16, author = {Jong Hwan Park and Kwangsu Lee and Dong Hoon Lee}, title = {Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {500}, year = {2016}, url = {http://eprint.iacr.org/2016/500}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ParkLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ParkR16, author = {Sunoo Park and Ronald L. Rivest}, title = {Towards Secure Quadratic Voting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {400}, year = {2016}, url = {http://eprint.iacr.org/2016/400}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ParkR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Parsovs16, author = {Arnis Parsovs}, title = {Homomorphic Tallying for the Estonian Internet Voting System}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {776}, year = {2016}, url = {http://eprint.iacr.org/2016/776}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Parsovs16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PasalicMHG16, author = {Enes Pasalic and Amela Muratovic{-}Ribic and Samir Hodzic and Sugata Gangopadhyay}, title = {On derivatives of polynomials over finite fields through integration}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {22}, year = {2016}, url = {http://eprint.iacr.org/2016/022}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PasalicMHG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Paskin-Cherniavsky16, author = {Anat Paskin{-}Cherniavsky}, title = {How to infinitely share a secret more efficiently}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1088}, year = {2016}, url = {http://eprint.iacr.org/2016/1088}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Paskin-Cherniavsky16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PassS16, author = {Rafael Pass and Abhi Shelat}, title = {Micropayments for Decentralized Currencies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {332}, year = {2016}, url = {http://eprint.iacr.org/2016/332}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PassS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PassS16a, author = {Rafael Pass and Elaine Shi}, title = {FruitChains: {A} Fair Blockchain}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {916}, year = {2016}, url = {http://eprint.iacr.org/2016/916}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PassS16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PassS16b, author = {Rafael Pass and Elaine Shi}, title = {Hybrid Consensus: Efficient Consensus in the Permissionless Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {917}, year = {2016}, url = {http://eprint.iacr.org/2016/917}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PassS16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PassSS16, author = {Rafael Pass and Lior Seeman and Abhi Shelat}, title = {Analysis of the Blockchain Protocol in Asynchronous Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {454}, year = {2016}, url = {http://eprint.iacr.org/2016/454}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PassSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PassST16, author = {Rafael Pass and Elaine Shi and Florian Tram{\`{e}}r}, title = {Formal Abstractions for Attested Execution Secure Processors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1027}, year = {2016}, url = {http://eprint.iacr.org/2016/1027}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PassST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Patarin16, author = {Jacques Patarin}, title = {Mirror Theory and Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {702}, year = {2016}, url = {http://eprint.iacr.org/2016/702}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Patarin16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Patarin16a, author = {Jacques Patarin}, title = {Two Simple Composition Theorems with H-coefficients}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {956}, year = {2016}, url = {http://eprint.iacr.org/2016/956}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Patarin16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatarinN16, author = {Jacques Patarin and Val{\'{e}}rie Nachef}, title = {Commutativity, Associativity, and Public Key Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {171}, year = {2016}, url = {http://eprint.iacr.org/2016/171}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatarinN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatersonSU16, author = {Maura B. Paterson and Douglas R. Stinson and Jalaj Upadhyay}, title = {Multi-prover Proof-of-Retrievability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {265}, year = {2016}, url = {http://eprint.iacr.org/2016/265}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatersonSU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatraSS16, author = {Arpita Patra and Pratik Sarkar and Ajith Suresh}, title = {Fast Actively Secure {OT} Extension for Short Secrets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {940}, year = {2016}, url = {http://eprint.iacr.org/2016/940}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatraSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatranabisM16, author = {Sikhar Patranabis and Debdeep Mukhopadhyay}, title = {Identity-Based Key Aggregate Cryptosystem from Multilinear Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {693}, year = {2016}, url = {http://eprint.iacr.org/2016/693}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatranabisM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatrickYGS16, author = {Conor Patrick and Bilgiday Yuce and Nahid Farhady Ghalaty and Patrick Schaumont}, title = {Lightweight Fault Attack Resistance in Software Using Intra-Instruction Redundancy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {850}, year = {2016}, url = {http://eprint.iacr.org/2016/850}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/PatrickYGS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Peikert16, author = {Chris Peikert}, title = {How (Not) to Instantiate Ring-LWE}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {351}, year = {2016}, url = {http://eprint.iacr.org/2016/351}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Peikert16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PeikertS16, author = {Chris Peikert and Sina Shiehian}, title = {Multi-Key {FHE} from LWE, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {196}, year = {2016}, url = {http://eprint.iacr.org/2016/196}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PeikertS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PengHCCCY16, author = {Bo{-}Yuan Peng and Yuan{-}Che Hsu and Yu{-}Jia Chen and Di{-}Chia Chueh and Chen{-}Mou Cheng and Bo{-}Yin Yang}, title = {Multi-core {FPGA} Implementation of {ECC} with Homogeneous Co-Z Coordinate Representation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {909}, year = {2016}, url = {http://eprint.iacr.org/2016/909}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PengHCCCY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PerrinU16, author = {L{\'{e}}o Perrin and Aleksei Udovenko}, title = {Algebraic Insights into the Secret Feistel Network (Full version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {398}, year = {2016}, url = {http://eprint.iacr.org/2016/398}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PerrinU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PerrinUB16, author = {L{\'{e}}o Perrin and Aleksei Udovenko and Alex Biryukov}, title = {Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big {APN} Problem (Full Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {539}, year = {2016}, url = {http://eprint.iacr.org/2016/539}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PerrinUB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PetzoldtDW16, author = {Albrecht Petzoldt and Jintai Ding and Lih{-}Chung Wang}, title = {Eliminating Decryption Failures from the Simple Matrix Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {10}, year = {2016}, url = {http://eprint.iacr.org/2016/010}, timestamp = {Mon, 30 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/PetzoldtDW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Peyrin16, author = {Thomas Peyrin}, title = {Collision Attack on {GRINDAHL}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {295}, year = {2016}, url = {http://eprint.iacr.org/2016/295}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Peyrin16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PhalakarnPS16, author = {Kittiphop Phalakarn and Kittiphon Phalakarn and Vorapong Suppakitpaisarn}, title = {Parallelized Side-Channel Attack Resisted Scalar Multiplication Using q-Based Addition-Subtraction k-chains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {899}, year = {2016}, url = {http://eprint.iacr.org/2016/899}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PhalakarnPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PhongWANB16, author = {Le Trieu Phong and Lihua Wang and Yoshinori Aono and Manh Ha Nguyen and Xavier Boyen}, title = {Proxy Re-Encryption Schemes with Key Privacy from {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {327}, year = {2016}, url = {http://eprint.iacr.org/2016/327}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PhongWANB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Piedra16, author = {Antonio de la Piedra}, title = {Beyond the selective disclosure of ABCs on RAM-constrained devices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {31}, year = {2016}, url = {http://eprint.iacr.org/2016/031}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Piedra16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PierrotW16, author = {C{\'{e}}cile Pierrot and Benjamin Wesolowski}, title = {Malleability of the blockchain's entropy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {370}, year = {2016}, url = {http://eprint.iacr.org/2016/370}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PierrotW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PietrzakS16, author = {Krzysztof Pietrzak and Maciej Skorski}, title = {Pseudoentropy: Lower-bounds for Chain rules and Transformations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {159}, year = {2016}, url = {http://eprint.iacr.org/2016/159}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PietrzakS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Pinkas0Z16, author = {Benny Pinkas and Thomas Schneider and Michael Zohner}, title = {Scalable Private Set Intersection Based on {OT} Extension}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {930}, year = {2016}, url = {http://eprint.iacr.org/2016/930}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Pinkas0Z16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PinoLP16, author = {Rafa{\"{e}}l Del Pino and Vadim Lyubashevsky and David Pointcheval}, title = {The Whole is Less than the Sum of its Parts: Constructing More Efficient Lattice-Based AKEs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {435}, year = {2016}, url = {http://eprint.iacr.org/2016/435}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PinoLP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PiotrowskaHGDH16, author = {Ania M. Piotrowska and Jamie Hayes and Nethanel Gelernter and George Danezis and Amir Herzberg}, title = {AnoNotify: {A} Private Notification Service}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {466}, year = {2016}, url = {http://eprint.iacr.org/2016/466}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PiotrowskaHGDH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PoddarBP16, author = {Rishabh Poddar and Tobias Boelter and Raluca Ada Popa}, title = {Arx: {A} Strongly Encrypted Database System}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {591}, year = {2016}, url = {http://eprint.iacr.org/2016/591}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PoddarBP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PopaSHVZKB16, author = {Raluca Ada Popa and Emily Stark and Jonas Helfer and Steven Valdez and Nickolai Zeldovich and M. Frans Kaashoek and Hari Balakrishnan}, title = {Building web applications on top of encrypted data using Mylar}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {893}, year = {2016}, url = {http://eprint.iacr.org/2016/893}, timestamp = {Fri, 05 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/PopaSHVZKB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Popov16, author = {Serguei Popov}, title = {On a decentralized trustless pseudo-random number generation algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {228}, year = {2016}, url = {http://eprint.iacr.org/2016/228}, timestamp = {Sat, 26 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Popov16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Poppelen16, author = {Alex van Poppelen}, title = {Cryptographic decoding of the Leech lattice}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1050}, year = {2016}, url = {http://eprint.iacr.org/2016/1050}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Poppelen16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Poulakis16, author = {Dimitrios Poulakis}, title = {New Lattice Attacks on {DSA} Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {58}, year = {2016}, url = {http://eprint.iacr.org/2016/058}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Poulakis16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PoussierSG16, author = {Romain Poussier and Fran{\c{c}}ois{-}Xavier Standaert and Vincent Grosso}, title = {Simple Key Enumeration (and Rank Estimation) using Histograms: an Integrated Approach}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {571}, year = {2016}, url = {http://eprint.iacr.org/2016/571}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PoussierSG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PozoS16, author = {Santos Merino Del Pozo and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Blind Source Separation from Single Measurements using Singular Spectrum Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {314}, year = {2016}, url = {http://eprint.iacr.org/2016/314}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PozoS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PozoS16a, author = {Santos Merino Del Pozo and Fran{\c{c}}ois{-}Xavier Standaert}, title = {A note on the security of threshold implementations with d+1 input shares}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {420}, year = {2016}, url = {http://eprint.iacr.org/2016/420}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PozoS16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PulkusV16, author = {J{\"{u}}rgen Pulkus and Srinivas Vivek}, title = {Reducing the Number of Non-linear Multiplications in Masking Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {831}, year = {2016}, url = {http://eprint.iacr.org/2016/831}, timestamp = {Mon, 11 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/PulkusV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/QinC16, author = {Lingyue Qin and Huaifeng Chen}, title = {Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-guessing Techniques}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {66}, year = {2016}, url = {http://eprint.iacr.org/2016/066}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/QinC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RabaninejadADM16, author = {Reyhaneh Rabaninejad and Mohammad Hassan Ameri and Mahshid Delavar and Javad Mohajeri}, title = {An Attribute-Based Anonymous Broadcast Encryption Scheme with Adaptive Security in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1086}, year = {2016}, url = {http://eprint.iacr.org/2016/1086}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RabaninejadADM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ramanna16, author = {Somindu C. Ramanna}, title = {More Efficient Constructions for Inner-Product Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {356}, year = {2016}, url = {http://eprint.iacr.org/2016/356}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ramanna16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RashidiSF16, author = {Bahram Rashidi and Sayed Masoud Sayedi and Reza Rezaeian Farashahi}, title = {High-speed {VLSI} implementation of Digit-serial Gaussian normal basis Multiplication over GF(2m)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {966}, year = {2016}, url = {http://eprint.iacr.org/2016/966}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RashidiSF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RasoolzadehR16, author = {Shahram Rasoolzadeh and H{\aa}vard Raddum}, title = {Multidimensional Meet in the Middle Cryptanalysis of {KATAN}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {77}, year = {2016}, url = {http://eprint.iacr.org/2016/077}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RasoolzadehR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RasoolzadehR16a, author = {Shahram Rasoolzadeh and H{\aa}vard Raddum}, title = {Cryptanalysis of {PRINCE} with Minimal Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {80}, year = {2016}, url = {http://eprint.iacr.org/2016/080}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RasoolzadehR16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RasoolzadehR16b, author = {Shahram Rasoolzadeh and H{\aa}vard Raddum}, title = {Cryptanalysis of 6-round {PRINCE} using 2 Known Plaintexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {132}, year = {2016}, url = {http://eprint.iacr.org/2016/132}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RasoolzadehR16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RasoolzadehR16c, author = {Shahram Rasoolzadeh and H{\aa}vard Raddum}, title = {Faster Key Recovery Attack on Round-Reduced {PRINCE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {828}, year = {2016}, url = {http://eprint.iacr.org/2016/828}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RasoolzadehR16c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Raz16, author = {Ran Raz}, title = {Fast Learning Requires Good Memory: {A} Time-Space Lower Bound for Parity Learning}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {170}, year = {2016}, url = {http://eprint.iacr.org/2016/170}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Raz16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RenD16, author = {Ling Ren and Srinivas Devadas}, title = {Proof of Space from Stacked Bipartite Graphs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {333}, year = {2016}, url = {http://eprint.iacr.org/2016/333}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RenD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RenesSSB16, author = {Joost Renes and Peter Schwabe and Benjamin Smith and Lejla Batina}, title = {{\textbackslash}({\textbackslash}mu{\textbackslash})Kummer: efficient hyperelliptic signatures and key exchange on microcontrollers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {366}, year = {2016}, url = {http://eprint.iacr.org/2016/366}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RenesSSB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Reparaz16, author = {Oscar Reparaz}, title = {Detecting flawed masking schemes with leakage detection tests}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {282}, year = {2016}, url = {http://eprint.iacr.org/2016/282}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Reparaz16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ReparazBV16, author = {Oscar Reparaz and Josep Balasch and Ingrid Verbauwhede}, title = {Dude, is my code constant time?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1123}, year = {2016}, url = {http://eprint.iacr.org/2016/1123}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ReparazBV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ReyhanitabarVV16, author = {Reza Reyhanitabar and Serge Vaudenay and Damian Viz{\'{a}}r}, title = {Authenticated Encryption with Variable Stretch}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {463}, year = {2016}, url = {http://eprint.iacr.org/2016/463}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ReyhanitabarVV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ReyzinMCI16, author = {Leonid Reyzin and Dmitry Meshkov and Alexander Chepurnoy and Sasha Ivanov}, title = {Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {994}, year = {2016}, url = {http://eprint.iacr.org/2016/994}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ReyzinMCI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RindalR16, author = {Peter Rindal and Mike Rosulek}, title = {Faster Malicious 2-party Secure Computation with Online/Ofine Dual Execution}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {632}, year = {2016}, url = {http://eprint.iacr.org/2016/632}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RindalR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RindalR16a, author = {Peter Rindal and Mike Rosulek}, title = {Improved Private Set Intersection against Malicious Adversaries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {746}, year = {2016}, url = {http://eprint.iacr.org/2016/746}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RindalR16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RivestS16, author = {Ronald L. Rivest and Jacob C. N. Schuldt}, title = {Spritz - a spongy RC4-like stream cipher and hash function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {856}, year = {2016}, url = {http://eprint.iacr.org/2016/856}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RivestS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RonenOSW16, author = {Eyal Ronen and Colin O'Flynn and Adi Shamir and Achi{-}Or Weingarten}, title = {IoT Goes Nuclear: Creating a ZigBee Chain Reaction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1047}, year = {2016}, url = {http://eprint.iacr.org/2016/1047}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RonenOSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ronjom16, author = {Sondre R{\o}njom}, title = {Invariant subspaces in Simpira}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {248}, year = {2016}, url = {http://eprint.iacr.org/2016/248}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ronjom16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RosenSS16, author = {Alon Rosen and Gil Segev and Ido Shahaf}, title = {Can {PPAD} Hardness be Based on Standard Cryptographic Assumptions?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {375}, year = {2016}, url = {http://eprint.iacr.org/2016/375}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RosenSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RoyBPMG16, author = {Debapriya Basu Roy and Shivam Bhasin and Sikhar Patranabis and Debdeep Mukhopadhyay and Sylvain Guilley}, title = {What Lies Ahead: Extending {TVLA} Testing Methodology Towards Success Rate}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1152}, year = {2016}, url = {http://eprint.iacr.org/2016/1152}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RoyBPMG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RoyM16, author = {Dibyendu Roy and Sourav Mukhopadhyay}, title = {Fault analysis and weak key-IV attack on Sprout}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {207}, year = {2016}, url = {http://eprint.iacr.org/2016/207}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RoyM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RoyM16a, author = {Dibyendu Roy and Sourav Mukhopadhyay}, title = {Some results on {ACORN}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1132}, year = {2016}, url = {http://eprint.iacr.org/2016/1132}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RoyM16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Rozic0MV16, author = {Vladimir Rozic and Bohan Yang and Nele Mentens and Ingrid Verbauwhede}, title = {Canary Numbers: Design for Light-weight Online Testability of True Random Number Generators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {386}, year = {2016}, url = {http://eprint.iacr.org/2016/386}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Rozic0MV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RuffingMK16, author = {Tim Ruffing and Pedro Moreno{-}Sanchez and Aniket Kate}, title = {{P2P} Mixing and Unlinkable Bitcoin Transactions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {824}, year = {2016}, url = {http://eprint.iacr.org/2016/824}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RuffingMK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ruhrmair16, author = {Ulrich R{\"{u}}hrmair}, title = {On the Security of {PUF} Protocols under Bad PUFs and PUFs-inside-PUFs Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {322}, year = {2016}, url = {http://eprint.iacr.org/2016/322}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ruhrmair16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Russell0YZ16, author = {Alexander Russell and Qiang Tang and Moti Yung and Hong{-}Sheng Zhou}, title = {Destroying Steganography via Amalgamation: Kleptographically {CPA} Secure Public Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {530}, year = {2016}, url = {http://eprint.iacr.org/2016/530}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Russell0YZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ryabko16, author = {Boris Ryabko}, title = {Information-Theoretical Analysis of Two Shannon's Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {429}, year = {2016}, url = {http://eprint.iacr.org/2016/429}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ryabko16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SaabRH16, author = {Sami Saab and Pankaj Rohatgi and Craig Hampel}, title = {Side-Channel Protections for Cryptographic Instruction Set Extensions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {700}, year = {2016}, url = {http://eprint.iacr.org/2016/700}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SaabRH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Saarinen16, author = {Markku{-}Juhani O. Saarinen}, title = {Arithmetic Coding and Blinding Countermeasures for Ring-LWE}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {276}, year = {2016}, url = {http://eprint.iacr.org/2016/276}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Saarinen16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Saarinen16a, author = {Markku{-}Juhani O. Saarinen}, title = {Ring-LWE Ciphertext Compression and Error Correction: Tools for Lightweight Post-Quantum Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1058}, year = {2016}, url = {http://eprint.iacr.org/2016/1058}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Saarinen16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SabtT16, author = {Mohamed Sabt and Jacques Traor{\'{e}}}, title = {Breaking Into the KeyStore: {A} Practical Forgery Attack Against Android KeyStore}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {677}, year = {2016}, url = {http://eprint.iacr.org/2016/677}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SabtT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SadeghiMB16, author = {Sadegh Sadeghi and Tahere Mohammadi and Nasour Bagheri}, title = {Cryptanalysis of Reduced round {SKINNY} Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1120}, year = {2016}, url = {http://eprint.iacr.org/2016/1120}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SadeghiMB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SafkhaniB16, author = {Masoumeh Safkhani and Nasour Bagheri}, title = {Passive Secret Disclosure Attack on an Ultralightweight Authentication Protocol for Internet of Things}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {838}, year = {2016}, url = {http://eprint.iacr.org/2016/838}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SafkhaniB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SafkhaniB16a, author = {Masoumeh Safkhani and Nasour Bagheri}, title = {Generalized Desynchronization Attack on {UMAP:} Application to RCIA, KMAP, {SLAP} and SASI\({}^{\mbox{+}}\) protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {905}, year = {2016}, url = {http://eprint.iacr.org/2016/905}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SafkhaniB16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Saha16, author = {Tanujay Saha}, title = {{TV-PUF} : {A} Fast Lightweight Analog Physically Unclonable Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {582}, year = {2016}, url = {http://eprint.iacr.org/2016/582}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Saha16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SahaC16, author = {Dhiman Saha and Dipanwita Roy Chowdhury}, title = {EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on {PAEQ}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {623}, year = {2016}, url = {http://eprint.iacr.org/2016/623}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SahaC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SahaS16, author = {Tanujay Saha and Vikash Sehwag}, title = {{TV-PUF} : {A} Fast Lightweight Aging-Resistant Threshold Voltage {PUF}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {774}, year = {2016}, url = {http://eprint.iacr.org/2016/774}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SahaS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SahooMCN16, author = {Durga Prasad Sahoo and Debdeep Mukhopadhyay and Rajat Subhra Chakraborty and Phuong Ha Nguyen}, title = {A Multiplexer based Arbiter {PUF} Composition with Enhanced Reliability and Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1031}, year = {2016}, url = {http://eprint.iacr.org/2016/1031}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SahooMCN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SahooNCM16, author = {Durga Prasad Sahoo and Phuong Ha Nguyen and Rajat Subhra Chakraborty and Debdeep Mukhopadhyay}, title = {Architectural Bias: a Novel Statistical Metric to Evaluate Arbiter {PUF} Variants}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {57}, year = {2016}, url = {http://eprint.iacr.org/2016/057}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SahooNCM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SahooPMC16, author = {Durga Prasad Sahoo and Sikhar Patranabis and Debdeep Mukhopadhyay and Rajat Subhra Chakraborty}, title = {Fault Tolerant Implementations of Delay-based Physically Unclonable Functions on {FPGA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {441}, year = {2016}, url = {http://eprint.iacr.org/2016/441}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SahooPMC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SakaiAH16, author = {Yusuke Sakai and Nuttapong Attrapadung and Goichiro Hanaoka}, title = {Attribute-Based Signatures for Circuits from Bilinear Map}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {242}, year = {2016}, url = {http://eprint.iacr.org/2016/242}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SakaiAH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SalamBDPSW16, author = {Md. Iftekhar Salam and Harry Bartlett and Ed Dawson and Josef Pieprzyk and Leonie Simpson and Kenneth Koon{-}Ho Wong}, title = {Investigating Cube Attacks on the Authenticated Encryption Stream Cipher {ACORN}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {743}, year = {2016}, url = {http://eprint.iacr.org/2016/743}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SalamBDPSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SamajderS16, author = {Subhabrata Samajder and Palash Sarkar}, title = {A New Test Statistic for Key Recovery Attacks Using Multiple Linear Approximations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {404}, year = {2016}, url = {http://eprint.iacr.org/2016/404}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SamajderS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SamajderS16a, author = {Subhabrata Samajder and Palash Sarkar}, title = {Multiple Differential Cryptanalysis: {A} Rigorous Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {405}, year = {2016}, url = {http://eprint.iacr.org/2016/405}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SamajderS16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SamajderS16b, author = {Subhabrata Samajder and Palash Sarkar}, title = {Can Large Deviation Theory be Used for Estimating Data Complexity?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {465}, year = {2016}, url = {http://eprint.iacr.org/2016/465}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SamajderS16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SamardjiskaG16, author = {Simona Samardjiska and Danilo Gligoroski}, title = {An Encryption Scheme based on Random Split of St-Gen Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {202}, year = {2016}, url = {http://eprint.iacr.org/2016/202}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SamardjiskaG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Samid16, author = {Gideon Samid}, title = {T-Proof: Secure Communication via Non-Algorithmic Randomization}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {474}, year = {2016}, url = {http://eprint.iacr.org/2016/474}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Samid16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Samid16a, author = {Gideon Samid}, title = {Drone Targeted Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {499}, year = {2016}, url = {http://eprint.iacr.org/2016/499}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Samid16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Samid16b, author = {Gideon Samid}, title = {Cyber Passport: Preventing Massive Identity Theft}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {627}, year = {2016}, url = {http://eprint.iacr.org/2016/627}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Samid16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Sarkar016, author = {Palash Sarkar and Shashank Singh}, title = {Tower Number Field Sieve Variant of a Recent Polynomial Selection Method}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {401}, year = {2016}, url = {http://eprint.iacr.org/2016/401}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Sarkar016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Sarkar016a, author = {Palash Sarkar and Shashank Singh}, title = {A General Polynomial Selection Method and New Asymptotic Complexities for the Tower Number Field Sieve Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {485}, year = {2016}, url = {http://eprint.iacr.org/2016/485}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Sarkar016a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Sarkar016b, author = {Palash Sarkar and Shashank Singh}, title = {A Generalisation of the Conjugation Method for Polynomial Selection for the Extended Tower Number Field Sieve Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {537}, year = {2016}, url = {http://eprint.iacr.org/2016/537}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Sarkar016b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SarkarS16, author = {Sumanta Sarkar and Siang Meng Sim}, title = {A deeper understanding of the {XOR} count distribution in the context of lightweight cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {422}, year = {2016}, url = {http://eprint.iacr.org/2016/422}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SarkarS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SarkarS16a, author = {Sumanta Sarkar and Habeeb Syed}, title = {Lightweight Diffusion Layer: Importance of Toeplitz Matrices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {835}, year = {2016}, url = {http://eprint.iacr.org/2016/835}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SarkarS16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SasakiT16, author = {Yu Sasaki and Yosuke Todo}, title = {New Impossible Differential Search Tool from Design and Cryptanalysis Aspects}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1181}, year = {2016}, url = {http://eprint.iacr.org/2016/1181}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SasakiT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SasdrichG16, author = {Pascal Sasdrich and Tim G{\"{u}}neysu}, title = {Closing the Gap in {RFC} 7748: Implementing Curve448 in Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {352}, year = {2016}, url = {http://eprint.iacr.org/2016/352}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SasdrichG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SasdrichMG16, author = {Pascal Sasdrich and Amir Moradi and Tim G{\"{u}}neysu}, title = {White-Box Cryptography in the Gray Box - {A} Hardware Implementation and its Side Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {203}, year = {2016}, url = {http://eprint.iacr.org/2016/203}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SasdrichMG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SasdrichMG16a, author = {Pascal Sasdrich and Amir Moradi and Tim G{\"{u}}neysu}, title = {Hiding Higher-Order Side-Channel Leakage - Randomizing Cryptographic Implementations in Reconfigurable Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1111}, year = {2016}, url = {http://eprint.iacr.org/2016/1111}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SasdrichMG16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ScerriS16, author = {Guillaume Scerri and Ryan Stanley{-}Oakes}, title = {Analysis of Key Wrapping APIs: Generic Policies, Computational Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {433}, year = {2016}, url = {http://eprint.iacr.org/2016/433}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ScerriS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SchabhuserDB16, author = {Lucas Schabh{\"{u}}ser and Denise Demirel and Johannes Buchmann}, title = {An Unconditionally Hiding Auditing Procedure for Multi-Party Computations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {546}, year = {2016}, url = {http://eprint.iacr.org/2016/546}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SchabhuserDB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SchaubBHB16, author = {Alexander Schaub and R{\'{e}}mi Bazin and Omar Hasan and Lionel Brunie}, title = {A trustless privacy-preserving reputation system}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {16}, year = {2016}, url = {http://eprint.iacr.org/2016/016}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SchaubBHB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Schneider0G16, author = {Tobias Schneider and Amir Moradi and Tim G{\"{u}}neysu}, title = {ParTI - Towards Combined Hardware Countermeasures against Side-Channel and Fault-Injection Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {648}, year = {2016}, url = {http://eprint.iacr.org/2016/648}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Schneider0G16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SchneiderMSG16, author = {Tobias Schneider and Amir Moradi and Fran{\c{c}}ois{-}Xavier Standaert and Tim G{\"{u}}neysu}, title = {Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation beyond Gaussian Templates and Histograms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {719}, year = {2016}, url = {http://eprint.iacr.org/2016/719}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SchneiderMSG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SchwabeS16, author = {Peter Schwabe and Ko Stoffelen}, title = {All the {AES} You Need on Cortex-M3 and {M4}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {714}, year = {2016}, url = {http://eprint.iacr.org/2016/714}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SchwabeS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Schwenk16, author = {J{\"{o}}rg Schwenk}, title = {Nonce-based Kerberos is a Secure Delegated {AKE} Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {219}, year = {2016}, url = {http://eprint.iacr.org/2016/219}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Schwenk16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Scott16, author = {Mike Scott}, title = {A Novel Multi-factor ID-based Designated Verifier Signature scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1151}, year = {2016}, url = {http://eprint.iacr.org/2016/1151}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Scott16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SeijasTM16, author = {Pablo Lamela Seijas and Simon J. Thompson and Darryl McAdams}, title = {Scripting smart contracts for distributed ledger technology}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1156}, year = {2016}, url = {http://eprint.iacr.org/2016/1156}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SeijasTM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SelvamSAR16, author = {Ravikumar Selvam and Dillibabu Shanmugam and Suganya Annadurai and Jothi Rangasamy}, title = {Decomposed S-Boxes and {DPA} Attacks: {A} Quantitative Case Study using {PRINCE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {630}, year = {2016}, url = {http://eprint.iacr.org/2016/630}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SelvamSAR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Semaev16, author = {Igor A. Semaev}, title = {On low degree polynomials in 2-round {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {141}, year = {2016}, url = {http://eprint.iacr.org/2016/141}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Semaev16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Sha16, author = {Tanujay Sha}, title = {A Generalized Ideal Secret Sharing Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {929}, year = {2016}, url = {http://eprint.iacr.org/2016/929}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Sha16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.