Search dblp for Publications

export results for "toc:db/journals/iacr/iacr2016.bht:"

more than 1000 matches, exporting first 1000 hits only!

 download as .bib file

@article{DBLP:journals/iacr/0001HKP16,
  author       = {Michael Backes and
                  Amir Herzberg and
                  Aniket Kate and
                  Ivan Pryvalov},
  title        = {Anonymous {RAM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {678},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/678},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001HKP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001JNSS16,
  author       = {Jian Guo and
                  J{\'{e}}r{\'{e}}my Jean and
                  Ivica Nikolic and
                  Yu Sasaki and
                  Siang Meng Sim},
  title        = {Invariant Subspace Attack Against Midori64 and The Resistance Criteria
                  for S-box Designs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {973},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/973},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001JNSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001LS16,
  author       = {Jian Guo and
                  Meicheng Liu and
                  Ling Song},
  title        = {Linear Structures: Applications to Cryptanalysis of Round-Reduced
                  Keccak},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {878},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/878},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001LS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001MOS16,
  author       = {Daniel P. Martin and
                  Luke Mather and
                  Elisabeth Oswald and
                  Martijn Stam},
  title        = {Characterisation and Estimation of the Key Rank Distribution in the
                  Context of Side Channel Evaluations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {491},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/491},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001MOS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001P16,
  author       = {Qiang Tang and
                  Balazs Pejo},
  title        = {Game-Theoretic Framework for Integrity Veri cation in Computation
                  Outsourcing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {639},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/639},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001P16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001R16,
  author       = {Lorenzo Grassi and
                  Christian Rechberger},
  title        = {Practical low data-complexity subspace-trail cryptanalysis of round-reduced
                  {PRINCE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {964},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/964},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001R16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0002H16,
  author       = {Takahiro Matsuda and
                  Goichiro Hanaoka},
  title        = {Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext
                  Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {235},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/235},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0002H16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0002L16,
  author       = {Chun Guo and
                  Dongdai Lin},
  title        = {Indifferentiability of 3-Round Even-Mansour with Random Oracle Key
                  Derivation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {894},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/894},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0002L16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0002LL16,
  author       = {Chun Guo and
                  Dongdai Lin and
                  Meicheng Liu},
  title        = {Cascade Ciphers Revisited: Indifferentiability Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {825},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/825},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0002LL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/002116,
  author       = {Jie Chen},
  title        = {Tightly Secure {IBE} under Constant-size Master Public Key},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {891},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/891},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/002116.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/00310ZZG16,
  author       = {Lei Wang and
                  Jian Guo and
                  Guoyan Zhang and
                  Jingyuan Zhao and
                  Dawu Gu},
  title        = {How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {876},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/876},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/00310ZZG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBCP16,
  author       = {Michel Abdalla and
                  Florian Bourse and
                  Angelo De Caro and
                  David Pointcheval},
  title        = {Better Security for Functional Encryption for Inner Product Evaluations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {11},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/011},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBCP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaCNP16,
  author       = {Michel Abdalla and
                  Mario Cornejo and
                  Anca Nitulescu and
                  David Pointcheval},
  title        = {Robust Password-Protected Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {123},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/123},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaCNP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaRW16,
  author       = {Michel Abdalla and
                  Mariana Raykova and
                  Hoeteck Wee},
  title        = {Multi-Input Inner-Product Functional Encryption from Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {425},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/425},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaRW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdolmalekiBKA16,
  author       = {Behzad Abdolmaleki and
                  Karim Baghery and
                  Shahram Khazaei and
                  Mohammad Reza Aref},
  title        = {Game-Based Privacy Analysis of {RFID} Security Schemes for Confident
                  Au-thentication in IoT},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {649},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/649},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdolmalekiBKA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbeHO16,
  author       = {Masayuki Abe and
                  Fumitaka Hoshino and
                  Miyako Ohkubo},
  title        = {Design in Type-I, Run in Type-III: Fast and Scalable Bilinear-Type
                  Conversion using Integer Programming},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {570},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/570},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbeHO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbedBL16,
  author       = {Farzaneh Abed and
                  Francesco Berti and
                  Stefan Lucks},
  title        = {Insecurity of {RCB:} Leakage-Resilient Authenticated Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1121},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1121},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbedBL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbidinACM16,
  author       = {Aysajan Abidin and
                  Abdelrahaman Aly and
                  Sara Cleemput and
                  Mustafa A. Mustafa},
  title        = {An MPC-based Privacy-Preserving Protocol for a Local Electricity Trading
                  Market},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {797},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/797},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbidinACM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbuAA16,
  author       = {Nur Azman Abu and
                  Shekh Faisal Abdul{-}Latip and
                  Muhammad Rezal Kamel Ariffin},
  title        = {A Comparative S-Index in Factoring {RSA} Modulus via Lucas Sequences},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {937},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/937},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbuAA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbusalahF16,
  author       = {Hamza Abusalah and
                  Georg Fuchsbauer},
  title        = {Constrained PRFs for Unbounded Inputs with Short Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {279},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/279},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbusalahF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AcharyaD16,
  author       = {Kamalesh Acharya and
                  Ratna Dutta},
  title        = {Secure and {E} fficient Construction of Broadcast Encryption with
                  Dealership},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {844},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/844},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AcharyaD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AdjCCMORR16,
  author       = {Gora Adj and
                  Isaac Canales{-}Mart{\'{\i}}nez and
                  Nareli Cruz Cort{\'{e}}s and
                  Alfred Menezes and
                  Thomaz Oliveira and
                  Luis Rivera{-}Zamarripa and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {Computing discrete logarithms in cryptographically-interesting characteristic-three
                  finite fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {914},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/914},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AdjCCMORR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgievichMMS16,
  author       = {Sergey Agievich and
                  Vadim Marchuk and
                  Alexander Maslau and
                  Vlad Semenov},
  title        = {Bash-f: another {LRX} sponge function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {587},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/587},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgievichMMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Agrawal16,
  author       = {Shweta Agrawal},
  title        = {Interpolating Predicate and Functional Encryption from Learning With
                  Errors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {654},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/654},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Agrawal16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalKW16,
  author       = {Shashank Agrawal and
                  Venkata Koppula and
                  Brent Waters},
  title        = {Impossibility of Simulation Secure Functional Encryption Even with
                  Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {959},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/959},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalKW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalPY16,
  author       = {Shashank Agrawal and
                  Manoj Prabhakaran and
                  Ching{-}Hua Yu},
  title        = {Virtual Grey-Boxes Beyond Obfuscation: {A} Statistical Security Notion
                  for Cryptographic Agents},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {819},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/819},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalPY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalR16,
  author       = {Shweta Agrawal and
                  Alon Rosen},
  title        = {Online-Offline Functional Encryption for Bounded Collusions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {361},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/361},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalW16,
  author       = {Shashank Agrawal and
                  David J. Wu},
  title        = {Functional Encryption: Deterministic to Randomized Functions from
                  Simple Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {482},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/482},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AhmetzyanovaAOS16,
  author       = {Liliya R. Ahmetzyanova and
                  Evgeny K. Alekseev and
                  Igor B. Oshkin and
                  Stanislav V. Smyshlyaev and
                  Lolita A. Sonina},
  title        = {On the properties of the {CTR} encryption mode of the Magma and Kuznyechik
                  block ciphers with re-keying method based on CryptoPro Key Meshing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {628},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/628},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AhmetzyanovaAOS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AhnH16,
  author       = {Hyunjin Ahn and
                  Dong{-}Guk Han},
  title        = {Multilateral White-Box Cryptanalysis: Case study on {WB-AES} of {CHES}
                  Challenge 2016},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {807},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/807},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AhnH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AkleylekBBKM16,
  author       = {Sedat Akleylek and
                  Nina Bindel and
                  Johannes Buchmann and
                  Juliane Kr{\"{a}}mer and
                  Giorgia Azzurra Marson},
  title        = {An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {30},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/030},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AkleylekBBKM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlagicBFGSJ16,
  author       = {Gorjan Alagic and
                  Anne Broadbent and
                  Bill Fefferman and
                  Tommaso Gagliardoni and
                  Christian Schaffner and
                  Michael St. Jules},
  title        = {Computational Security of Quantum Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {424},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/424},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlagicBFGSJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlagicR16,
  author       = {Gorjan Alagic and
                  Alexander Russell},
  title        = {Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {960},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/960},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlagicR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlamatiP16,
  author       = {Navid Alamati and
                  Chris Peikert},
  title        = {Three's Compromised Too: Circular Insecurity for Any Cycle Length
                  from (Ring-)LWE},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {110},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/110},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlamatiP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlamelouBCG16,
  author       = {Quentin Alam{\'{e}}lou and
                  Paul{-}Edmond Berthier and
                  St{\'{e}}phane Cauchie and
                  Philippe Gaborit},
  title        = {Practical Reusable Fuzzy Extractors for the Set Difference Metric
                  and Adaptive Fuzzy Extractors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1100},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1100},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlamelouBCG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlamelouBCG16a,
  author       = {Quentin Alam{\'{e}}lou and
                  Olivier Blazy and
                  St{\'{e}}phane Cauchie and
                  Philippe Gaborit},
  title        = {A Code-Based Group Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1119},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1119},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlamelouBCG16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Alawatugoda16,
  author       = {Janaka Alawatugoda},
  title        = {On the Leakage-Resilient Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {32},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/032},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Alawatugoda16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtBD16,
  author       = {Martin R. Albrecht and
                  Shi Bai and
                  L{\'{e}}o Ducas},
  title        = {A subfield lattice attack on overstretched {NTRU} assumptions: Cryptanalysis
                  of some {FHE} and Graded Encoding Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {127},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/127},
  timestamp    = {Tue, 30 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbrechtBD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtGRRT16,
  author       = {Martin R. Albrecht and
                  Lorenzo Grassi and
                  Christian Rechberger and
                  Arnab Roy and
                  Tyge Tiessen},
  title        = {MiMC: Efficient Encryption and Cryptographic Hashing with Minimal
                  Multiplicative Complexity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {492},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/492},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbrechtGRRT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtRSTZ16,
  author       = {Martin R. Albrecht and
                  Christian Rechberger and
                  Thomas Schneider and
                  Tyge Tiessen and
                  Michael Zohner},
  title        = {Ciphers for {MPC} and {FHE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {687},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/687},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbrechtRSTZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AliC16,
  author       = {Shoukat Ali and
                  Murat Cenk},
  title        = {A new algorithm for residue multiplication modulo 2\({}^{\mbox{521}}\)-1},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {138},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/138},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AliC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlkimDPS16,
  author       = {Erdem Alkim and
                  L{\'{e}}o Ducas and
                  Thomas P{\"{o}}ppelmann and
                  Peter Schwabe},
  title        = {NewHope without reconciliation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1157},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1157},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlkimDPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlkimJS16,
  author       = {Erdem Alkim and
                  Philipp Jakubeit and
                  Peter Schwabe},
  title        = {A new hope on {ARM} Cortex-M},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {758},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/758},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlkimJS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlonO16,
  author       = {Bar Alon and
                  Eran Omri},
  title        = {Almost-Optimally Fair Multiparty Coin-Tossing with Nearly Three-Quarters
                  Malicious},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {800},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/800},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlonO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Alperin-Sheriff16,
  author       = {Jacob Alperin{-}Sheriff and
                  Daniel Apon},
  title        = {Dimension-Preserving Reductions from {LWE} to {LWR}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {589},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/589},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Alperin-Sheriff16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AltFMRO16,
  author       = {St{\'{e}}phanie Alt and
                  Pierre{-}Alain Fouque and
                  Gilles Macario{-}Rat and
                  Benjamin Richard and
                  Cristina Onete},
  title        = {A Cryptographic Analysis of {UMTS/LTE} {AKA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {371},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/371},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AltFMRO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlwenB16,
  author       = {Jo{\"{e}}l Alwen and
                  Jeremiah Blocki},
  title        = {Efficiently Computing Data-Independent Memory-Hard Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {115},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/115},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlwenB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlwenB16a,
  author       = {Jo{\"{e}}l Alwen and
                  Jeremiah Blocki},
  title        = {Towards Practical Attacks on Argon2i and Balloon Hashing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {759},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/759},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlwenB16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlwenBP16,
  author       = {Jo{\"{e}}l Alwen and
                  Jeremiah Blocki and
                  Krzysztof Pietrzak},
  title        = {Depth-Robust Graphs and Their Cumulative Memory Complexity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {875},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/875},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlwenBP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlwenCKKPT16,
  author       = {Jo{\"{e}}l Alwen and
                  Binyi Chen and
                  Chethan Kamath and
                  Vladimir Kolmogorov and
                  Krzysztof Pietrzak and
                  Stefano Tessaro},
  title        = {On the Complexity of Scrypt and Proofs of Space in the Parallel Random
                  Oracle Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {100},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/100},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlwenCKKPT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlwenCPRT16,
  author       = {Jo{\"{e}}l Alwen and
                  Binyi Chen and
                  Krzysztof Pietrzak and
                  Leonid Reyzin and
                  Stefano Tessaro},
  title        = {Scrypt is Maximally Memory-Hard},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {989},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/989},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlwenCPRT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlwenGKKOPRRR16,
  author       = {Jo{\"{e}}l Alwen and
                  Peter Gazi and
                  Chethan Kamath and
                  Karen Klein and
                  Georg Osang and
                  Krzysztof Pietrzak and
                  Leonid Reyzin and
                  Michal Rol{\'{\i}}nek and
                  Michal Ryb{\'{a}}r},
  title        = {On the Memory-Hardness of Data-Independent Password-Hashing Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {783},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/783},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlwenGKKOPRRR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AmbronaBS16,
  author       = {Miguel Ambrona and
                  Gilles Barthe and
                  Benedikt Schmidt},
  title        = {Automated Unbounded Analysis of Cryptographic Constructions in the
                  Generic Group Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {270},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/270},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AmbronaBS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AmbronaBS16a,
  author       = {Miguel Ambrona and
                  Gilles Barthe and
                  Benedikt Schmidt},
  title        = {Generic Transformations of Predicate Encodings: Constructions and
                  Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1105},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1105},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AmbronaBS16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AmeriMS16,
  author       = {Mohammad Hassan Ameri and
                  Javad Mohajeri and
                  Mahmoud Salmasizadeh},
  title        = {Efficient and Provable Secure Anonymous Hierarchical Identity-based
                  Broadcast Encryption {(HIBBE)} Scheme without Random Oracle},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {780},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/780},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AmeriMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AminghafariH16,
  author       = {Vahid Aminghafari and
                  Honggang Hu},
  title        = {Fruit: ultra-lightweight stream cipher with shorter internal state},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {355},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/355},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AminghafariH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AmiriAWA16,
  author       = {Ryan Amiri and
                  Aysajan Abidin and
                  Petros Wallden and
                  Erika Andersson},
  title        = {Unconditionally Secure Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {739},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/739},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AmiriAWA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AmyMGMPS16,
  author       = {Matthew Amy and
                  Olivia Di Matteo and
                  Vlad Gheorghiu and
                  Michele Mosca and
                  Alex Parent and
                  John M. Schanck},
  title        = {Estimating the cost of generic quantum pre-image attacks on {SHA-2}
                  and {SHA-3}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {992},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/992},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AmyMGMPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnadaAS16,
  author       = {Hiroaki Anada and
                  Seiko Arita and
                  Kouichi Sakurai},
  title        = {Proof of Knowledge on Monotone Predicates and its Application to Attribute-Based
                  Identifications and Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {483},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/483},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnadaAS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Anagnostopoulos16,
  author       = {Nikolaos A. Anagnostopoulos and
                  Stefan Katzenbeisser and
                  Markus Rosenstihl and
                  Andr{\'{e}} Schaller and
                  Sebastian Gabmeyer and
                  Tolga Arul},
  title        = {Low-temperature data remanence attacks against intrinsic {SRAM} PUFs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {769},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/769},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Anagnostopoulos16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnandTTU16,
  author       = {Mayuresh Vivekanand Anand and
                  Ehsan Ebrahimi Targhi and
                  Gelo Noel Tabia and
                  Dominique Unruh},
  title        = {Post-quantum Security of the CBC, CFB, OFB, CTR, and {XTS} Modes of
                  Operation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {197},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/197},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnandTTU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnanthCJ16,
  author       = {Prabhanjan Ananth and
                  Aloni Cohen and
                  Abhishek Jain},
  title        = {Cryptography with Updates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {934},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/934},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnanthCJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnanthJNSY16,
  author       = {Prabhanjan Ananth and
                  Aayush Jain and
                  Moni Naor and
                  Amit Sahai and
                  Eylon Yogev},
  title        = {Universal Obfuscation and Witness Encryption: Boosting Correctness
                  and Combining Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {281},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/281},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnanthJNSY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnanthS16,
  author       = {Prabhanjan Ananth and
                  Amit Sahai},
  title        = {Projective Arithmetic Functional Encryption and Indistinguishability
                  Obfuscation From Degree-5 Multilinear Maps},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1097},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1097},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnanthS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndrychowiczDF16,
  author       = {Marcin Andrychowicz and
                  Stefan Dziembowski and
                  Sebastian Faust},
  title        = {Circuit Compilers with {O(1/} log(n)) Leakage Rate},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {173},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/173},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AndrychowiczDF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnkeleA16,
  author       = {Ralph Ankele and
                  Robin Ankele},
  title        = {Software Benchmarking of the 2\({}^{\mbox{nd}}\) round {CAESAR} Candidates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {740},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/740},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnkeleA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnkeleBCLMSW16,
  author       = {Ralph Ankele and
                  Subhadeep Banik and
                  Avik Chakraborti and
                  Eik List and
                  Florian Mendel and
                  Siang Meng Sim and
                  Gaoli Wang},
  title        = {Related-Key Impossible-Differential Attack on Reduced-Round {SKINNY}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1127},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1127},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnkeleBCLMSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnshelAGG16,
  author       = {Iris Anshel and
                  Derek Atkins and
                  Dorian Goldfeld and
                  Paul E. Gunnells},
  title        = {Defeating the Ben-Zvi, Blackburn, and Tsaban Attack on the Algebraic
                  Eraser},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {44},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/044},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnshelAGG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnshelAGG16a,
  author       = {Iris Anshel and
                  Derek Atkins and
                  Dorian Goldfeld and
                  Paul E. Gunnells},
  title        = {Hickory Hash(TM): Implementing an Instance of an Algebraic Eraser(TM)
                  Hash Function on an {MSP430} Microcontroller},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1052},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1052},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnshelAGG16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Aono0PW16,
  author       = {Yoshinori Aono and
                  Takuya Hayashi and
                  Le Trieu Phong and
                  Lihua Wang},
  title        = {Scalable and Secure Logistic Regression via Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {111},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/111},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Aono0PW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AonoWHT16,
  author       = {Yoshinori Aono and
                  Yuntao Wang and
                  Takuya Hayashi and
                  Tsuyoshi Takagi},
  title        = {Improved Progressive {BKZ} Algorithms and their Precise Cost Estimation
                  by Sharp Simulator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {146},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/146},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AonoWHT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AponDGM16,
  author       = {Daniel Apon and
                  Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Pratyay Mukherjee},
  title        = {Cryptanalysis of Indistinguishability Obfuscations of Circuits over
                  {GGH13}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1003},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1003},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AponDGM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AponFL16,
  author       = {Daniel Apon and
                  Xiong Fan and
                  Feng{-}Hao Liu},
  title        = {Fully-Secure Lattice-Based {IBE} as Compact as {PKE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {125},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/125},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AponFL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AponFL16a,
  author       = {Daniel Apon and
                  Xiong Fan and
                  Feng{-}Hao Liu},
  title        = {Deniable Attribute Based Encryption for Branching Programs from {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {562},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/562},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AponFL16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ApplebaumR16,
  author       = {Benny Applebaum and
                  Pavel Raykov},
  title        = {On the Relationship between Statistical Zero-Knowledge and Statistical
                  Randomized Encodings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {519},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/519},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ApplebaumR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ApplebaumR16a,
  author       = {Benny Applebaum and
                  Pavel Raykov},
  title        = {Fast Pseudorandom Functions Based on Expander Graphs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {813},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/813},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ApplebaumR16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArakiFLNO16,
  author       = {Toshinori Araki and
                  Jun Furukawa and
                  Yehuda Lindell and
                  Ariel Nof and
                  Kazuma Ohara},
  title        = {High-Throughput Semi-Honest Secure Three-Party Computation with an
                  Honest Majority},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {768},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/768},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArakiFLNO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArapinisCK16,
  author       = {Myrto Arapinis and
                  V{\'{e}}ronique Cortier and
                  Steve Kremer},
  title        = {When Are Three Voters Enough for Privacy Properties?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {690},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/690},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArapinisCK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AritaN16,
  author       = {Seiko Arita and
                  Shota Nakasato},
  title        = {Fully Homomorphic Encryption for Point Numbers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {402},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/402},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AritaN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArmknechtBDGT16,
  author       = {Frederik Armknecht and
                  Colin Boyd and
                  Gareth T. Davies and
                  Kristian Gj{\o}steen and
                  Mohsen Toorani},
  title        = {Side channels in deduplication: trade-offs between leakage and efficiency},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {977},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/977},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArmknechtBDGT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArmknechtBFK16,
  author       = {Frederik Armknecht and
                  Jens{-}Matthias Bohli and
                  David Froelicher and
                  Ghassan O. Karame},
  title        = {{SPORT:} Sharing Proofs of Retrievability across Tenants},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {724},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/724},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArmknechtBFK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArmknechtMSY16,
  author       = {Frederik Armknecht and
                  Daisuke Moriyama and
                  Ahmad{-}Reza Sadeghi and
                  Moti Yung},
  title        = {Towards a Unified Security Model for Physically Unclonable Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {33},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/033},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArmknechtMSY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArriagaBF16,
  author       = {Afonso Arriaga and
                  Manuel Barbosa and
                  Pooya Farshim},
  title        = {Private Functional Encryption: Indistinguishability-Based Definitions
                  and Constructions from Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {18},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/018},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArriagaBF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArriagaIT16,
  author       = {Afonso Arriaga and
                  Vincenzo Iovino and
                  Qiang Tang},
  title        = {Updatable Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1179},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1179},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArriagaIT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArslanKAE16,
  author       = {Atakan Arslan and
                  S{\"{u}}leyman Kardas and
                  Sultan Aldirmaz {\c{C}}olak and
                  Sarp Ert{\"{u}}rk},
  title        = {Are RNGs Achilles' heel of {RFID} Security and Privacy Protocols ?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1130},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1130},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArslanKAE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AsaarSA16,
  author       = {Maryam Rajabzadeh Asaar and
                  Mahmoud Salmasizadeh and
                  Mohammad Reza Aref},
  title        = {A Provably Secure Code-based Concurrent Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {450},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/450},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AsaarSA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AsaarSA16a,
  author       = {Maryam Rajabzadeh Asaar and
                  Mahmoud Salmasizadeh and
                  Mohammad Reza Aref},
  title        = {Code-based Strong Designated Verifier Signatures: Security Analysis
                  and a New Construction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {779},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/779},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AsaarSA16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AsaarSS16,
  author       = {Maryam Rajabzadeh Asaar and
                  Mahmoud Salmasizadeh and
                  Willy Susilo},
  title        = {Proxy-based Authentication Scheme for Vehicular Ad Hoc Networks: Security
                  Analysis and an Efficient Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {822},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/822},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AsaarSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AsharovLSZ16,
  author       = {Gilad Asharov and
                  Yehuda Lindell and
                  Thomas Schneider and
                  Michael Zohner},
  title        = {More Efficient Oblivious Transfer Extensions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {602},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/602},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AsharovLSZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AsharovNSS16,
  author       = {Gilad Asharov and
                  Moni Naor and
                  Gil Segev and
                  Ido Shahaf},
  title        = {Searchable Symmetric Encryption: Optimal Locality in Linear Space
                  via Two-Dimensional Balanced Allocations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {251},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/251},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AsharovNSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AshurBD16,
  author       = {Tomer Ashur and
                  Achiya Bar{-}On and
                  Orr Dunkelman},
  title        = {Cryptanalysis of {GOST2}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {532},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/532},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AshurBD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AshurBR16,
  author       = {Tomer Ashur and
                  Tim Beyne and
                  Vincent Rijmen},
  title        = {Revisiting the Wrong-Key-Randomization Hypothesis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {990},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/990},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AshurBR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AshurL16,
  author       = {Tomer Ashur and
                  Yunwen Liu},
  title        = {Rotational Cryptanalysis in the Presence of Constants},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {826},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/826},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AshurL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AshurM16,
  author       = {Tomer Ashur and
                  Bart Mennink},
  title        = {Damaging, Simplifying, and Salvaging p-OMD},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {534},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/534},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AshurM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AshurR16,
  author       = {Tomer Ashur and
                  Vincent Rijmen},
  title        = {On Linear Hulls and Trails in Simon},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {88},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/088},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AshurR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseKMTV16,
  author       = {Giuseppe Ateniese and
                  Aggelos Kiayias and
                  Bernardo Magri and
                  Yiannis Tselekounis and
                  Daniele Venturi},
  title        = {Secure Outsourcing of Circuit Manufacturing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {527},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/527},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseKMTV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseMVA16,
  author       = {Giuseppe Ateniese and
                  Bernardo Magri and
                  Daniele Venturi and
                  Ewerton R. Andrade},
  title        = {Redactable Blockchain - or - Rewriting History in Bitcoin and Friends},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {757},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/757},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseMVA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AticiYS16,
  author       = {Ali Can Atici and
                  Cemal Yilmaz and
                  Erkay Savas},
  title        = {Remote Cache-Timing Attack without Learning Phase},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {2},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/002},
  timestamp    = {Wed, 21 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AticiYS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtighehchiB16,
  author       = {Kevin Atighehchi and
                  Alexis Bonnecaze},
  title        = {On Plausible Tree Hash Modes for {SHA-3}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {658},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/658},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtighehchiB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtkinsG16,
  author       = {Derek Atkins and
                  Dorian Goldfeld},
  title        = {Addressing the Algebraic Eraser Diffie-Hellman Over-the-Air Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {205},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/205},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtkinsG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtzeiBC16,
  author       = {Nicola Atzei and
                  Massimo Bartoletti and
                  Tiziana Cimoli},
  title        = {A survey of attacks on Ethereum smart contracts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1007},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1007},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtzeiBC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Avanzi16,
  author       = {Roberto Avanzi},
  title        = {The {QARMA} Block Cipher Family - Almost {MDS} Matrices Over Rings
                  With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With
                  Non-Involutory Central Rounds, and Search Heuristics for Low-Latency
                  S-Boxes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {444},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/444},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Avanzi16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Avanzi16a,
  author       = {Roberto Avanzi},
  title        = {A Salad of Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1171},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1171},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Avanzi16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AvivCMR16,
  author       = {Adam J. Aviv and
                  Seung Geol Choi and
                  Travis Mayberry and
                  Daniel S. Roche},
  title        = {ObliviSync: Practical Oblivious File Backup and Synchronization},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {543},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/543},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AvivCMR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AydayTY16,
  author       = {Erman Ayday and
                  Qiang Tang and
                  Arif Yilmaz},
  title        = {Cryptographic Solutions for Credibility and Liability Issues of Genomic
                  Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {478},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/478},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AydayTY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AzarderakhshJKK16,
  author       = {Reza Azarderakhsh and
                  David Jao and
                  Kassem Kalach and
                  Brian Koziel and
                  Christopher Leonardi},
  title        = {Key Compression for Isogeny-Based Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {229},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/229},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AzarderakhshJKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AzarderakhshKJK16,
  author       = {Reza Azarderakhsh and
                  Brian Koziel and
                  Amir Jalali and
                  Mehran Mozaffari Kermani and
                  David Jao},
  title        = {{NEON-SIDH:} Effi cient Implementation of Supersingular Isogeny Diffi
                  e-Hellman Key-Exchange Protocol on {ARM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {669},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/669},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AzarderakhshKJK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadrinarayananG16,
  author       = {Saikrishna Badrinarayanan and
                  Vipul Goyal and
                  Aayush Jain and
                  Amit Sahai},
  title        = {Verifiable Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {629},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/629},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadrinarayananG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadrinarayananK16,
  author       = {Saikrishna Badrinarayanan and
                  Dakshita Khurana and
                  Rafail Ostrovsky and
                  Ivan Visconti},
  title        = {New Feasibility Results in Unconditional UC-Secure Computation with
                  (Malicious) PUFs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {636},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/636},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadrinarayananK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BagadiaCRMC16,
  author       = {Krishna Bagadia and
                  Urbi Chatterjee and
                  Debapriya Basu Roy and
                  Debdeep Mukhopadhyay and
                  Rajat Subhra Chakraborty},
  title        = {Exploiting Safe Error based Leakage of {RFID} Authentication Protocol
                  using Hardware Trojan Horse},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1149},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1149},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BagadiaCRMC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BagheriHJMS16,
  author       = {Nasour Bagheri and
                  Tao Huang and
                  Keting Jia and
                  Florian Mendel and
                  Yu Sasaki},
  title        = {Cryptanalysis of Reduced {NORX}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {436},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/436},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BagheriHJMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BagheryAE16,
  author       = {Karim Baghery and
                  Behzad Abdolmaleki and
                  Mohammad Javad Emadi},
  title        = {Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication
                  Protocol for {EPC} Tags},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {387},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/387},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BagheryAE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BahmaniBBPSSW16,
  author       = {Raad Bahmani and
                  Manuel Barbosa and
                  Ferdinand Brasser and
                  Bernardo Portela and
                  Ahmad{-}Reza Sadeghi and
                  Guillaume Scerri and
                  Bogdan Warinschi},
  title        = {Secure Multiparty Computation from {SGX}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1057},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1057},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BahmaniBBPSSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaiDOX16,
  author       = {Ge Bai and
                  Ivan Damg{\aa}rd and
                  Claudio Orlandi and
                  Yu Xia},
  title        = {Non-Interactive Verifiable Secret Sharing For Monotone Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {78},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/078},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaiDOX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaiLS16,
  author       = {Shi Bai and
                  Thijs Laarhoven and
                  Damien Stehl{\'{e}}},
  title        = {Tuple lattice sieving},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {713},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/713},
  timestamp    = {Tue, 30 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaiLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaiSW16,
  author       = {Shi Bai and
                  Damien Stehl{\'{e}} and
                  Weiqiang Wen},
  title        = {Improved Reduction from the Bounded Distance Decoding Problem to the
                  Unique Shortest Vector Problem in Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {753},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/753},
  timestamp    = {Tue, 30 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaiSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaiW16,
  author       = {Jian Bai and
                  Dingkang Wang},
  title        = {The Lightest 4x4 {MDS} Matrices over GL(4, {\unicode{54589}}\({}_{\mbox{2}}\))},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {686},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/686},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaiW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaiW16a,
  author       = {Jian Bai and
                  Dingkang Wang},
  title        = {A New Class of Differentially 4-uniform Permutations from the Inverse
                  Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {941},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/941},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaiW16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BajardEHZ16,
  author       = {Jean{-}Claude Bajard and
                  Julien Eynard and
                  M. Anwar Hasan and
                  Vincent Zucca},
  title        = {A Full {RNS} Variant of {FV} like Somewhat Homomorphic Encryption
                  Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {510},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/510},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BajardEHZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BalakrishnanILV16,
  author       = {Jennifer S. Balakrishnan and
                  Sorina Ionica and
                  Kristin E. Lauter and
                  Christelle Vincent},
  title        = {Constructing genus 3 hyperelliptic Jacobians with {CM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {328},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/328},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BalakrishnanILV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaldimtsiPPST16,
  author       = {Foteini Baldimtsi and
                  Dimitrios Papadopoulos and
                  Stavros Papadopoulos and
                  Alessandra Scafuro and
                  Nikos Triandopoulos},
  title        = {Secure Computation in Online Social Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {948},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/948},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BaldimtsiPPST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BallDKM16,
  author       = {Marshall Ball and
                  Dana Dachman{-}Soled and
                  Mukul Kulkarni and
                  Tal Malkin},
  title        = {Non-Malleable Codes for Bounded Depth, Bounded Fan-in Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {307},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/307},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BallDKM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BallMR16,
  author       = {Marshall Ball and
                  Tal Malkin and
                  Mike Rosulek},
  title        = {Garbling Gadgets for Boolean and Arithmetic Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {969},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/969},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BallMR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BalticoCF16,
  author       = {Carmen Elisabetta Zaira Baltico and
                  Dario Catalano and
                  Dario Fiore},
  title        = {Practical Functional Encryption for Bilinear Forms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1104},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1104},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BalticoCF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BanaC16,
  author       = {Gergei Bana and
                  Rohit Chadha},
  title        = {Verification Methods for the Computationally Complete Symbolic Attacker
                  Based on Indistinguishability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {69},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/069},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BanaC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BanasikDM16,
  author       = {Waclaw Banasik and
                  Stefan Dziembowski and
                  Daniel Malinowski},
  title        = {Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies Without
                  Scripts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {451},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/451},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BanasikDM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BanikBR16,
  author       = {Subhadeep Banik and
                  Andrey Bogdanov and
                  Francesco Regazzoni},
  title        = {Atomic-AES: {A} Compact Implementation of the {AES} Encryption/Decryption
                  Core},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {927},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/927},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BanikBR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BanikBR16a,
  author       = {Subhadeep Banik and
                  Andrey Bogdanov and
                  Francesco Regazzoni},
  title        = {Atomic-AES v 2.0},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1005},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1005},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BanikBR16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BanikI16,
  author       = {Subhadeep Banik and
                  Takanori Isobe},
  title        = {Cryptanalysis of the Full Spritz Stream Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {92},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/092},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BanikI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BannierBF16,
  author       = {Arnaud Bannier and
                  Nicolas Bodin and
                  Eric Filiol},
  title        = {Partition-Based Trapdoor Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {493},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/493},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BannierBF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BannierBF16a,
  author       = {Arnaud Bannier and
                  Nicolas Bodin and
                  Eric Filiol},
  title        = {Automatic Search for a Maximum Probability Differential Characteristic
                  in a Substitution-Permutation Network},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {652},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/652},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BannierBF16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BansarkhaniK16,
  author       = {Rachid El Bansarkhani and
                  Ali {El Kaafarani}},
  title        = {Post-Quantum Attribute-Based Signatures from Lattice Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {823},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/823},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BansarkhaniK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BansarkhaniMP16,
  author       = {Rachid El Bansarkhani and
                  Mohamed Saied Emam Mohamed and
                  Albrecht Petzoldt},
  title        = {{MQSAS} - {A} Multivariate Sequential Aggregate Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {503},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/503},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BansarkhaniMP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bar-OnBDK16,
  author       = {Achiya Bar{-}On and
                  Eli Biham and
                  Orr Dunkelman and
                  Nathan Keller},
  title        = {Efficient Slide Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1177},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1177},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bar-OnBDK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Barak16,
  author       = {Boaz Barak},
  title        = {Hopes, Fears and Software Obfuscation: {A} Survey},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {210},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/210},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Barak16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarbosaPSW16,
  author       = {Manuel Barbosa and
                  Bernardo Portela and
                  Guillaume Scerri and
                  Bogdan Warinschi},
  title        = {Foundations of Hardware-Based Attested Computation and Application
                  to {SGX}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {14},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/014},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarbosaPSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarbulescuGGM16,
  author       = {Razvan Barbulescu and
                  Pierrick Gaudry and
                  Aurore Guillevic and
                  Fran{\c{c}}ois Morain},
  title        = {Improving {NFS} for the discrete logarithm problem in non-prime finite
                  fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {605},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/605},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarbulescuGGM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarbulescuSTS16,
  author       = {Mihai Barbulescu and
                  Adrian Stratulat and
                  Vlad Traista{-}Popescu and
                  Emil Simion},
  title        = {{RSA} Weak Public Keys available on the Internet},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {515},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/515},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarbulescuSTS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarretoLNRZ16,
  author       = {Paulo S. L. M. Barreto and
                  Patrick Longa and
                  Michael Naehrig and
                  Jefferson E. Ricardini and
                  Gustavo H. M. Zanon},
  title        = {Sharper Ring-LWE Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1026},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1026},
  timestamp    = {Fri, 06 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarretoLNRZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BartheDFGSS16,
  author       = {Gilles Barthe and
                  Fran{\c{c}}ois Dupressoir and
                  Sebastian Faust and
                  Benjamin Gr{\'{e}}goire and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Pierre{-}Yves Strub},
  title        = {Parallel Implementations of Masking Schemes and the Bounded Moment
                  Leakage Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {912},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/912},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BartheDFGSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BartolettiZ16,
  author       = {Massimo Bartoletti and
                  Roberto Zunino},
  title        = {Constant-deposit multiparty lotteries on Bitcoin},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {955},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/955},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BartolettiZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BattistelloCPZ16,
  author       = {Alberto Battistello and
                  Jean{-}S{\'{e}}bastien Coron and
                  Emmanuel Prouff and
                  Rina Zeitoun},
  title        = {Horizontal Side-Channel Attacks and Countermeasures on the {ISW} Masking
                  Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {540},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/540},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BattistelloCPZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Baum16,
  author       = {Carsten Baum},
  title        = {On Garbling Schemes With And Without Privacy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {150},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/150},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Baum16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaumDLN16,
  author       = {Carsten Baum and
                  Ivan Damg{\aa}rd and
                  Kasper Green Larsen and
                  Michael Nielsen},
  title        = {How to prove knowledge of small secrets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {538},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/538},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaumDLN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaumDOP16,
  author       = {Carsten Baum and
                  Ivan Damg{\aa}rd and
                  Sabine Oechsner and
                  Chris Peikert},
  title        = {Efficient Commitments and Zero-Knowledge Protocols from Ring-SIS with
                  Applications to Lattice-based Threshold Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {997},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/997},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaumDOP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaumDTZ16,
  author       = {Carsten Baum and
                  Ivan Damg{\aa}rd and
                  Tomas Toft and
                  Rasmus Winther Zakarias},
  title        = {Better Preprocessing for Secure Multiparty Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {48},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/048},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaumDTZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaumOS16,
  author       = {Carsten Baum and
                  Emmanuela Orsini and
                  Peter Scholl},
  title        = {Efficient Secure Multiparty Computation with Identifiable Abort},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {187},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/187},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaumOS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BayEK16,
  author       = {Asl{\'{\i}} Bay and
                  Oguzhan Ersoy and
                  Ferhat Karako{\c{c}}},
  title        = {Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption
                  Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {640},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/640},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BayEK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaysalCO16,
  author       = {Adnan Baysal and
                  Mustafa {\c{C}}oban and
                  Mehmet {\"{O}}zen},
  title        = {Feistel Like Construction of Involutory Binary Matrices With High
                  Branch Number},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {751},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/751},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaysalCO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaysalK16,
  author       = {Adnan Baysal and
                  {\"{U}}nal Ko{\c{c}}abas},
  title        = {ELiF : An Extremely Lightweight {\&} Flexible Block Cipher Family
                  and Its Experimental Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {752},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/752},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaysalK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BazinSHB16,
  author       = {R{\'{e}}mi Bazin and
                  Alexander Schaub and
                  Omar Hasan and
                  Lionel Brunie},
  title        = {A Decentralized Anonymity-Preserving Reputation System with Constant-time
                  Score Retrieval},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {416},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/416},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BazinSHB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BedoCRT16,
  author       = {Justin Bedo and
                  Thomas C. Conway and
                  Kim Ramchen and
                  Vanessa Teague},
  title        = {Privately Matching k-mers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {781},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/781},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BedoCRT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Beierle16,
  author       = {Christof Beierle},
  title        = {Pen and Paper Arguments for {SIMON} and SIMON-like Designs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {651},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/651},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Beierle16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeierleJKL0PSSS16,
  author       = {Christof Beierle and
                  J{\'{e}}r{\'{e}}my Jean and
                  Stefan K{\"{o}}lbl and
                  Gregor Leander and
                  Amir Moradi and
                  Thomas Peyrin and
                  Yu Sasaki and
                  Pascal Sasdrich and
                  Siang Meng Sim},
  title        = {The {SKINNY} Family of Block Ciphers and its Low-Latency Variant {MANTIS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {660},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/660},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeierleJKL0PSSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeierleKL16,
  author       = {Christof Beierle and
                  Thorsten Kranz and
                  Gregor Leander},
  title        = {Lightweight Multiplication in GF(2n) with Applications to {MDS} Matrices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {119},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/119},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeierleKL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BelaidBPPTV16,
  author       = {Sonia Bela{\"{\i}}d and
                  Fabrice Benhamouda and
                  Alain Passel{\`{e}}gue and
                  Emmanuel Prouff and
                  Adrian Thillard and
                  Damien Vergnaud},
  title        = {Randomness Complexity of Private Circuits for Multiplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {211},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/211},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BelaidBPPTV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BelgarricBBDDGH16,
  author       = {Pierre Belgarric and
                  Shivam Bhasin and
                  Nicolas Bruneau and
                  Jean{-}Luc Danger and
                  Nicolas Debande and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Zakaria Najm and
                  Olivier Rioul},
  title        = {Time-Frequency Analysis for Second-Order Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {772},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/772},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BelgarricBBDDGH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BelgarricFMT16,
  author       = {Pierre Belgarric and
                  Pierre{-}Alain Fouque and
                  Gilles Macario{-}Rat and
                  Mehdi Tibouchi},
  title        = {Side-Channel Analysis of Weierstrass and Koblitz Curve {ECDSA} on
                  Android Smartphones},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {231},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/231},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BelgarricFMT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareBT16,
  author       = {Mihir Bellare and
                  Daniel J. Bernstein and
                  Stefano Tessaro},
  title        = {Hash-Function based PRFs: {AMAC} and its Multi-User Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {142},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/142},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareBT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareFS16,
  author       = {Mihir Bellare and
                  Georg Fuchsbauer and
                  Alessandra Scafuro},
  title        = {NIZKs with an Untrusted {CRS:} Security in the Face of Parameter Subversion},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {372},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/372},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareFS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareHT16,
  author       = {Mihir Bellare and
                  Viet Tung Hoang and
                  Stefano Tessaro},
  title        = {Message-recovery attacks on Feistel-based Format Preserving Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {794},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/794},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareHT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareKR16,
  author       = {Mihir Bellare and
                  Daniel Kane and
                  Phillip Rogaway},
  title        = {Big-Key Symmetric Encryption: Resisting Key Exfiltration},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {541},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/541},
  timestamp    = {Tue, 09 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareKR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellarePS16,
  author       = {Mihir Bellare and
                  Bertram Poettering and
                  Douglas Stebila},
  title        = {Deterring Certificate Subversion: Efficient Double-Authentication-Preventing
                  Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1016},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1016},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellarePS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareSJNS16,
  author       = {Mihir Bellare and
                  Asha Camper Singh and
                  Joseph Jaeger and
                  Maya Nyayapati and
                  Igors Stepanovs},
  title        = {Ratcheted Encryption and Key Exchange: The Security of Messaging},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1028},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1028},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareSJNS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareSW16,
  author       = {Mihir Bellare and
                  Igors Stepanovs and
                  Brent Waters},
  title        = {New Negative Results on Differing-Inputs Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {162},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/162},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareT16,
  author       = {Mihir Bellare and
                  Bj{\"{o}}rn Tackmann},
  title        = {Nonce-Based Cryptography: Retaining Security when Randomness Fails},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {290},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/290},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareT16a,
  author       = {Mihir Bellare and
                  Bj{\"{o}}rn Tackmann},
  title        = {The Multi-User Security of Authenticated Encryption: {AES-GCM} in
                  {TLS} 1.3},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {564},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/564},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareT16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ben-EfraimLO16,
  author       = {Aner Ben{-}Efraim and
                  Yehuda Lindell and
                  Eran Omri},
  title        = {Optimizing Semi-Honest Secure Multiparty Computation for the Internet},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1066},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1066},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ben-EfraimLO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ben-SassonBCGGH16,
  author       = {Eli Ben{-}Sasson and
                  Iddo Bentov and
                  Alessandro Chiesa and
                  Ariel Gabizon and
                  Daniel Genkin and
                  Matan Hamilis and
                  Evgenya Pergament and
                  Michael Riabzev and
                  Mark Silberstein and
                  Eran Tromer and
                  Madars Virza},
  title        = {Computational integrity with a public random string from quasi-linear
                  PCPs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {646},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/646},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ben-SassonBCGGH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ben-SassonCFGRS16,
  author       = {Eli Ben{-}Sasson and
                  Alessandro Chiesa and
                  Michael A. Forbes and
                  Ariel Gabizon and
                  Michael Riabzev and
                  Nicholas Spooner},
  title        = {On Probabilistic Checking in Perfect Zero Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {988},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/988},
  timestamp    = {Tue, 30 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ben-SassonCFGRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ben-SassonCGRS16,
  author       = {Eli Ben{-}Sasson and
                  Alessandro Chiesa and
                  Ariel Gabizon and
                  Michael Riabzev and
                  Nicholas Spooner},
  title        = {Short Interactive Oracle Proofs with Constant Query Complexity, via
                  Composition and Sumcheck},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {324},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/324},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ben-SassonCGRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ben-SassonCGV16,
  author       = {Eli Ben{-}Sasson and
                  Alessandro Chiesa and
                  Ariel Gabizon and
                  Madars Virza},
  title        = {Quasi-Linear Size Zero Knowledge from Linear-Algebraic PCPs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {21},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/021},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ben-SassonCGV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ben-SassonCS16,
  author       = {Eli Ben{-}Sasson and
                  Alessandro Chiesa and
                  Nicholas Spooner},
  title        = {Interactive Oracle Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {116},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/116},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ben-SassonCS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenhamoudaCTV16,
  author       = {Fabrice Benhamouda and
                  C{\'{e}}line Chevalier and
                  Adrian Thillard and
                  Damien Vergnaud},
  title        = {Easing Coppersmith Methods using Analytic Combinatorics: Applications
                  to Public-Key Cryptography with Weak Pseudorandomness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {7},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/007},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenhamoudaCTV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BenhamoudaLM016,
  author       = {Fabrice Benhamouda and
                  Tancr{\`{e}}de Lepoint and
                  Claire Mathieu and
                  Hang Zhou},
  title        = {Optimization of Bootstrapping in Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {785},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/785},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BenhamoudaLM016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BentovPS16,
  author       = {Iddo Bentov and
                  Rafael Pass and
                  Elaine Shi},
  title        = {The Sleepy Model of Consensus},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {918},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/918},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BentovPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BentovPS16a,
  author       = {Iddo Bentov and
                  Rafael Pass and
                  Elaine Shi},
  title        = {Snow White: Provably Secure Proofs of Stake},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {919},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/919},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BentovPS16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernhardCPSW16,
  author       = {David Bernhard and
                  V{\'{e}}ronique Cortier and
                  Olivier Pereira and
                  Ben Smyth and
                  Bogdan Warinschi},
  title        = {Adapting Helios for provable ballot privacy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {756},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/756},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernhardCPSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernhardKV16,
  author       = {David Bernhard and
                  Oksana Kulyk and
                  Melanie Volkamer},
  title        = {Security Proofs for Participation Privacy and Stronger Veri ability
                  for Helios},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {431},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/431},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernhardKV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernhardPW16,
  author       = {David Bernhard and
                  Olivier Pereira and
                  Bogdan Warinschi},
  title        = {How not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and
                  Applications to Helios},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {771},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/771},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernhardPW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernhardW16,
  author       = {David Bernhard and
                  Bogdan Warinschi},
  title        = {Cryptographic Voting - {A} Gentle Introduction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {765},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/765},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernhardW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinCLV16,
  author       = {Daniel J. Bernstein and
                  Chitchanok Chuengsatiansup and
                  Tanja Lange and
                  Christine van Vredendaal},
  title        = {{NTRU} Prime},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {461},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/461},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinCLV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernsteinELNPS016,
  author       = {Daniel J. Bernstein and
                  Susanne Engels and
                  Tanja Lange and
                  Ruben Niederhagen and
                  Christof Paar and
                  Peter Schwabe and
                  Ralf Zimmermann},
  title        = {Faster discrete logarithms on FPGAs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {382},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/382},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernsteinELNPS016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BertiKPPS16,
  author       = {Francesco Berti and
                  Fran{\c{c}}ois Koeune and
                  Olivier Pereira and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Leakage-Resilient and Misuse-Resistant Authenticated Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {996},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/996},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BertiKPPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BertoniDPAK16,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche and
                  Ronny Van Keer},
  title        = {KangarooTwelve: fast hashing based on Keccak-p},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {770},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/770},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BertoniDPAK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BertoniDPAK16a,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche and
                  Ronny Van Keer},
  title        = {Farfalle: parallel permutation-based cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1188},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1188},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BertoniDPAK16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BertoniM16,
  author       = {Guido Bertoni and
                  Marco Martinoli},
  title        = {A Methodology for the Characterisation of Leakages in Combinatorial
                  Logic},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {841},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/841},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BertoniM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeyneB16,
  author       = {Tim Beyne and
                  Beg{\"{u}}l Bilgin},
  title        = {Uniform First-Order Threshold Implementations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {715},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/715},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeyneB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bhandari16,
  author       = {Anindya Shankar Bhandari},
  title        = {Near Collisions in the {RC4} Stream Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {881},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/881},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bhandari16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhargavanBFGKB16,
  author       = {Karthikeyan Bhargavan and
                  Christina Brzuska and
                  C{\'{e}}dric Fournet and
                  Matthew Green and
                  Markulf Kohlweiss and
                  Santiago Zanella B{\'{e}}guelin},
  title        = {Downgrade Resilience in Key-Exchange Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {72},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/072},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BhargavanBFGKB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhargavanDFKPPR16,
  author       = {Karthikeyan Bhargavan and
                  Antoine Delignat{-}Lavaud and
                  C{\'{e}}dric Fournet and
                  Markulf Kohlweiss and
                  Jianyang Pan and
                  Jonathan Protzenko and
                  Aseem Rastogi and
                  Nikhil Swamy and
                  Santiago Zanella B{\'{e}}guelin and
                  Jean Karim Zinzindohoue},
  title        = {Implementing and Proving the {TLS} 1.3 Record Layer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1178},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1178},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BhargavanDFKPPR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhargavanL16,
  author       = {Karthikeyan Bhargavan and
                  Ga{\"{e}}tan Leurent},
  title        = {On the Practical (In-)Security of 64-bit Block Ciphers: Collision
                  Attacks on {HTTP} over {TLS} and OpenVPN},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {798},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/798},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BhargavanL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhattacharyaM16,
  author       = {Sarani Bhattacharya and
                  Debdeep Mukhopadhyay},
  title        = {Curious case of Rowhammer: Flipping Secret Exponent Bits using Timing
                  Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {618},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/618},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BhattacharyaM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhaumikN16,
  author       = {Ritam Bhaumik and
                  Mridul Nandi},
  title        = {OleF: An Inverse-Free Online Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1090},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1090},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BhaumikN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BiagioniMV16,
  author       = {Silvio Biagioni and
                  Daniel Masny and
                  Daniele Venturi},
  title        = {Naor-Yung Paradigm with Shared Randomness and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {880},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/880},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BiagioniMV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BindelBK16,
  author       = {Nina Bindel and
                  Johannes Buchmann and
                  Juliane Kr{\"{a}}mer},
  title        = {Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {415},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/415},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BindelBK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BiryukovPU16,
  author       = {Alex Biryukov and
                  L{\'{e}}o Perrin and
                  Aleksei Udovenko},
  title        = {Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {71},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/071},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BiryukovPU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BiryukovVC16,
  author       = {Alex Biryukov and
                  Vesselin Velichkov and
                  Yann Le Corre},
  title        = {Automatic Search for the Best Trails in {ARX:} Application to Block
                  Cipher {\textbackslash}textsc\{Speck\}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {409},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/409},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BiryukovVC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyBKPV16,
  author       = {Nir Bitansky and
                  Zvika Brakerski and
                  Yael Tauman Kalai and
                  Omer Paneth and
                  Vinod Vaikuntanathan},
  title        = {3-Message Zero Knowledge Against Human Ignorance},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {213},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/213},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BitanskyBKPV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyDV16,
  author       = {Nir Bitansky and
                  Akshay Degwekar and
                  Vinod Vaikuntanathan},
  title        = {Structure vs Hardness through the Obfuscation Lens},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {574},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/574},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BitanskyDV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyLP16,
  author       = {Nir Bitansky and
                  Huijia Lin and
                  Omer Paneth},
  title        = {On Removing Graded Encodings from Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {962},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/962},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BitanskyLP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyNPW16,
  author       = {Nir Bitansky and
                  Ryo Nishimaki and
                  Alain Passel{\`{e}}gue and
                  Daniel Wichs},
  title        = {From Cryptomania to Obfustopia through Secret-Key Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {558},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/558},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BitanskyNPW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlackburnR16,
  author       = {Simon R. Blackburn and
                  Matthew J. B. Robshaw},
  title        = {On the Security of the Algebraic Eraser Tag Authentication Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {91},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/091},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlackburnR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlazyC16,
  author       = {Olivier Blazy and
                  C{\'{e}}line Chevalier},
  title        = {Structure-Preserving Smooth Projective Hashing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {258},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/258},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlazyC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlazyCG16,
  author       = {Olivier Blazy and
                  C{\'{e}}line Chevalier and
                  Paul Germouty},
  title        = {Adaptive Oblivious Transfer and Generalizations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {259},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/259},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlazyCG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlazyDSS16,
  author       = {Olivier Blazy and
                  David Derler and
                  Daniel Slamanig and
                  Raphael Spreitzer},
  title        = {Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures
                  with Verifiable Controllable Linkability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {82},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/082},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlazyDSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlockiDB16,
  author       = {Jeremiah Blocki and
                  Anupam Datta and
                  Joseph Bonneau},
  title        = {Differentially Private Password Frequency Lists},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {153},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/153},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlockiDB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlockiZ16,
  author       = {Jeremiah Blocki and
                  Hong{-}Sheng Zhou},
  title        = {Designing Proof of Human-work Puzzles for Cryptocurrency and Beyond},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {145},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/145},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlockiZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlomerL16,
  author       = {Johannes Bl{\"{o}}mer and
                  Gennadij Liske},
  title        = {Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding
                  Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {206},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/206},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlomerL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BockZDSJ16,
  author       = {Hanno B{\"{o}}ck and
                  Aaron Zauner and
                  Sean Devlin and
                  Juraj Somorovsky and
                  Philipp Jovanovic},
  title        = {Nonce-Disrespecting Adversaries: Practical Forgery Attacks on {GCM}
                  in {TLS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {475},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/475},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BockZDSJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoelterPP16,
  author       = {Tobias Boelter and
                  Rishabh Poddar and
                  Raluca Ada Popa},
  title        = {A Secure One-Roundtrip Index for Range Queries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {568},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/568},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoelterPP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogdanovIVW16,
  author       = {Andrej Bogdanov and
                  Yuval Ishai and
                  Emanuele Viola and
                  Christopher Williamson},
  title        = {Bounded Indistinguishability and the Complexity of Recovering Secrets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {565},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/565},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BogdanovIVW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogdanovLT16,
  author       = {Andrey Bogdanov and
                  Martin M. Lauridsen and
                  Elmar Tischhauser},
  title        = {Comb to Pipeline: Fast Software Encryption Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {47},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/047},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BogdanovLT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogdanovTV16,
  author       = {Andrey Bogdanov and
                  Elmar Tischhauser and
                  Philip S. Vejre},
  title        = {Multivariate Linear Cryptanalysis: The Past and Future of {PRESENT}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {667},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/667},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BogdanovTV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogosGV16,
  author       = {Sonia Bogos and
                  John Gaspoz and
                  Serge Vaudenay},
  title        = {Cryptanalysis of a Homomorphic Encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {775},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/775},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BogosGV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogosV16,
  author       = {Sonia Bogos and
                  Serge Vaudenay},
  title        = {Optimization of {LPN} Solving Algorithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {288},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/288},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BogosV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogosV16a,
  author       = {Sonia Bogos and
                  Serge Vaudenay},
  title        = {How to Sequentialize Independent Parallel Attacks?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {296},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/296},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BogosV16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogosV16b,
  author       = {Sonia Bogos and
                  Serge Vaudenay},
  title        = {Observations on the {LPN} Solving Algorithm from Eurocrypt'16},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {437},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/437},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BogosV16b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonnoronF16,
  author       = {Guillaume Bonnoron and
                  Caroline Fontaine},
  title        = {A note on Ring-LWE security in the case of Fully Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {385},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/385},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonnoronF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoorghanySJ16,
  author       = {Ahmad Boorghany and
                  Siavash Bayat Sarmadi and
                  Rasool Jalili},
  title        = {Efficient Lattice-based Authenticated Encryption: {A} Practice-Oriented
                  Provable Security Approach},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {268},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/268},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoorghanySJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BootleCCGG16,
  author       = {Jonathan Bootle and
                  Andrea Cerulli and
                  Pyrros Chaidos and
                  Essam Ghadafi and
                  Jens Groth},
  title        = {Foundations of Fully Dynamic Group Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {368},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/368},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BootleCCGG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BootleCCGP16,
  author       = {Jonathan Bootle and
                  Andrea Cerulli and
                  Pyrros Chaidos and
                  Jens Groth and
                  Christophe Petit},
  title        = {Efficient Zero-Knowledge Arguments for Arithmetic Circuits in the
                  Discrete Log Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {263},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/263},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BootleCCGP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosCDMNNRS16,
  author       = {Joppe W. Bos and
                  Craig Costello and
                  L{\'{e}}o Ducas and
                  Ilya Mironov and
                  Michael Naehrig and
                  Valeria Nikolaenko and
                  Ananth Raghunathan and
                  Douglas Stebila},
  title        = {Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from
                  {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {659},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/659},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosCDMNNRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosCIV16,
  author       = {Joppe W. Bos and
                  Wouter Castryck and
                  Ilia Iliashenko and
                  Frederik Vercauteren},
  title        = {Privacy-friendly Forecasting for the Smart Grid using Homomorphic
                  Encryption and the Group Method of Data Handling},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1117},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1117},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosCIV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosF16,
  author       = {Joppe W. Bos and
                  Simon Friedberger},
  title        = {Fast Arithmetic Modulo 2\({}^{\mbox{xp\({}^{\mbox{y{\(\pm\)}}}\)}}\)
                  1},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {986},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/986},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BossGGL0S16,
  author       = {Erik Boss and
                  Vincent Grosso and
                  Tim G{\"{u}}neysu and
                  Gregor Leander and
                  Amir Moradi and
                  Tobias Schneider},
  title        = {Strong 8-bit Sboxes with Efficient Masking in Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {647},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/647},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BossGGL0S16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BossiV16,
  author       = {Simone Bossi and
                  Andrea Visconti},
  title        = {What users should know about Full Disk Encryption based on {LUKS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {274},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/274},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BossiV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bost16,
  author       = {Raphael Bost},
  title        = {Sophos - Forward Secure Searchable Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {728},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/728},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bost16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BostFP16,
  author       = {Raphael Bost and
                  Pierre{-}Alain Fouque and
                  David Pointcheval},
  title        = {Verifiable Dynamic Symmetric Searchable Encryption: Optimality and
                  Forward Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {62},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/062},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BostFP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BostS16,
  author       = {Raphael Bost and
                  Olivier Sanders},
  title        = {Trick or Tweak: On the (In)security of OTR's Tweaks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {234},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/234},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BostS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouraC16,
  author       = {Christina Boura and
                  Anne Canteaut},
  title        = {Another view of the division property},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {554},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/554},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouraC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouraCLPSSS16,
  author       = {Christina Boura and
                  Avik Chakraborti and
                  Ga{\"{e}}tan Leurent and
                  Goutam Paul and
                  Dhiman Saha and
                  Hadi Soleimany and
                  Valentin Suder},
  title        = {Key Recovery Attack against 2.5-round pi-Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {502},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/502},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouraCLPSSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoursePMW16,
  author       = {Florian Bourse and
                  Rafa{\"{e}}l Del Pino and
                  Michele Minelli and
                  Hoeteck Wee},
  title        = {{FHE} Circuit Privacy Almost For Free},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {381},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/381},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoursePMW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoydC16,
  author       = {Colin Boyd and
                  Christopher Carr},
  title        = {Fair Client Puzzles from the Bitcoin Blockchain},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {680},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/680},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoydC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyenCH16,
  author       = {Xavier Boyen and
                  Christopher Carr and
                  Thomas Haines},
  title        = {Blockchain-Free Cryptocurrencies. {A} Rational Framework for Truly
                  Decentralised Fast Transactions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {871},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/871},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyenCH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyenL16,
  author       = {Xavier Boyen and
                  Qinyi Li},
  title        = {Towards Tightly Secure Short Signature and {IBE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {498},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/498},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyenL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleGI16,
  author       = {Elette Boyle and
                  Niv Gilboa and
                  Yuval Ishai},
  title        = {Breaking the Circuit Size Barrier for Secure Computation Under {DDH}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {585},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/585},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyleGI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BradleyFT16,
  author       = {Tatiana Bradley and
                  Sky Faber and
                  Gene Tsudik},
  title        = {Bounded Size-Hiding Private Set Intersection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {657},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/657},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BradleyFT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiBF16,
  author       = {Zvika Brakerski and
                  Christina Brzuska and
                  Nils Fleischhacker},
  title        = {On Statistically Secure Obfuscation with Approximate Correctness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {226},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/226},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiBF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiCTW16,
  author       = {Zvika Brakerski and
                  David Cash and
                  Rotem Tsabary and
                  Hoeteck Wee},
  title        = {Targeted Homomorphic Attribute Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {691},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/691},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiCTW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiD16,
  author       = {Zvika Brakerski and
                  Or Dagmi},
  title        = {Shorter Circuit Obfuscation in Challenging Security Models},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {418},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/418},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiHK16,
  author       = {Zvika Brakerski and
                  Justin Holmgren and
                  Yael Tauman Kalai},
  title        = {Non-Interactive {RAM} and Batch {NP} Delegation from any {PIR}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {459},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/459},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiHK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiP16,
  author       = {Zvika Brakerski and
                  Renen Perlman},
  title        = {Lattice-Based Fully Dynamic Multi-Key {FHE} with Short Ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {339},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/339},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiV16,
  author       = {Zvika Brakerski and
                  Vinod Vaikuntanathan},
  title        = {Circuit-ABE from {LWE:} Unbounded Attributes and Semi-Adaptive Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {118},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/118},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BraunBDFGMSW16,
  author       = {Johannes Braun and
                  Johannes Buchmann and
                  Denise Demirel and
                  Mikio Fujiwara and
                  Matthias Geihs and
                  Shiho Moriai and
                  Masahide Sasaki and
                  Atsushi Waseda},
  title        = {{LINCOS} - {A} Storage System Providing Long-Term Integrity, Authenticity,
                  and Confidentiality (Full Paper)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {742},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/742},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BraunBDFGMSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Breier16,
  author       = {Jakub Breier},
  title        = {On Analyzing Program Behavior Under Fault Injection Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1060},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1060},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Breier16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BreierH16,
  author       = {Jakub Breier and
                  Xiaolu Hou},
  title        = {Feeding Two Cats with One Bowl: On Designing a Fault and Side-Channel
                  Resistant Software Encoding Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {931},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/931},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BreierH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BreierJB16,
  author       = {Jakub Breier and
                  Dirmanto Jap and
                  Shivam Bhasin},
  title        = {Mistakes Are Proof That You Are Trying: On Verifying Software Encoding
                  Schemes' Resistance to Fault Injection Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {932},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/932},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BreierJB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BreuerB16,
  author       = {Peter T. Breuer and
                  Jonathan P. Bowen},
  title        = {On the Security of Practical and Complete Homomorphic Encrypted Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1191},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1191},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BreuerB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BreuerB16a,
  author       = {Peter T. Breuer and
                  Jonathan P. Bowen},
  title        = {Superscalar Encrypted {RISC:} {A} Secret Computer in Simulation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1193},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1193},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BreuerB16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BricoutMPM16,
  author       = {R{\'{e}}mi Bricout and
                  Sean Murphy and
                  Kenneth G. Paterson and
                  Thyla van der Merwe},
  title        = {Analysing and Exploiting the Mantin Biases in {RC4}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {63},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/063},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BricoutMPM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BroadnaxDHMN16,
  author       = {Brandon Broadnax and
                  Nico D{\"{o}}ttling and
                  Gunnar Hartung and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Matthias Nagel},
  title        = {Concurrently Composable Security With Shielded Super-polynomial Simulators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1043},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1043},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BroadnaxDHMN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrodyDFP16,
  author       = {Joshua Brody and
                  Stefan Dziembowski and
                  Sebastian Faust and
                  Krzysztof Pietrzak},
  title        = {Position-Based Cryptography and Multiparty Communication Complexity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {536},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/536},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrodyDFP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrooksJW16,
  author       = {Ernest Hunter Brooks and
                  Dimitar Jetchev and
                  Benjamin Wesolowski},
  title        = {Isogeny graphs of ordinary abelian varieties},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {947},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/947},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrooksJW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BruinderinkH16,
  author       = {Leon Groot Bruinderink and
                  Andreas H{\"{u}}lsing},
  title        = {"Oops, {I} did it again" - Security of One-Time Signatures under Two-Message
                  Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1042},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1042},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BruinderinkH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BruinderinkHLY16,
  author       = {Leon Groot Bruinderink and
                  Andreas H{\"{u}}lsing and
                  Tanja Lange and
                  Yuval Yarom},
  title        = {Flush, Gauss, and Reload - {A} Cache Attack on the {BLISS} Lattice-Based
                  Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {300},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/300},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BruinderinkHLY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BruneauGHMR16,
  author       = {Nicolas Bruneau and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Damien Marion and
                  Olivier Rioul},
  title        = {Less is More - Dimensionality Reduction from a Theoretical Perspective},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {359},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/359},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BruneauGHMR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrunetCGO16,
  author       = {Solenn Brunet and
                  S{\'{e}}bastien Canard and
                  S{\'{e}}bastien Gambs and
                  Baptiste Olivier},
  title        = {Novel differentially private mechanisms for graphs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {745},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/745},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrunetCGO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrzuskaJS16,
  author       = {Christina Brzuska and
                  H{\aa}kon Jacobsen and
                  Douglas Stebila},
  title        = {Safely Exporting Keys from Secure Channels: On the security of {EAP-TLS}
                  and {TLS} Key Exporters},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {87},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/087},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrzuskaJS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BuchmannGPW16,
  author       = {Johannes Buchmann and
                  Florian G{\"{o}}pfert and
                  Rachel Player and
                  Thomas Wunderer},
  title        = {On the Hardness of {LWE} with Binary Error: Revisiting the Hybrid
                  Lattice-Reduction and Meet-in-the-Middle Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {89},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/089},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BuchmannGPW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BudaghyanCHL16,
  author       = {Lilya Budaghyan and
                  Claude Carlet and
                  Tor Helleseth and
                  Nian Li},
  title        = {On the (non-)existence of {APN} (n, n)-functions of algebraic degree
                  n},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {143},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/143},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BudaghyanCHL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BudaghyanHLS16,
  author       = {Lilya Budaghyan and
                  Tor Helleseth and
                  Nian Li and
                  Bo Sun},
  title        = {Some Results on the Known Classes of Quadratic {APN} Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1183},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1183},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BudaghyanHLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BunCV16,
  author       = {Mark Bun and
                  Yi{-}Hsiu Chen and
                  Salil P. Vadhan},
  title        = {Separating Computational and Statistical Differential Privacy in the
                  Client-Server Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {820},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/820},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BunCV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BunS16,
  author       = {Mark Bun and
                  Thomas Steinke},
  title        = {Concentrated Differential Privacy: Simplifications, Extensions, and
                  Lower Bounds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {816},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/816},
  timestamp    = {Sun, 14 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BunS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BussiDBD16,
  author       = {Khushboo Bussi and
                  Dhananjoy Dey and
                  Manoj Kumar Biswas and
                  B. K. Dass},
  title        = {Neeva: {A} Lightweight Hash Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {42},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/042},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BussiDBD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischDL16,
  author       = {Jan Camenisch and
                  Manu Drijvers and
                  Anja Lehmann},
  title        = {Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {663},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/663},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischDL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischDR16,
  author       = {Jan Camenisch and
                  Maria Dubovitskaya and
                  Alfredo Rial},
  title        = {{UC} Commitments for Modular Protocol Design and Applications to Revocation
                  and Attribute Tokens},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {581},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/581},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischDR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischEKKR16,
  author       = {Jan Camenisch and
                  Robert R. Enderlein and
                  Stephan Krenn and
                  Ralf K{\"{u}}sters and
                  Daniel Rausch},
  title        = {Universal Composition with Responsive Environments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {34},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/034},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischEKKR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischEM16,
  author       = {Jan Camenisch and
                  Robert R. Enderlein and
                  Ueli Maurer},
  title        = {Memory Erasability Amplification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {706},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/706},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CamenischEM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiP16,
  author       = {Ran Canetti and
                  Oxana Poburinnaya},
  title        = {Better Two-Round Adaptive Multiparty Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {614},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/614},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiPR16,
  author       = {Ran Canetti and
                  Oxana Poburinnaya and
                  Mariana Raykova},
  title        = {Optimal-Rate Non-Committing Encryption in a {CRS} Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {511},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/511},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiPR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiPV16,
  author       = {Ran Canetti and
                  Oxana Poburinnaya and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Equivocating Yao: Constant-Round Adaptively Secure Multiparty Computation
                  in the Plain Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1190},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1190},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiPV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanteautDP16,
  author       = {Anne Canteaut and
                  S{\'{e}}bastien Duval and
                  L{\'{e}}o Perrin},
  title        = {A generalisation of Dillon's {APN} permutation with the best known
                  differential and linear properties for all fields of size 2\({}^{\mbox{4k+2}}\)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {887},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/887},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanteautDP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanteautR16,
  author       = {Anne Canteaut and
                  Yann Rotella},
  title        = {Attacks against Filter Generators Exploiting Monomial Mappings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {384},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/384},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanteautR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CaoL16,
  author       = {Zhengjun Cao and
                  Lihua Liu},
  title        = {A Note on "Outsourcing Large Matrix Inversion Computation to a Public
                  Cloud"},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {448},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/448},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CaoL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CaoL16a,
  author       = {Zhengjun Cao and
                  Lihua Liu},
  title        = {A Note on One Secure Anti-Collusion Data Sharing Scheme for Dynamic
                  Groups in the Cloud},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {698},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/698},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CaoL16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CaoL16b,
  author       = {Zhengjun Cao and
                  Lihua Liu},
  title        = {A Note on One Privacy-Preserving Multi-Keyword Ranked Search Scheme
                  over Encrypted Cloud Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {699},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/699},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CaoL16b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CaoL16c,
  author       = {Zhengjun Cao and
                  Lihua Liu},
  title        = {The Reason Why Some Divide-and-Conquer Algorithms Cannot Be Efficiently
                  Implemented},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {979},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/979},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CaoL16c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Carlet16,
  author       = {Claude Carlet},
  title        = {On the nonlinearity of monotone Boolean functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {133},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/133},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Carlet16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletPRR16,
  author       = {Claude Carlet and
                  Emmanuel Prouff and
                  Matthieu Rivain and
                  Thomas Roche},
  title        = {Algebraic Decomposition for Probing Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {321},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/321},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletPRR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarmerR16,
  author       = {Brent Carmer and
                  Mike Rosulek},
  title        = {Linicrypt: {A} Model for Practical Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {548},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/548},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarmerR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarpentFST16,
  author       = {Xavier Carpent and
                  Sky Faber and
                  Tomas Sander and
                  Gene Tsudik},
  title        = {Private Projections {\&} Variants},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1144},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1144},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarpentFST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarterT16,
  author       = {Henry Carter and
                  Patrick Traynor},
  title        = {{OPFE:} Outsourcing Computation for Private Function Evaluation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {67},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/067},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarterT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CascudoDDDN16,
  author       = {Ignacio Cascudo and
                  Ivan Damg{\aa}rd and
                  Bernardo David and
                  Nico D{\"{o}}ttling and
                  Jesper Buus Nielsen},
  title        = {Rate-1, Linear Time and Additively Homomorphic {UC} Commitments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {137},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/137},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CascudoDDDN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CascudoDLR16,
  author       = {Ignacio Cascudo and
                  Ivan Damg{\aa}rd and
                  Felipe Lacerda and
                  Samuel Ranellucci},
  title        = {Oblivious Transfer from Any Non-Trivial Elastic Noisy Channels via
                  Secret Key Agreement},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {120},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/120},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CascudoDLR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CashGPR16,
  author       = {David Cash and
                  Paul Grubbs and
                  Jason Perry and
                  Thomas Ristenpart},
  title        = {Leakage-Abuse Attacks Against Searchable Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {718},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/718},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CashGPR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CashLOZ16,
  author       = {David Cash and
                  Feng{-}Hao Liu and
                  Adam O'Neill and
                  Cong Zhang},
  title        = {Reducing the Leakage in Practical Order-Revealing Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {661},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/661},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CashLOZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CastryckIV16,
  author       = {Wouter Castryck and
                  Ilia Iliashenko and
                  Frederik Vercauteren},
  title        = {Provably Weak Instances of Ring-LWE Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {239},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/239},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CastryckIV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CastryckIV16a,
  author       = {Wouter Castryck and
                  Ilia Iliashenko and
                  Frederik Vercauteren},
  title        = {On the tightness of the error bound in Ring-LWE},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {240},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/240},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CastryckIV16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CatalanoFN16,
  author       = {Dario Catalano and
                  Dario Fiore and
                  Luca Nizzardo},
  title        = {On the Security Notions for Homomorphic Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1175},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1175},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CatalanoFN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CauchoisLM16,
  author       = {Victor Cauchois and
                  Pierre Loidreau and
                  Nabil Merkiche},
  title        = {Direct construction of quasi-involutory recursive-like {MDS} matrices
                  from 2-cyclic codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1112},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1112},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CauchoisLM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CetinDDMS16,
  author       = {Gizem S. {\c{C}}etin and
                  Wei Dai and
                  Yarkin Dor{\"{o}}z and
                  William J. Martin and
                  Berk Sunar},
  title        = {Blind Web Search: How far are we from a privacy preserving search
                  engine?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {801},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/801},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CetinDDMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaigneauG16,
  author       = {Colin Chaigneau and
                  Henri Gilbert},
  title        = {Is {AEZ} v4.1 Sufficiently Resilient Against Key-Recovery Attacks?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {832},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/832},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaigneauG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chakraborty16,
  author       = {Sumit Chakraborty},
  title        = {Algorithmic Mechanism Construction bridging Secure Multiparty Computation
                  and Intelligent Reasoning},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {778},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/778},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chakraborty16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chakraborty16a,
  author       = {Sumit Chakraborty},
  title        = {Mobile Commerce: Secure Multi-party Computation {\&} Financial
                  Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1167},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1167},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chakraborty16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChakrabortyGS16,
  author       = {Debrup Chakraborty and
                  Sebati Ghosh and
                  Palash Sarkar},
  title        = {A Fast Single-Key Two-Level Universal Hash Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1103},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1103},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChakrabortyGS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChakrabortyM16,
  author       = {Abhishek Chakraborty and
                  Debdeep Mukhopadhyay},
  title        = {A Practical Template Attack on {MICKEY-128} 2.0 Using {PSO} Generated
                  IVs and {LS-SVM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {26},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/026},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChakrabortyM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChakrabortyRR16,
  author       = {Suvradip Chakraborty and
                  Srinivasan Raghuraman and
                  C. Pandu Rangan},
  title        = {A Pairing-Free, One Round Identity Based Authenticated Key Exchange
                  Protocol Secure Against Memory-Scrapers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {354},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/354},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChakrabortyRR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChanS16,
  author       = {T.{-}H. Hubert Chan and
                  Elaine Shi},
  title        = {Circuit {OPRAM:} {A} (Somewhat) Tight Oblivious Parallel {RAM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1084},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1084},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChanS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaseGM16,
  author       = {Melissa Chase and
                  Chaya Ganesh and
                  Payman Mohassel},
  title        = {Efficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements
                  with Applications to Privacy Preserving Credentials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {583},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/583},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaseGM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaseM16,
  author       = {Melissa Chase and
                  Sarah Meiklejohn},
  title        = {Transparency Overlays and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {915},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/915},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaseM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaseMM16,
  author       = {Melissa Chase and
                  Mary Maller and
                  Sarah Meiklejohn},
  title        = {Deja {Q} All Over Again: Tighter and Broader Reductions of q-Type
                  Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {840},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/840},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaseMM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChatterjeeCM16,
  author       = {Urbi Chatterjee and
                  Rajat Subhra Chakraborty and
                  Debdeep Mukhopadhyay},
  title        = {A PUF-based Secure Communication Protocol for IoT},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {674},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/674},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChatterjeeCM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChatterjeeKMS16,
  author       = {Sanjit Chatterjee and
                  Neal Koblitz and
                  Alfred Menezes and
                  Palash Sarkar},
  title        = {Another Look at Tightness {II:} Practical Issues in Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {360},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/360},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChatterjeeKMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChatterjeeMR16,
  author       = {Sanjit Chatterjee and
                  Alfred Menezes and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {On Implementing Pairing-Based Protocols with Elliptic Curves of Embedding
                  Degree One},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {403},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/403},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChatterjeeMR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChattopadhyayG016,
  author       = {Eshan Chattopadhyay and
                  Vipul Goyal and
                  Xin Li},
  title        = {Non-Malleable Extractors and Codes, with their Many Tampered Extensions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {340},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/340},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChattopadhyayG016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaudhariD16,
  author       = {Payal Chaudhari and
                  Manik Lal Das},
  title        = {Cryptanalysis of Searchable Anonymous Attribute Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {347},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/347},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaudhariD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CheckowayCG0HMR16,
  author       = {Stephen Checkoway and
                  Shaanan Cohney and
                  Christina Garman and
                  Matthew Green and
                  Nadia Heninger and
                  Jacob Maskiewicz and
                  Eric Rescorla and
                  Hovav Shacham and
                  Ralf{-}Philipp Weinmann},
  title        = {A Systematic Analysis of the Juniper Dual {EC} Incident},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {376},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/376},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CheckowayCG0HMR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chen16,
  author       = {Yilei Chen},
  title        = {An Alternative View of the Graph-Induced Multilinear Maps},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {200},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/200},
  timestamp    = {Tue, 22 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chen16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chen16a,
  author       = {Hao Chen},
  title        = {A Measure Version of Gaussian Heuristic},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {439},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/439},
  timestamp    = {Wed, 22 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chen16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenCL16,
  author       = {Yalin Chen and
                  Jue{-}Sam Chou and
                  I{-}Ching Liao},
  title        = {Improved on an improved remote user authentication scheme with key
                  agreement},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {23},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/023},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenCL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenCW16,
  author       = {Yalin Chen and
                  Jue{-}Sam Chou and
                  Hung{-}Shen Wu},
  title        = {Improved on an efficient user authentication scheme for heterogeneous
                  wireless sensor network tailored for the Internet of Things environment},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/001},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenCW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenFE16,
  author       = {Cong Chen and
                  Mohammad Farmani and
                  Thomas Eisenbarth},
  title        = {A Tale of Two Shares: Why Two-Share Threshold Implementation Seems
                  Worthwhile-and Why it is Not},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {434},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/434},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenFE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenGH16,
  author       = {Yilei Chen and
                  Craig Gentry and
                  Shai Halevi},
  title        = {Cryptanalyses of Candidate Branching Program Obfuscators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {998},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/998},
  timestamp    = {Tue, 22 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenGH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenLM16,
  author       = {Liqun Chen and
                  Thalia M. Laing and
                  Keith M. Martin},
  title        = {Revisiting and Extending the {AONT-RS} scheme: a Robust Computationally
                  Secure Secret Sharing Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1014},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1014},
  timestamp    = {Sat, 28 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenLM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenLS16,
  author       = {Hao Chen and
                  Kristin E. Lauter and
                  Katherine E. Stange},
  title        = {Vulnerable Galois {RLWE} Families and Improved Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {193},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/193},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenMYSG16,
  author       = {Rongmao Chen and
                  Yi Mu and
                  Guomin Yang and
                  Willy Susilo and
                  Fuchun Guo},
  title        = {Strongly Leakage-Resilient Authenticated Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {308},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/308},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenMYSG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenMYSGZ16,
  author       = {Rongmao Chen and
                  Yi Mu and
                  Guomin Yang and
                  Willy Susilo and
                  Fuchun Guo and
                  Mingwu Zhang},
  title        = {Cryptographic Reverse Firewall via Malleable Smooth Projective Hash
                  Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {873},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/873},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenMYSGZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenQLD16,
  author       = {Xi Chen and
                  Longjiang Qu and
                  Chao Li and
                  Jiao Du},
  title        = {A New Method to Investigate the CCZ-Equivalence between Functions
                  with Low Differential Uniformity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {744},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/744},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenQLD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenZDC16,
  author       = {Yu Chen and
                  Jiang Zhang and
                  Yi Deng and
                  Jinyong Chang},
  title        = {{KDM} Security for Identity-Based Encryption: Constructions and Separations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1020},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1020},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenZDC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChengCNY16,
  author       = {Chen{-}Mou Cheng and
                  Tung Chou and
                  Ruben Niederhagen and
                  Bo{-}Yin Yang},
  title        = {Solving Quadratic Equations with {XL} on Parallel Architectures -
                  extended version},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {412},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/412},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChengCNY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChengZ16,
  author       = {Qi Cheng and
                  Jincheng Zhuang},
  title        = {{LWE} from Non-commutative Group Rings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1169},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1169},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChengZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CheonCKL16,
  author       = {Jung Hee Cheon and
                  HeeWon Chung and
                  Myungsun Kim and
                  Kang{-}Won Lee},
  title        = {Ghostshell: Secure Biometric Authentication using Integrity-based
                  Homomorphic Evaluations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {484},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/484},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CheonCKL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CheonFLMR16,
  author       = {Jung Hee Cheon and
                  Pierre{-}Alain Fouque and
                  Changmin Lee and
                  Brice Minaud and
                  Hansol Ryu},
  title        = {Cryptanalysis of the New {CLT} Multilinear Map over the Integers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {135},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/135},
  timestamp    = {Fri, 26 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CheonFLMR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CheonHKLS16,
  author       = {Jung Hee Cheon and
                  Kyoohyung Han and
                  Jinsu Kim and
                  Changmin Lee and
                  Yongha Son},
  title        = {A Practical Post-Quantum Public-Key Cryptosystem Based on spLWE},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1055},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1055},
  timestamp    = {Fri, 26 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CheonHKLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CheonJL16,
  author       = {Jung Hee Cheon and
                  Jinhyuck Jeong and
                  Changmin Lee},
  title        = {An Algorithm for {NTRU} Problems and Cryptanalysis of the {GGH} Multilinear
                  Map without an encoding of zero},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {139},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/139},
  timestamp    = {Fri, 26 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CheonJL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CheonK16,
  author       = {Jung Hee Cheon and
                  Duhyeong Kim},
  title        = {Probability that the k-gcd of products of positive integers is B-smooth},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {334},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/334},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CheonK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CheonKKS16,
  author       = {Jung Hee Cheon and
                  Andrey Kim and
                  Miran Kim and
                  Yong Soo Song},
  title        = {Floating-Point Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {421},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/421},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CheonKKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CheonKLS16,
  author       = {Jung Hee Cheon and
                  Duhyeong Kim and
                  Joohee Lee and
                  Yong Soo Song},
  title        = {Lizard: Cut off the Tail! // Practical Post-Quantum Public-Key Encryption
                  from {LWE} and {LWR}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1126},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1126},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CheonKLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CheonS16,
  author       = {Jung Hee Cheon and
                  Damien Stehl{\'{e}}},
  title        = {Fully Homomorphic Encryption over the Integers Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {837},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/837},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CheonS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChevalierLV16,
  author       = {C{\'{e}}line Chevalier and
                  Fabien Laguillaumie and
                  Damien Vergnaud},
  title        = {Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis
                  and Optimal Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {309},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/309},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChevalierLV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chiesa0LMMM16,
  author       = {Alessandro Chiesa and
                  Matthew Green and
                  Jingcheng Liu and
                  Peihan Miao and
                  Ian Miers and
                  Pratyush Mishra},
  title        = {Decentralized Anonymous Micropayments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1033},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1033},
  timestamp    = {Wed, 02 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chiesa0LMMM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChillottiGG16,
  author       = {Ilaria Chillotti and
                  Nicolas Gama and
                  Louis Goubin},
  title        = {Attacking FHE-based applications by software fault injections},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1164},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1164},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChillottiGG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChillottiGGI16,
  author       = {Ilaria Chillotti and
                  Nicolas Gama and
                  Mariya Georgieva and
                  Malika Izabach{\`{e}}ne},
  title        = {Faster Fully Homomorphic Encryption: Bootstrapping in less than 0.1
                  Seconds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {870},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/870},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChillottiGGI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChinburgHHS16,
  author       = {Ted Chinburg and
                  Brett Hemenway and
                  Nadia Heninger and
                  Zachary Scherr},
  title        = {Cryptographic applications of capacity theory: On the optimality of
                  Coppersmith's method for univariate polynomials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {869},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/869},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChinburgHHS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoCDKMV16,
  author       = {Jihoon Cho and
                  Kyu Young Choi and
                  Orr Dunkelman and
                  Nathan Keller and
                  Dukjae Moon and
                  Aviya Vaidberg},
  title        = {Hybrid {WBC:} Secure and Efficient White-Box Encryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {679},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/679},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoCDKMV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoiDMW16,
  author       = {Seung Geol Choi and
                  Dana Dachman{-}Soled and
                  Tal Malkin and
                  Hoeteck Wee},
  title        = {A Black-Box Construction of Non-Malleable Encryption from Semantically
                  Secure Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {720},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/720},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoiDMW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoiDMW16a,
  author       = {Seung Geol Choi and
                  Dana Dachman{-}Soled and
                  Tal Malkin and
                  Hoeteck Wee},
  title        = {Improved, Black-Box, Non-Malleable Encryption from Semantic Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {842},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/842},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoiDMW16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chopra16,
  author       = {Arjun Chopra},
  title        = {Improved Parameters for the Ring-TESLA Digital Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1099},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1099},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chopra16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChotardPP16,
  author       = {J{\'{e}}r{\'{e}}my Chotard and
                  Duong Hieu Phan and
                  David Pointcheval},
  title        = {Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1089},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1089},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChotardPP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoudhuriM16,
  author       = {Arka Rai Choudhuri and
                  Subhamoy Maitra},
  title        = {Differential Cryptanalysis of Salsa and ChaCha - An Evaluation with
                  a Hybrid Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {377},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/377},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoudhuriM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoudhuriM16a,
  author       = {Arka Rai Choudhuri and
                  Subhamoy Maitra},
  title        = {Significantly Improved Multi-bit Differentials for Reduced Round Salsa
                  and ChaCha},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1034},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1034},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoudhuriM16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChungCS16,
  author       = {Ping Ngai Chung and
                  Craig Costello and
                  Benjamin Smith},
  title        = {Fast, uniform scalar multiplication for genus 2 Jacobians with fast
                  Kummers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {777},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/777},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChungCS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChungK16,
  author       = {HeeWon Chung and
                  Myungsun Kim},
  title        = {Encoding Rational Numbers for FHE-based Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {344},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/344},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChungK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CiampiOSV16,
  author       = {Michele Ciampi and
                  Rafail Ostrovsky and
                  Luisa Siniscalchi and
                  Ivan Visconti},
  title        = {Concurrent Non-Malleable Commitments (and More) in 3 Rounds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {566},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/566},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CiampiOSV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CiampiOSV16a,
  author       = {Michele Ciampi and
                  Rafail Ostrovsky and
                  Luisa Siniscalchi and
                  Ivan Visconti},
  title        = {On Round-Efficient Non-Malleable Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {621},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/621},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CiampiOSV16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CiampiPSSV16,
  author       = {Michele Ciampi and
                  Giuseppe Persiano and
                  Alessandra Scafuro and
                  Luisa Siniscalchi and
                  Ivan Visconti},
  title        = {Online/Offline {OR} Composition of Sigma Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {175},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/175},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CiampiPSSV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CioranescoFGN16,
  author       = {Jean{-}Michel Cioranesco and
                  Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  title        = {Process Table Covert Channels: Exploitation and Countermeasures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {227},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/227},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CioranescoFGN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ClearM16,
  author       = {Michael Clear and
                  Ciaran McGoldrick},
  title        = {Attribute-Based Fully Homomorphic Encryption with a Bounded Number
                  of Inputs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {99},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/099},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ClearM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CnuddeBGNNR16,
  author       = {Thomas De Cnudde and
                  Beg{\"{u}}l Bilgin and
                  Benedikt Gierlichs and
                  Ventzislav Nikov and
                  Svetla Nikova and
                  Vincent Rijmen},
  title        = {Does Coupling Affect the Security of Masked Implementations?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1080},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1080},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CnuddeBGNNR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CnuddeRBNNR16,
  author       = {Thomas De Cnudde and
                  Oscar Reparaz and
                  Beg{\"{u}}l Bilgin and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen},
  title        = {Masking {AES} with d+1 Shares in Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {631},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/631},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CnuddeRBNNR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CockDHKNNP16,
  author       = {Martine De Cock and
                  Rafael Dowsley and
                  Caleb Horst and
                  Raj S. Katti and
                  Anderson C. A. Nascimento and
                  Stacey C. Newman and
                  Wing{-}Sea Poon},
  title        = {Efficient and Private Scoring of Decision Trees, Support Vector Machines
                  and Logistic Regression Models based on Pre-Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {736},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/736},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CockDHKNNP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoglianiBFGMNCW16,
  author       = {Simon Cogliani and
                  Feng Bao and
                  Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  Diana Maimut and
                  David Naccache and
                  Rodrigo Portella do Canto and
                  Guilin Wang},
  title        = {Public-Key Based Lightweight Swarm Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {750},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/750},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoglianiBFGMNCW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoglianiFGN16,
  author       = {Simon Cogliani and
                  Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  title        = {Thrifty Zero-Knowledge - When Linear Programming Meets Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {443},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/443},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoglianiFGN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoglianiGN16,
  author       = {Simon Cogliani and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  title        = {A Fiat-Shamir Implementation Note},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1039},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1039},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoglianiGN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CogliatiS16,
  author       = {Beno{\^{\i}}t Cogliati and
                  Yannick Seurin},
  title        = {Strengthening the Known-Key Security Notion for Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {394},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/394},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CogliatiS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CogliatiS16a,
  author       = {Beno{\^{\i}}t Cogliati and
                  Yannick Seurin},
  title        = {{EWCDM:} An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant
                  {MAC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {525},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/525},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CogliatiS16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CohenCGZ16,
  author       = {Ran Cohen and
                  Sandro Coretti and
                  Juan A. Garay and
                  Vassilis Zikas},
  title        = {Probabilistic Termination and Composability of Cryptographic Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {350},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/350},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CohenCGZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CohenK16,
  author       = {Aloni Cohen and
                  Saleet Klein},
  title        = {The {GGM} {PRF} is a Weakly One-Way Family of Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {610},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/610},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CohenK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CohenP16,
  author       = {Ran Cohen and
                  Chris Peikert},
  title        = {On Adaptively Secure Multiparty Computation with a Short {CRS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {976},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/976},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CohenP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Cohn-GordonCDGS16,
  author       = {Katriel Cohn{-}Gordon and
                  Cas Cremers and
                  Benjamin Dowling and
                  Luke Garratt and
                  Douglas Stebila},
  title        = {A Formal Security Analysis of the Signal Messaging Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1013},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1013},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Cohn-GordonCDGS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Cohn-GordonCG16,
  author       = {Katriel Cohn{-}Gordon and
                  Cas Cremers and
                  Luke Garratt},
  title        = {On Post-Compromise Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {221},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/221},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Cohn-GordonCG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ColombierBHF16,
  author       = {Brice Colombier and
                  Lilian Bossuet and
                  David H{\'{e}}ly and
                  Viktor Fischer},
  title        = {Key Reconciliation Protocols for Error Correction of Silicon {PUF}
                  Responses},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {939},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/939},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ColombierBHF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CorettiGHZ16,
  author       = {Sandro Coretti and
                  Juan A. Garay and
                  Martin Hirt and
                  Vassilis Zikas},
  title        = {Constant-Round Asynchronous Multi-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {208},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/208},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CorettiGHZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronGPZ16,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Aur{\'{e}}lien Greuet and
                  Emmanuel Prouff and
                  Rina Zeitoun},
  title        = {Faster Evaluation of SBoxes via Common Shares},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {572},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/572},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronGPZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronLLT16,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Moon Sung Lee and
                  Tancr{\`{e}}de Lepoint and
                  Mehdi Tibouchi},
  title        = {Zeroizing Attacks on Indistinguishability Obfuscation over {CLT13}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1011},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1011},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronLLT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronZ16,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Rina Zeitoun},
  title        = {Improved Factorization of N=p\({}^{\mbox{rq\({}^{\mbox{s}}\)}}\)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {551},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/551},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Corrigan-GibbsB16,
  author       = {Henry Corrigan{-}Gibbs and
                  Dan Boneh and
                  Stuart E. Schechter},
  title        = {Balloon Hashing: Provably Space-Hard Hash Functions with Data-Independent
                  Access Patterns},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {27},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/027},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Corrigan-GibbsB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CortierGKMT16,
  author       = {V{\'{e}}ronique Cortier and
                  David Galindo and
                  Ralf K{\"{u}}sters and
                  Johannes M{\"{u}}ller and
                  Tomasz Truderung},
  title        = {Verifiability Notions for E-Voting Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {287},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/287},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CortierGKMT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CostacheSV16,
  author       = {Anamaria Costache and
                  Nigel P. Smart and
                  Srinivas Vivek},
  title        = {Faster Homomorphic Evaluation of Discrete Fourier Transforms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1019},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1019},
  timestamp    = {Mon, 11 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CostacheSV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CostacheSVW16,
  author       = {Anamaria Costache and
                  Nigel P. Smart and
                  Srinivas Vivek and
                  Adrian Waller},
  title        = {Fixed Point Arithmetic in {SHE} Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {250},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/250},
  timestamp    = {Mon, 11 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CostacheSVW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CostanD16,
  author       = {Victor Costan and
                  Srinivas Devadas},
  title        = {Intel {SGX} Explained},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {86},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/086},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CostanD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CostelloJLNRU16,
  author       = {Craig Costello and
                  David Jao and
                  Patrick Longa and
                  Michael Naehrig and
                  Joost Renes and
                  David Urbanik},
  title        = {Efficient compression of {SIDH} public keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {963},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/963},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CostelloJLNRU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CostelloLN16,
  author       = {Craig Costello and
                  Patrick Longa and
                  Michael Naehrig},
  title        = {Efficient algorithms for supersingular isogeny Diffie-Hellman},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {413},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/413},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CostelloLN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Courtois16,
  author       = {Nicolas T. Courtois},
  title        = {On Splitting a Point with Summation Polynomials in Binary Elliptic
                  Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {3},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/003},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Courtois16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Courtois16a,
  author       = {Nicolas T. Courtois},
  title        = {High Saturation Complete Graph Approach for {EC} Point Decomposition
                  and {ECDL} Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {704},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/704},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Courtois16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CourtoisSC16,
  author       = {Nicolas T. Courtois and
                  Guangyan Song and
                  Ryan Castellucci},
  title        = {Speed Optimizations in Bitcoin Key Recovery Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {103},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/103},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CourtoisSC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Couteau16,
  author       = {Geoffroy Couteau},
  title        = {Efficient Secure Comparison Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {544},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/544},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Couteau16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Couteau16a,
  author       = {Geoffroy Couteau},
  title        = {Revisiting Covert Multiparty Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {951},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/951},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Couteau16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CouteauPP16,
  author       = {Geoffroy Couteau and
                  Thomas Peters and
                  David Pointcheval},
  title        = {Removing the Strong {RSA} Assumption from Arguments over the Integers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {128},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/128},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CouteauPP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CouvreurOTG16,
  author       = {Alain Couvreur and
                  Ayoub Otmani and
                  Jean{-}Pierre Tillich and
                  Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a},
  title        = {A Polynomial-Time Attack on the {BBCRS} Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {302},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/302},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CouvreurOTG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerD16,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd},
  title        = {Amortized Complexity of Zero-Knowledge Proofs Revisited: Achieving
                  Linear Soundness Slack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {681},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/681},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerDDGX16,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Nico D{\"{o}}ttling and
                  Irene Giacomelli and
                  Chaoping Xing},
  title        = {Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {397},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/397},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerDDGX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerDW16,
  author       = {Ronald Cramer and
                  L{\'{e}}o Ducas and
                  Benjamin Wesolowski},
  title        = {Short Stickelberger Class Relations and application to Ideal-SVP},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {885},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/885},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerDW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerXY16,
  author       = {Ronald Cramer and
                  Chaoping Xing and
                  Chen Yuan},
  title        = {On Multi-Point Local Decoding of Reed-Muller Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {369},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/369},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerXY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CrockettP16,
  author       = {Eric Crockett and
                  Chris Peikert},
  title        = {Challenges for Ring-LWE},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {782},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/782},
  timestamp    = {Thu, 02 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CrockettP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CuiJFCW16,
  author       = {Tingting Cui and
                  Keting Jia and
                  Kai Fu and
                  Shiyao Chen and
                  Meiqin Wang},
  title        = {New Automatic Search Tool for Impossible Differentials and Zero-Correlation
                  Linear Approximations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {689},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/689},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CuiJFCW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CunninghamFY16,
  author       = {Robert K. Cunningham and
                  Benjamin Fuller and
                  Sophia Yakoubov},
  title        = {Catching {MPC} Cheaters: Identification and Openability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {611},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/611},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CunninghamFY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Czyzewski16,
  author       = {Maciej A. Czyzewski},
  title        = {Chaos Machine: Different Approach to the Application and Significance
                  of Numbers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {468},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/468},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Czyzewski16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-Soled16,
  author       = {Dana Dachman{-}Soled},
  title        = {Towards Non-Black-Box Separations of Public Key Encryption and One
                  Way Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {812},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/812},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-Soled16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledGL16,
  author       = {Dana Dachman{-}Soled and
                  S. Dov Gordon and
                  Feng{-}Hao Liu and
                  Adam O'Neill and
                  Hong{-}Sheng Zhou},
  title        = {Leakage-Resilient Public-Key Encryption from Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {730},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/730},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-SoledGL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledPN16,
  author       = {Dana Dachman{-}Soled and
                  Angela Park and
                  Ben San Nicolas},
  title        = {Towards a Characterization of the Related-Key Attack Security of the
                  Iterated Even-Mansour Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {707},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/707},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-SoledPN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Daemen16,
  author       = {Joan Daemen},
  title        = {Spectral characterization of iterating lossy mappings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {90},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/090},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Daemen16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Daemen16a,
  author       = {Joan Daemen},
  title        = {Changing of the Guards: a simple and efficient method for achieving
                  uniformity in threshold sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1061},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1061},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Daemen16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DahlbergPP16,
  author       = {Rasmus Dahlberg and
                  Tobias Pulls and
                  Roel Peeters},
  title        = {Efficient Sparse Merkle Trees: Caching Strategies and Secure (Non-)Membership
                  Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {683},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/683},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DahlbergPP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaiSSWZ16,
  author       = {Wei Dai and
                  John M. Schanck and
                  Berk Sunar and
                  William Whyte and
                  Zhenfei Zhang},
  title        = {{NTRU} Modular Lattice Signature Scheme on {CUDA} GPUs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {471},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/471},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DaiSSWZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardHO16,
  author       = {Ivan Damg{\aa}rd and
                  Helene Haagh and
                  Claudio Orlandi},
  title        = {Access Control Encryption: Enforcing Information Flow with Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {106},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/106},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardHO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardNNR16,
  author       = {Ivan Damg{\aa}rd and
                  Jesper Buus Nielsen and
                  Michael Nielsen and
                  Samuel Ranellucci},
  title        = {Gate-scrambling Revisited - or: The TinyTable protocol for 2-Party
                  Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {695},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/695},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardNNR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardTZ16,
  author       = {Ivan Damg{\aa}rd and
                  Tomas Toft and
                  Rasmus Winther Zakarias},
  title        = {Fast Multiparty Multiplications from shared bits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {109},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/109},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardTZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DattaDM16,
  author       = {Pratish Datta and
                  Ratna Dutta and
                  Sourav Mukhopadhyay},
  title        = {Verifiable and Delegatable Constrained Pseudorandom Functions for
                  Unconstrained Inputs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {784},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/784},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DattaDM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DattaDM16a,
  author       = {Pratish Datta and
                  Ratna Dutta and
                  Sourav Mukhopadhyay},
  title        = {Succinct Predicate and Online-Offline Multi-Input Inner Product Encryptions
                  under Standard Static Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {904},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/904},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DattaDM16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DavidChaumJKKRS16,
  author       = {David Chaum and
                  Farid Javani and
                  Aniket Kate and
                  Anna Krasnova and
                  Joeri de Ruiter and
                  Alan T. Sherman},
  title        = {cMix: Anonymization byHigh-Performance Scalable Mixing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {8},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/008},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DavidChaumJKKRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DavidsonC16,
  author       = {Alex Davidson and
                  Carlos Cid},
  title        = {Computing Private Set Operations with Linear Complexities},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {108},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/108},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DavidsonC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DebnathD16,
  author       = {Sumit Kumar Debnath and
                  Ratna Dutta},
  title        = {Fair mPSI and mPSI-CA: Efficient Constructions in Prime Order Groups
                  with Security in the Standard Model against Malicious Adversary},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {216},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/216},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DebnathD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DegabrielePSW16,
  author       = {Jean Paul Degabriele and
                  Kenneth G. Paterson and
                  Jacob C. N. Schuldt and
                  Joanne Woodage},
  title        = {Backdoors in Pseudorandom Number Generators: Possibility and Impossibility
                  Results},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {577},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/577},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DegabrielePSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DegwekarVV16,
  author       = {Akshay Degwekar and
                  Vinod Vaikuntanathan and
                  Prashant Nalini Vasudevan},
  title        = {Fine-grained Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {580},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/580},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DegwekarVV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DehkordiS16,
  author       = {Massoud Hadian Dehkordi and
                  Ali Safi},
  title        = {The complexity of the connected graph access structure on seven participants},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {928},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/928},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DehkordiS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DehnaviRSMP16,
  author       = {Seyed Mojtaba Dehnavi and
                  Akbar Mahmoodi Rishakani and
                  M. R. Mirzaee Shamsabad and
                  Hamidreza Maimani and
                  Einollah Pasha},
  title        = {Cryptographic Properties of Addition Modulo 2\({}^{\mbox{n}}\)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {181},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/181},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DehnaviRSMP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DelavarMAM16,
  author       = {Mahshid Delavar and
                  Sattar Mirzakuchaki and
                  Mohammad Hassan Ameri and
                  Javad Mohajeri},
  title        = {Puf-Based Solutions For Secure Communications In Advanced Metering
                  Infrastructure {(AMI)}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {9},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/009},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DelavarMAM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Delgado-SeguraP16,
  author       = {Sergi Delgado{-}Segura and
                  Cristina P{\'{e}}rez{-}Sol{\`{a}} and
                  Jordi Herrera{-}Joancomart{\'{\i}} and
                  Guillermo Navarro{-}Arribas},
  title        = {Bitcoin Private Key Locked Transactions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1184},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1184},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Delgado-SeguraP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DemayGMT16,
  author       = {Gr{\'{e}}gory Demay and
                  Peter Gazi and
                  Ueli Maurer and
                  Bj{\"{o}}rn Tackmann},
  title        = {Per-Session Security: Password-Based Cryptography Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {166},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/166},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DemayGMT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DemirXZS16,
  author       = {Onur Demir and
                  Wenjie Xiong and
                  Faisal Zaghloul and
                  Jakub Szefer},
  title        = {Survey of Approaches for Security Verification of Hardware/Software
                  Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {846},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/846},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DemirXZS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Deng16,
  author       = {Yi Deng},
  title        = {Magic Adversaries Versus Individual Reduction: Science Wins Either
                  Way},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1107},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1107},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Deng16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DengS16,
  author       = {Yuqiao Deng and
                  Ge Song},
  title        = {Scalable Attribute-Based Encryption Under the Strictly Weaker Assumption
                  Family},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1029},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1029},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DengS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DengS16a,
  author       = {Yuqiao Deng and
                  Ge Song},
  title        = {Novel Inner Product Encryption Resistant to Partial Collusion Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1030},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1030},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DengS16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Derbez16,
  author       = {Patrick Derbez},
  title        = {Note on Impossible Differential Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {349},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/349},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Derbez16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DerbezF16,
  author       = {Patrick Derbez and
                  Pierre{-}Alain Fouque},
  title        = {Automatic Search of Meet-in-the-Middle and Impossible Differential
                  Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {579},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/579},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DerbezF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DerlerKS16,
  author       = {David Derler and
                  Stephan Krenn and
                  Daniel Slamanig},
  title        = {Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based
                  Data Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1064},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1064},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DerlerKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DerlerORRS16,
  author       = {David Derler and
                  Claudio Orlandi and
                  Sebastian Ramacher and
                  Christian Rechberger and
                  Daniel Slamanig},
  title        = {Digital Signatures from Symmetric-Key Primitives},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1085},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1085},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DerlerORRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DerlerS16,
  author       = {David Derler and
                  Daniel Slamanig},
  title        = {Fully-Anonymous Short Dynamic Group Signatures Without Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {154},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/154},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DerlerS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DerlerS16a,
  author       = {David Derler and
                  Daniel Slamanig},
  title        = {Key-Homomorphic Signatures and Applications to Multiparty Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {792},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/792},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DerlerS16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DeshpandeKW16,
  author       = {Apoorvaa Deshpande and
                  Venkata Koppula and
                  Brent Waters},
  title        = {Constrained Pseudorandom Functions for Unconstrained Inputs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {301},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/301},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DeshpandeKW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DhanuskodiH16,
  author       = {Siva Nishok Dhanuskodi and
                  Daniel E. Holcomb},
  title        = {Energy Optimization of Unrolled Block Ciphers using Combinational
                  Checkpointing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1093},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1093},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DhanuskodiH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DimitrovKKRW16,
  author       = {Vassil S. Dimitrov and
                  Liisi Kerik and
                  Toomas Krips and
                  Jaak Randmets and
                  Jan Willemson},
  title        = {Alternative Implementations of Secure Real Numbers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {773},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/773},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DimitrovKKRW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DingALRS16,
  author       = {Jintai Ding and
                  Saed Alsayigh and
                  Jean Lancrenon and
                  Saraswathy RV and
                  Michael Snook},
  title        = {Provably Secure Password Authenticated Key Exchange Based on {RLWE}
                  for the Post-QuantumWorld},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {552},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/552},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DingALRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DingARF16,
  author       = {Jintai Ding and
                  Saed Alsayigh and
                  Saraswathy RV and
                  Scott R. Fluhrer},
  title        = {Leakage of Signal function with reused keys in {RLWE} key exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1176},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1176},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DingARF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DinuPUVGB16,
  author       = {Daniel Dinu and
                  L{\'{e}}o Perrin and
                  Aleksei Udovenko and
                  Vesselin Velichkov and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Alex Biryukov},
  title        = {Design Strategies for {ARX} with Provable Bounds: {SPARX} and {LAX}
                  (Full Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {984},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/984},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DinuPUVGB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dinur16,
  author       = {Itai Dinur},
  title        = {New Attacks on the Concatenation and {XOR} Hash Combiners},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {131},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/131},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dinur16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DinurDKS16,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  title        = {Memory-Efficient Algorithms for Finding Needles in Haystacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {560},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/560},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DinurDKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DittlerTDS16,
  author       = {Tim Dittler and
                  Florian Tschorsch and
                  Stefan Dietzel and
                  Bj{\"{o}}rn Scheuermann},
  title        = {{ANOTEL:} Cellular Networks with Location Privacy (Extended Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {764},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/764},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DittlerTDS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEKLM16,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Thomas Korak and
                  Victor Lomn{\'{e}} and
                  Florian Mendel},
  title        = {Practical Fault Attacks on Authenticated Encryption Modes for {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {616},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/616},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEKLM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEKM16,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Thomas Korak and
                  Florian Mendel},
  title        = {Side-Channel Analysis of Keymill},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {793},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/793},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEKM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEM16,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  title        = {Cryptanalysis of Simpira},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {244},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/244},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEM16a,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  title        = {Square Attack on 7-Round Kiasu-BC},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {326},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/326},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEM16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEM16b,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  title        = {Analysis of {SHA-512/224} and {SHA-512/256}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {374},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/374},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEM16b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEM16c,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Florian Mendel},
  title        = {Key Recovery for {MANTIS-5}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {754},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/754},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEM16c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigEMMU16,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Stefan Mangard and
                  Florian Mendel and
                  Thomas Unterluggauer},
  title        = {{ISAP} - Authenticated Encryption Inherently Secure Against Passive
                  Side-Channel Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {952},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/952},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigEMMU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobraunigL16,
  author       = {Christoph Dobraunig and
                  Eik List},
  title        = {Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced
                  Kiasu-BC},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1170},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1170},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobraunigL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisGGJR16,
  author       = {Yevgeniy Dodis and
                  Chaya Ganesh and
                  Alexander Golovnev and
                  Ari Juels and
                  Thomas Ristenpart},
  title        = {A Formal Treatment of Backdoored Pseudorandom Generators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {306},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/306},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisGGJR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisHRW16,
  author       = {Yevgeniy Dodis and
                  Shai Halevi and
                  Ron D. Rothblum and
                  Daniel Wichs},
  title        = {Spooky Encryption and its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {272},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/272},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisHRW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DoernerES16,
  author       = {Jack Doerner and
                  David Evans and
                  Abhi Shelat},
  title        = {Secure Stable Matching at Scale},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {861},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/861},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DoernerES16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DongS16,
  author       = {Xiaoyang Dong and
                  Yanzhao Shen},
  title        = {Cryptanalysis of Reduced-Round Midori64 Block Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {676},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/676},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DongS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DongW16,
  author       = {Xiaoyang Dong and
                  Xiaoyun Wang},
  title        = {Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision
                  Attacks on Its Hashing Modes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {509},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/509},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DongW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DoreyCE16,
  author       = {Kristen Dorey and
                  Nicholas Chang{-}Fong and
                  Aleksander Essex},
  title        = {Indiscreet Logs: Persistent Diffie-Hellman Backdoors in {TLS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {999},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/999},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DoreyCE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DorozS16,
  author       = {Yarkin Dor{\"{o}}z and
                  Berk Sunar},
  title        = {Flattening {NTRU} for Evaluation Key Free Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {315},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/315},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DorozS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingG0MM16,
  author       = {Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Divya Gupta and
                  Peihan Miao and
                  Pratyay Mukherjee},
  title        = {Obfuscation from Low Noise Multilinear Maps},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {599},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/599},
  timestamp    = {Wed, 02 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingG0MM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingKMN16,
  author       = {Nico D{\"{o}}ttling and
                  Daniel Kraschewski and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Tobias Nilges},
  title        = {From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {201},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/201},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingKMN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DowlingFGS16,
  author       = {Benjamin Dowling and
                  Marc Fischlin and
                  Felix G{\"{u}}nther and
                  Douglas Stebila},
  title        = {A Cryptographic Analysis of the {TLS} 1.3 draft-10 Full and Pre-shared
                  Key Handshake Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {81},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/081},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DowlingFGS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DowlingGHS16,
  author       = {Benjamin Dowling and
                  Felix G{\"{u}}nther and
                  Udyani Herath and
                  Douglas Stebila},
  title        = {Secure Logging Schemes and Certificate Transparency},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {452},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/452},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DowlingGHS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuB16,
  author       = {Chaohui Du and
                  Guoqiang Bai},
  title        = {A Family of Scalable Polynomial Multiplier Architectures for Ring-LWE
                  Based Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {323},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/323},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DubrovaT16,
  author       = {Elena Dubrova and
                  Maxim Teslenko},
  title        = {A SAT-Based Algorithm for Finding Short Cycles in Shift Register Based
                  Stream Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1068},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1068},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DubrovaT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DucasS16,
  author       = {L{\'{e}}o Ducas and
                  Damien Stehl{\'{e}}},
  title        = {Sanitization of {FHE} Ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {164},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/164},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DucasS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DucasW16,
  author       = {L{\'{e}}o Ducas and
                  Wessel P. J. van Woerden},
  title        = {The closest vector problem in tensored root lattices of type {A} and
                  in their duals},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {910},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/910},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DucasW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DugardinGDNR16,
  author       = {Margaux Dugardin and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Zakaria Najm and
                  Olivier Rioul},
  title        = {Correlated Extra-Reductions Defeat Blinded Regular Exponentiation
                  - Extended Version},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {597},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/597},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DugardinGDNR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DulekSS16,
  author       = {Yfke Dulek and
                  Christian Schaffner and
                  Florian Speelman},
  title        = {Quantum homomorphic encryption for polynomial-sized circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {559},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/559},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DulekSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuongFVZ16,
  author       = {Tuyet Duong and
                  Lei Fan and
                  Thomas Veale and
                  Hong{-}Sheng Zhou},
  title        = {Securing Bitcoin-like Backbone Protocols against a Malicious Majority
                  of Computing Power},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {716},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/716},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DuongFVZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuongPT16,
  author       = {Dung Hoang Duong and
                  Albrecht Petzoldt and
                  Tsuyoshi Takagi},
  title        = {Reducing the Key Size of the {SRP} Encryption Scheme - Extended version},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {383},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/383},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuongPT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuongPWT16,
  author       = {Dung Hoang Duong and
                  Albrecht Petzoldt and
                  Yacheng Wang and
                  Tsuyoshi Takagi},
  title        = {Revisiting the Cubic {UOV} Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1079},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1079},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuongPWT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DurakDC16,
  author       = {F. Bet{\"{u}}l Durak and
                  Thomas DuBuisson and
                  David Cash},
  title        = {What Else is Revealed by Order-Revealing Encryption?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {786},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/786},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DurakDC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuttaBA16,
  author       = {Sabyasachi Dutta and
                  Tamal Bhore and
                  Avishek Adhikari},
  title        = {Efficient Construction of Visual Cryptographic Scheme for Compartmented
                  Access Structures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1113},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1113},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuttaBA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuttaJN16,
  author       = {Avijit Dutta and
                  Ashwin Jha and
                  Mridul Nandi},
  title        = {Exact Security Analysis of Hash-then-Mask Type Probabilistic {MAC}
                  Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {983},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/983},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuttaJN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuvalLR16,
  author       = {S{\'{e}}bastien Duval and
                  Virginie Lallemand and
                  Yann Rotella},
  title        = {Cryptanalysis of the {FLIP} Family of Stream Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {271},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/271},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuvalLR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DwivediKMNPW16,
  author       = {Ashutosh Dhar Dwivedi and
                  Milos Kloucek and
                  Pawel Morawiecki and
                  Ivica Nikolic and
                  Josef Pieprzyk and
                  Sebastian W{\'{o}}jtowicz},
  title        = {SAT-based Cryptanalysis of Authenticated Ciphers from the {CAESAR}
                  Competition},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1053},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1053},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DwivediKMNPW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DworkNR16,
  author       = {Cynthia Dwork and
                  Moni Naor and
                  Guy N. Rothblum},
  title        = {Spooky Interaction and its Discontents: Compilers for Succinct Two-Message
                  Argument Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {291},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/291},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DworkNR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DziembowskiFHJM16,
  author       = {Stefan Dziembowski and
                  Sebastian Faust and
                  Gottfried Herold and
                  Anthony Journault and
                  Daniel Masny and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Towards Sound Fresh Re-Keying with Hard (Physical) Learning Problems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {573},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/573},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DziembowskiFHJM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DziembowskiFS16,
  author       = {Stefan Dziembowski and
                  Sebastian Faust and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Private Circuits {III:} Hardware Trojan-Resilience via Testing Amplification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1004},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1004},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DziembowskiFS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EgbertCO16,
  author       = {Andrew Egbert and
                  Brad Chun and
                  Thomas Otte},
  title        = {Identity Chains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {469},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/469},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EgbertCO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ekera16,
  author       = {Martin Eker{\aa}},
  title        = {Modifying Shor's algorithm to compute short discrete logarithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1128},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1128},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ekera16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EspitauFGK16,
  author       = {Thomas Espitau and
                  Pierre{-}Alain Fouque and
                  Alexandre G{\'{e}}lin and
                  Paul Kirchner},
  title        = {Computing generator in cyclotomic integer rings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {957},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/957},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EspitauFGK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EspitauFGT16,
  author       = {Thomas Espitau and
                  Pierre{-}Alain Fouque and
                  Beno{\^{\i}}t G{\'{e}}rard and
                  Mehdi Tibouchi},
  title        = {Loop abort Faults on Lattice-Based Fiat-Shamir {\&} Hash'n Sign
                  signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {449},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/449},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EspitauFGT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EspitauJ16,
  author       = {Thomas Espitau and
                  Antoine Joux},
  title        = {Adaptive precision {LLL} and Potential-LLL reductions with Interval
                  arithmetic},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {528},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/528},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EspitauJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EtemadK16,
  author       = {Mohammad Etemad and
                  Alptekin K{\"{u}}p{\c{c}}{\"{u}}},
  title        = {A Generic Dynamic Provable Data Possession Framework},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {748},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/748},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EtemadK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FanGM16,
  author       = {Xiong Fan and
                  Juan A. Garay and
                  Payman Mohassel},
  title        = {Short and Adjustable Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {549},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/549},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FanGM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FanL16,
  author       = {Xiong Fan and
                  Feng{-}Hao Liu},
  title        = {Various Proxy Re-Encryption Schemes from Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {278},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/278},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FanL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaonioN16,
  author       = {Antonio Faonio and
                  Jesper Buus Nielsen},
  title        = {Non-Malleable Codes with Split-State Refresh},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1192},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1192},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FaonioN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaonioV16,
  author       = {Antonio Faonio and
                  Daniele Venturi},
  title        = {Efficient Public-Key Cryptography with Bounded Leakage and Tamper
                  Resilience},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {529},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/529},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FaonioV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FarrasRR16,
  author       = {Oriol Farr{\`{a}}s and
                  Jordi Ribes{-}Gonz{\'{a}}lez and
                  Sara Ricci},
  title        = {Bounds on the Information Ratios of Secret Sharing Schemes for Close
                  Access Structures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {726},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/726},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FarrasRR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FarshimM16,
  author       = {Pooya Farshim and
                  Arno Mittelbach},
  title        = {Modeling Random Oracles under Unpredictable Queries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {423},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/423},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FarshimM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FauziL016,
  author       = {Prastudy Fauzi and
                  Helger Lipmaa and
                  Michal Zajac},
  title        = {A Shuffle Argument Secure in the Generic Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {866},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/866},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FauziL016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FehrF16,
  author       = {Serge Fehr and
                  Max Fillinger},
  title        = {On the Composition of Two-Prover Commitments, and Applications to
                  Multi-Round Relativistic Commitments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {113},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/113},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FehrF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FeitenS16,
  author       = {Linus Feiten and
                  Matthias Sauer},
  title        = {Extracting the {RC4} secret key of the Open Smart Grid Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {455},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/455},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FeitenS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FeitenSB16,
  author       = {Linus Feiten and
                  Matthias Sauer and
                  Bernd Becker},
  title        = {On Metrics to Quantify the Inter-Device Uniqueness of PUFs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {320},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/320},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FeitenSB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FernandoRS16,
  author       = {Rex Fernando and
                  Peter M. R. Rasmussen and
                  Amit Sahai},
  title        = {Preventing {CLT} Zeroizing Attacks on Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1070},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1070},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FernandoRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FerradiGMNP16,
  author       = {Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  Diana Maimut and
                  David Naccache and
                  David Pointcheval},
  title        = {Legally Fair Contract Signing Without Keystones},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {363},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/363},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FerradiGMNP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FerradiGN16,
  author       = {Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  title        = {Slow Motion Zero Knowledge Identifying With Colliding Commitments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {399},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/399},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FerradiGN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FerradiGN16a,
  author       = {Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  title        = {Human Public-Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {763},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/763},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FerradiGN16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FillingerS16,
  author       = {Max Fillinger and
                  Marc Stevens},
  title        = {Reverse-Engineering of the Cryptanalytic Attack Used in the Flame
                  Super-Malware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {298},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/298},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FillingerS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FioreFGKOP16,
  author       = {Dario Fiore and
                  C{\'{e}}dric Fournet and
                  Esha Ghosh and
                  Markulf Kohlweiss and
                  Olga Ohrimenko and
                  Bryan Parno},
  title        = {Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced
                  Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {985},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/985},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FioreFGKOP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FioreMNP16,
  author       = {Dario Fiore and
                  Aikaterini Mitrokotsa and
                  Luca Nizzardo and
                  Elena Pagnin},
  title        = {Multi-Key Homomorphic Authenticators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {804},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/804},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FioreMNP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FioreN16,
  author       = {Dario Fiore and
                  Anca Nitulescu},
  title        = {On the (In)security of SNARKs in the Presence of Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {112},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/112},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FioreN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FischlinHNS16,
  author       = {Marc Fischlin and
                  Amir Herzberg and
                  Hod Bin Noon and
                  Haya Schulmann},
  title        = {Obfuscation Combiners},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {289},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/289},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FischlinHNS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FischlinLP16,
  author       = {Marc Fischlin and
                  Anja Lehmann and
                  Krzysztof Pietrzak},
  title        = {Robust Multi-Property Combiners for Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {723},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/723},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FischlinLP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Flori16,
  author       = {Jean{-}Pierre Flori},
  title        = {A conjecture about Gauss sums and bentness of binomial Boolean functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {767},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/767},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Flori16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Fluhrer16,
  author       = {Scott R. Fluhrer},
  title        = {Cryptanalysis of ring-LWE based key exchange with key share reuse},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {85},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/085},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Fluhrer16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ForlerLLW16,
  author       = {Christian Forler and
                  Eik List and
                  Stefan Lucks and
                  Jakob Wenzel},
  title        = {Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated
                  Encryption with Minimal Stretch},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {395},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/395},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ForlerLLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ForteRS16,
  author       = {Pasquale Forte and
                  Diego Romano and
                  Giovanni Schmid},
  title        = {Beyond Bitcoin - Part {II:} Blockchain-based systems without mining},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {747},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/747},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ForteRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FouotsaMP16,
  author       = {Emmanuel Fouotsa and
                  Nadia El Mrabet and
                  Aminatou Pecha},
  title        = {Optimal Ate Pairing on Elliptic Curves with Embedding Degree 9, 15
                  and 27},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1187},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1187},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FouotsaMP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FouqueKKM16,
  author       = {Pierre{-}Alain Fouque and
                  Pierre Karpman and
                  Paul Kirchner and
                  Brice Minaud},
  title        = {Efficient and Provable White-Box Primitives},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {642},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/642},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FouqueKKM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FouqueOR16,
  author       = {Pierre{-}Alain Fouque and
                  Cristina Onete and
                  Benjamin Richard},
  title        = {Achieving Better Privacy for the 3GPP {AKA} Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {480},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/480},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FouqueOR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FriedGHT16,
  author       = {Joshua Fried and
                  Pierrick Gaudry and
                  Nadia Heninger and
                  Emmanuel Thom{\'{e}}},
  title        = {A kilobit hidden {SNFS} discrete logarithm computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {961},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/961},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FriedGHT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuWGSH16,
  author       = {Kai Fu and
                  Meiqin Wang and
                  Yinghua Guo and
                  Siwei Sun and
                  Lei Hu},
  title        = {MILP-Based Automatic Search Algorithms for Diff erential and Linear
                  Trails for Speck},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {407},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/407},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuWGSH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuchsbauerHKS16,
  author       = {Georg Fuchsbauer and
                  Christian Hanser and
                  Chethan Kamath and
                  Daniel Slamanig},
  title        = {Practical Round-Optimal Blind Signatures in the Standard Model from
                  Weaker Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {662},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/662},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuchsbauerHKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuchsbauerJP16,
  author       = {Georg Fuchsbauer and
                  Zahra Jafargholi and
                  Krzysztof Pietrzak},
  title        = {A Quasipolynomial Reduction for Generalized Selective Decryption on
                  Trees},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {389},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/389},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuchsbauerJP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FujimotoBND16,
  author       = {Daisuke Fujimoto and
                  Shivam Bhasin and
                  Makoto Nagata and
                  Jean{-}Luc Danger},
  title        = {A Novel Methodology for Testing Hardware Security and Trust Exploiting
                  On-Chip Power Noise Measurements (Extended Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {522},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/522},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FujimotoBND16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Fujisaki16,
  author       = {Eiichiro Fujisaki},
  title        = {Improving Practical UC-Secure Commitments based on the {DDH} Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {656},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/656},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Fujisaki16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FurukawaLNW16,
  author       = {Jun Furukawa and
                  Yehuda Lindell and
                  Ariel Nof and
                  Or Weinstein},
  title        = {High-Throughput Secure Three-Party Computation for Malicious Adversaries
                  and an Honest Majority},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {944},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/944},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FurukawaLNW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GabrisS16,
  author       = {Martin G{\'{a}}bris and
                  Martin Stanek},
  title        = {State recovery of {RC4} and Spritz Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {337},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/337},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GabrisS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GadiyarP16,
  author       = {H. Gopalakrishna Gadiyar and
                  R. Padma},
  title        = {The Discrete Logarithm Problem over Prime Fields can be transformed
                  to a Linear Multivariable Chinese Remainder Theorem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {836},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/836},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GadiyarP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithGM16,
  author       = {Steven D. Galbraith and
                  Shishay W. Gebregiyorgis and
                  Sean Murphy},
  title        = {Algorithms for the Approximate Common Divisor Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {215},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/215},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithGM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithLS16,
  author       = {Steven D. Galbraith and
                  Joel Laity and
                  Barak Shani},
  title        = {Finding Significant Fourier Coefficients: Clarifications, Simplifications,
                  Applications and Limitations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {682},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/682},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithPS16,
  author       = {Steven D. Galbraith and
                  Christophe Petit and
                  Javier Silva},
  title        = {Signature Schemes Based On Supersingular Isogeny Problems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1154},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1154},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithPST16,
  author       = {Steven D. Galbraith and
                  Christophe Petit and
                  Barak Shani and
                  Yan Bo Ti},
  title        = {On the Security of Supersingular Isogeny Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {859},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/859},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithPST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gallegos-Garcia16,
  author       = {Gina Gallegos{-}Garc{\'{\i}}a and
                  Vincenzo Iovino and
                  Alfredo Rial and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan},
  title        = {(Universal) Unconditional Verifiability in E-Voting without Trusted
                  Parties},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {975},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/975},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gallegos-Garcia16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaltelandMO16,
  author       = {Herman Galteland and
                  Stig Fr. Mj{\o}lsnes and
                  Ruxandra F. Olimid},
  title        = {Attacks on cMix - Some Small Overlooked Details},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {729},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/729},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaltelandMO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GanjiTFS16,
  author       = {Fatemeh Ganji and
                  Shahin Tajik and
                  Fabian F{\"{a}}{\ss}ler and
                  Jean{-}Pierre Seifert},
  title        = {Strong Machine Learning Attack against PUFs with No Mathematical Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {606},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/606},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GanjiTFS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaoCWFCM16,
  author       = {Si Gao and
                  Hua Chen and
                  Wenling Wu and
                  Limin Fan and
                  Weiqiong Cao and
                  Xiangliang Ma},
  title        = {My traces learn what you did in the dark: recovering secret signals
                  without key guesses},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1082},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1082},
  timestamp    = {Fri, 04 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaoCWFCM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarayKL16,
  author       = {Juan A. Garay and
                  Aggelos Kiayias and
                  Nikos Leonardos},
  title        = {The Bitcoin Backbone Protocol with Chains of Variable Difficulty},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1048},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1048},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarayKL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarayKLP16,
  author       = {Juan A. Garay and
                  Aggelos Kiayias and
                  Nikos Leonardos and
                  Giorgos Panagiotakos},
  title        = {Bootstrapping the Blockchain - Directly},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {991},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/991},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarayKLP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Garcia-MorchonR16,
  author       = {{\'{O}}scar Garc{\'{\i}}a{-}Morch{\'{o}}n and
                  Ronald Rietman and
                  Ludo Tolhuizen and
                  Jose Luis Torre{-}Arce and
                  Sauvik Bhattacharya and
                  Maarten P. Bodlaender},
  title        = {Efficient quantum-resistant trust Infrastructure based on {HIMMO}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {410},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/410},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Garcia-MorchonR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarciaB16,
  author       = {Cesar Pereida Garc{\'{\i}}a and
                  Billy Bob Brumley},
  title        = {Constant-Time Callees with Variable-Time Callers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1195},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1195},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarciaB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarciaBY16,
  author       = {Cesar Pereida Garc{\'{\i}}a and
                  Billy Bob Brumley and
                  Yuval Yarom},
  title        = {"Make Sure {DSA} Signing Exponentiations Really are Constant-Time"},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {594},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/594},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarciaBY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Garg0MP16,
  author       = {Sanjam Garg and
                  Divya Gupta and
                  Peihan Miao and
                  Omkant Pandey},
  title        = {Secure Multiparty {RAM} Computation in Constant Rounds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {815},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/815},
  timestamp    = {Wed, 02 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Garg0MP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargMMSSZ16,
  author       = {Sanjam Garg and
                  Eric Miles and
                  Pratyay Mukherjee and
                  Amit Sahai and
                  Akshayaram Srinivasan and
                  Mark Zhandry},
  title        = {Secure Obfuscation in a Weak Multilinear Map Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {817},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/817},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargMMSSZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargMPP16,
  author       = {Sanjam Garg and
                  Pratyay Mukherjee and
                  Omkant Pandey and
                  Antigoni Polychroniadou},
  title        = {The Exact Round Complexity of Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {252},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/252},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargMPP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargMS16,
  author       = {Sanjam Garg and
                  Pratyay Mukherjee and
                  Akshayaram Srinivasan},
  title        = {Obfuscation without the Vulnerabilities of Multilinear Maps},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {390},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/390},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargPSZ16,
  author       = {Sanjam Garg and
                  Omkant Pandey and
                  Akshayaram Srinivasan and
                  Mark Zhandry},
  title        = {Breaking the Sub-Exponential Barrier in Obfustopia},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {102},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/102},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargPSZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargS16,
  author       = {Sanjam Garg and
                  Akshayaram Srinivasan},
  title        = {Unifying Security Notions of Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {524},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/524},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Garman0M16,
  author       = {Christina Garman and
                  Matthew Green and
                  Ian Miers},
  title        = {Accountable Privacy for Decentralized Anonymous Payments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {61},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/061},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Garman0M16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GasconSB0DZE16,
  author       = {Adri{\`{a}} Gasc{\'{o}}n and
                  Phillipp Schoppmann and
                  Borja Balle and
                  Mariana Raykova and
                  Jack Doerner and
                  Samee Zahur and
                  David Evans},
  title        = {Secure Linear Regression on Vertically Partitioned Datasets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {892},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/892},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GasconSB0DZE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaudryGV16,
  author       = {Pierrick Gaudry and
                  Laurent Gr{\'{e}}my and
                  Marion Videau},
  title        = {Collecting relations for the Number Field Sieve in GF(p\({}^{\mbox{6)}}\)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {124},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/124},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaudryGV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gavin16,
  author       = {G{\'{e}}rald Gavin},
  title        = {An efficient somewhat homomorphic encryption scheme based on factorization},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {897},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/897},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gavin16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GawelKVWZ16,
  author       = {Dawid Gawel and
                  Maciej Kosarzecki and
                  Poorvi L. Vora and
                  Hua Wu and
                  Filip Zag{\'{o}}rski},
  title        = {Apollo - End-to-end Verifiable Internet Voting with Recovery from
                  Vote Manipulation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1037},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1037},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GawelKVWZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gay16,
  author       = {Romain Gay},
  title        = {Functional Encryption for Quadratic Functions, and Applications to
                  Predicate Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1106},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1106},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gay16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GayHKW16,
  author       = {Romain Gay and
                  Dennis Hofheinz and
                  Eike Kiltz and
                  Hoeteck Wee},
  title        = {Tightly Secure CCA-Secure Encryption without Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {94},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/094},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GayHKW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaziT16,
  author       = {Peter Gazi and
                  Stefano Tessaro},
  title        = {Provably Robust Sponge-Based PRNGs and KDFs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {169},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/169},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaziT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GeYCH16,
  author       = {Qian Ge and
                  Yuval Yarom and
                  David A. Cock and
                  Gernot Heiser},
  title        = {A Survey of Microarchitectural Timing Attacks and Countermeasures
                  on Contemporary Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {613},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/613},
  timestamp    = {Wed, 21 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GeYCH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GelernterHL16,
  author       = {Nethanel Gelernter and
                  Amir Herzberg and
                  Hemi Leibowitz},
  title        = {Two Cents for Strong Anonymity: The Anonymous Post-office Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {489},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/489},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GelernterHL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GelinJ16,
  author       = {Alexandre G{\'{e}}lin and
                  Antoine Joux},
  title        = {Reducing number field defining polynomials: An application to class
                  group computations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {531},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/531},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GelinJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GelinKL16,
  author       = {Alexandre G{\'{e}}lin and
                  Thorsten Kleinjung and
                  Arjen K. Lenstra},
  title        = {Parametrizations for Families of ECM-friendly curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1092},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1092},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GelinKL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GenkinIW16,
  author       = {Daniel Genkin and
                  Yuval Ishai and
                  Mor Weiss},
  title        = {Binary {AMD} Circuits from Secure Multiparty Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {809},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/809},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GenkinIW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GenkinPPT16,
  author       = {Daniel Genkin and
                  Lev Pachmanov and
                  Itamar Pipman and
                  Eran Tromer},
  title        = {{ECDH} Key-Extraction via Low-Bandwidth Electromagnetic Attacks on
                  PCs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {129},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/129},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GenkinPPT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GenkinPPTY16,
  author       = {Daniel Genkin and
                  Lev Pachmanov and
                  Itamar Pipman and
                  Eran Tromer and
                  Yuval Yarom},
  title        = {{ECDSA} Key Extraction from Mobile Devices via Nonintrusive Physical
                  Side Channels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {230},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/230},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GenkinPPTY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GennaroGN16,
  author       = {Rosario Gennaro and
                  Steven Goldfeder and
                  Arvind Narayanan},
  title        = {Threshold-optimal {DSA/ECDSA} signatures and an application to Bitcoin
                  wallet security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {13},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/013},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GennaroGN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GervaisFLC16,
  author       = {Arthur Gervais and
                  Alexandros Filios and
                  Vincent Lenders and
                  Srdjan Capkun},
  title        = {Quantifying Web Adblocker Privacy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {900},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/900},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GervaisFLC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GervaisKWGRC16,
  author       = {Arthur Gervais and
                  Ghassan O. Karame and
                  Karl W{\"{u}}st and
                  Vasileios Glykantzis and
                  Hubert Ritzdorf and
                  Srdjan Capkun},
  title        = {On the Security and Performance of Proof of Work Blockchains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {555},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/555},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GervaisKWGRC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ghadafi16,
  author       = {Essam Ghadafi},
  title        = {More Efficient Structure-Preserving Signatures - Or: Bypassing the
                  Type-III Lower Bounds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {255},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/255},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ghadafi16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GhammamF16,
  author       = {Loubna Ghammam and
                  Emmanuel Fouotsa},
  title        = {On the Computation of the Optimal Ate Pairing at the 192-bit Security
                  Level},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {130},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/130},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GhammamF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GhammamF16a,
  author       = {Loubna Ghammam and
                  Emmanuel Fouotsa},
  title        = {Adequate Elliptic Curve for Computing the Product of n Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {472},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/472},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GhammamF16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GhandaliBHP16,
  author       = {Samaneh Ghandali and
                  Georg T. Becker and
                  Daniel E. Holcomb and
                  Christof Paar},
  title        = {A Design Methodology for Stealthy Parametric Trojans and Its Application
                  to Bug Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {600},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/600},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GhandaliBHP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GiacomelliMO16,
  author       = {Irene Giacomelli and
                  Jesper Madsen and
                  Claudio Orlandi},
  title        = {ZKBoo: Faster Zero-Knowledge for Boolean Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {163},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/163},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GiacomelliMO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GiechaskielCR16,
  author       = {Ilias Giechaskiel and
                  Cas Cremers and
                  Kasper Bonne Rasmussen},
  title        = {On Bitcoin Security in the Presence of Broken Crypto Primitives},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {167},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/167},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GiechaskielCR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gilad-BachrachL16,
  author       = {Ran Gilad{-}Bachrach and
                  Kim Laine and
                  Kristin E. Lauter and
                  Peter Rindal and
                  Mike Rosulek},
  title        = {Secure Data Exchange: {A} Marketplace in the Cloud},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {620},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/620},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gilad-BachrachL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GiladCHSS16,
  author       = {Yossi Gilad and
                  Avichai Cohen and
                  Amir Herzberg and
                  Michael Schapira and
                  Haya Schulmann},
  title        = {Are We There Yet? On RPKI's Deployment and Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1010},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1010},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GiladCHSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GiladSG16,
  author       = {Yossi Gilad and
                  Omar Sagga and
                  Sharon Goldberg},
  title        = {MaxLength Considered Harmful to the {RPKI}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1015},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1015},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GiladSG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gjosteen016,
  author       = {Kristian Gj{\o}steen and
                  Martin Strand},
  title        = {Fully homomorphic encryption must be fat or ugly?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {105},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/105},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gjosteen016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GligoroskiS16,
  author       = {Danilo Gligoroski and
                  Simona Samardjiska},
  title        = {Semantic Security and Key-Privacy With Random Split of St-Gen Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {218},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/218},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GligoroskiS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GligoroskiS16a,
  author       = {Danilo Gligoroski and
                  Simona Samardjiska},
  title        = {A Digital Signature Scheme Based on Random Split of St-Gen Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {391},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/391},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GligoroskiS16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldbergNPR16,
  author       = {Sharon Goldberg and
                  Moni Naor and
                  Dimitrios Papadopoulos and
                  Leonid Reyzin},
  title        = {{NSEC5} from Elliptic Curves: Provably Preventing {DNSSEC} Zone Enumeration
                  with Shorter Responses},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {83},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/083},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldbergNPR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldfederCZ16,
  author       = {Steven Goldfeder and
                  Melissa Chase and
                  Greg Zaverucha},
  title        = {Efficient Post-Quantum Zero-Knowledge and Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1110},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1110},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldfederCZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GologluRW16,
  author       = {Faruk G{\"{o}}loglu and
                  Vincent Rijmen and
                  Qingju Wang},
  title        = {On the division property of S-boxes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {188},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/188},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GologluRW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GongD0C16,
  author       = {Junqing Gong and
                  Xiaolei Dong and
                  Jie Chen and
                  Zhenfu Cao},
  title        = {Efficient {IBE} with Tight Reduction to Standard Assumption in the
                  Multi-challenge Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {860},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/860},
  timestamp    = {Thu, 07 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GongD0C16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GongZ16,
  author       = {Boru Gong and
                  Yunlei Zhao},
  title        = {Small Field Attack, and Revisiting RLWE-Based Authenticated Key Exchange
                  from Eurocrypt'15},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {913},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/913},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GongZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoodrichKMT16,
  author       = {Michael T. Goodrich and
                  Evgenios M. Kornaropoulos and
                  Michael Mitzenmacher and
                  Roberto Tamassia},
  title        = {More Practical and Secure History-Independent Hash Tables},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {134},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/134},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoodrichKMT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoodrichKMT16a,
  author       = {Michael T. Goodrich and
                  Evgenios M. Kornaropoulos and
                  Michael Mitzenmacher and
                  Roberto Tamassia},
  title        = {Auditable Data Structures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {755},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/755},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoodrichKMT16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GorbunovV16,
  author       = {Sergey Gorbunov and
                  Dhinakaran Vinayagamurthy},
  title        = {Functional Encryption from Secure Enclaves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1071},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1071},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GorbunovV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gorodilova16,
  author       = {Anastasiya Gorodilova},
  title        = {On a remarkable property of {APN} Gold functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {286},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/286},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gorodilova16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoudarziR16,
  author       = {Dahmun Goudarzi and
                  Matthieu Rivain},
  title        = {How Fast Can Higher-Order Masking Be in Software?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {264},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/264},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoudarziR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoudarziR16a,
  author       = {Dahmun Goudarzi and
                  Matthieu Rivain},
  title        = {On the Multiplicative Complexity of Boolean Functions and Bitsliced
                  Higher-Order Masking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {557},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/557},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoudarziR16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalKW16,
  author       = {Rishab Goyal and
                  Venkata Koppula and
                  Brent Waters},
  title        = {Semi-Adaptive Security and Bundling Functionalities Made Generic and
                  Easy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {317},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/317},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalKW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrassiRR16,
  author       = {Lorenzo Grassi and
                  Christian Rechberger and
                  Sondre R{\o}njom},
  title        = {Subspace Trail Cryptanalysis and its Applications to {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {592},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/592},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrassiRR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrassiRRSS16,
  author       = {Lorenzo Grassi and
                  Christian Rechberger and
                  Dragos Rotaru and
                  Peter Scholl and
                  Nigel P. Smart},
  title        = {MPC-Friendly Symmetric Key Primitives},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {542},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/542},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrassiRRSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GreenM16,
  author       = {Matthew D. Green and
                  Ian Miers},
  title        = {Bolt: Anonymous Payment Channels for Decentralized Currencies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {701},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/701},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GreenM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GroceLMY16,
  author       = {Adam Groce and
                  Alex Ledger and
                  Alex J. Malozemoff and
                  Arkady Yerukhimovich},
  title        = {CompGC: Efficient Offline/Online Semi-honest Two-party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {458},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/458},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GroceLMY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrootPPSB16,
  author       = {Wouter de Groot and
                  Kostas Papagiannopoulos and
                  Antonio de la Piedra and
                  Erik Schneider and
                  Lejla Batina},
  title        = {Bitsliced Masking and {ARM:} Friends or Foes?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {946},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/946},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrootPPSB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrossJMUW16,
  author       = {Hannes Gro{\ss} and
                  Manuel Jelinek and
                  Stefan Mangard and
                  Thomas Unterluggauer and
                  Mario Werner},
  title        = {Concealing Secrets in Embedded Processors Designs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {935},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/935},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrossJMUW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrossMK16,
  author       = {Hannes Gro{\ss} and
                  Stefan Mangard and
                  Thomas Korak},
  title        = {Domain-Oriented Masking: Compact Masked Hardware Implementations with
                  Arbitrary Protection Order},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {486},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/486},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrossMK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Groth16,
  author       = {Jens Groth},
  title        = {On the Size of Pairing-based Non-interactive Arguments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {260},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/260},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Groth16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrubbsMNRS16,
  author       = {Paul Grubbs and
                  Richard McPherson and
                  Muhammad Naveed and
                  Thomas Ristenpart and
                  Vitaly Shmatikov},
  title        = {Breaking Web Applications Built On Top of Encrypted Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {920},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/920},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrubbsMNRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrubbsSB0R16,
  author       = {Paul Grubbs and
                  Kevin Sekniqi and
                  Vincent Bindschaedler and
                  Muhammad Naveed and
                  Thomas Ristenpart},
  title        = {Leakage-Abuse Attacks against Order-Revealing Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {895},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/895},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrubbsSB0R16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gu16,
  author       = {Chunsheng Gu},
  title        = {Cryptanalysis of Simple Matrix Scheme for Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1075},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1075},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gu16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gueron16,
  author       = {Shay Gueron},
  title        = {A Memory Encryption Engine Suitable for General Purpose Processors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {204},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/204},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gueron16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GueronM16,
  author       = {Shay Gueron and
                  Nicky Mouha},
  title        = {Simpira v2: {A} Family of Efficient Permutations Using the {AES} Round
                  Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {122},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/122},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GueronM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GueronS16,
  author       = {Shay Gueron and
                  Fabian Schlieker},
  title        = {Speeding up {R-LWE} post-quantum key exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {467},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/467},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GueronS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuerriniIW16,
  author       = {Eleonora Guerrini and
                  Laurent Imbert and
                  Th{\'{e}}o Winterhalter},
  title        = {Randomized Mixed-Radix Scalar Multiplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1022},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1022},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuerriniIW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Guillevic16,
  author       = {Aurore Guillevic},
  title        = {Faster individual discrete logarithms in non-prime finite fields with
                  the {NFS} and {FFS} algorithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {684},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/684},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Guillevic16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuillevicMT16,
  author       = {Aurore Guillevic and
                  Fran{\c{c}}ois Morain and
                  Emmanuel Thom{\'{e}}},
  title        = {Solving discrete logarithms on a 170-bit {MNT} curve by pairing reduction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {507},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/507},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuillevicMT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuilleyHR16,
  author       = {Sylvain Guilley and
                  Annelie Heuser and
                  Olivier Rioul},
  title        = {A Key to Success - Success Exponents for Side-Channel Distinguishers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {987},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/987},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuilleyHR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Guo016,
  author       = {Qian Guo and
                  Thomas Johansson},
  title        = {A New Birthday-Type Algorithm for Attacking the Fresh Re-Keying Countermeasure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {225},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/225},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Guo016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Guo0S16,
  author       = {Qian Guo and
                  Thomas Johansson and
                  Paul Stankovski},
  title        = {Coded-BKW: Solving {LWE} Using Lattice Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {310},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/310},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Guo0S16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Guo0S16a,
  author       = {Qian Guo and
                  Thomas Johansson and
                  Paul Stankovski},
  title        = {A Key Recovery Attack on {MDPC} with {CCA} Security Using Decoding
                  Errors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {858},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/858},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Guo0S16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoJNS16,
  author       = {Jian Guo and
                  J{\'{e}}r{\'{e}}my Jean and
                  Ivica Nikolic and
                  Yu Sasaki},
  title        = {Meet-in-the-Middle Attacks on Classes of Contracting and Expanding
                  Feistel Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1162},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1162},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoJNS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoLWL16,
  author       = {Zhiyuan Guo and
                  Renzhang Liu and
                  Wenling Wu and
                  Dongdai Lin},
  title        = {Direct Construction of Lightweight Rotational-XOR {MDS} Diffusion
                  Layers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1036},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1036},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoLWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoSMCLY16,
  author       = {Fuchun Guo and
                  Willy Susilo and
                  Yi Mu and
                  Rongmao Chen and
                  Jianchang Lai and
                  Guomin Yang},
  title        = {Iterated Random Oracle: {A} Universal Approach for Finding Loss in
                  Security Reduction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {872},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/872},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoSMCLY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoWLZ16,
  author       = {Zhiyuan Guo and
                  Wenling Wu and
                  Renzhang Liu and
                  Liting Zhang},
  title        = {Multi-key Analysis of Tweakable Even-Mansour with Applications to
                  Minalpher and {OPP}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1098},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1098},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoWLZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaaghJLOS16,
  author       = {Helene Haagh and
                  Yue Ji and
                  Chenxing Li and
                  Claudio Orlandi and
                  Yifan Song},
  title        = {Revealing Encryption for Partial Ordering},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {972},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/972},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaaghJLOS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaberHZ16,
  author       = {Stuart Haber and
                  William G. Horne and
                  Miaomiao Zhang},
  title        = {Efficient Transparent Redactable Signatures with a Single Signature
                  Invocation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1165},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1165},
  timestamp    = {Mon, 11 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaberHZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HalakWI16,
  author       = {Basel Halak and
                  Said Subhan Waizi and
                  Asad Islam},
  title        = {A Survey of Hardware Implementations of Elliptic Curve Cryptographic
                  Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {712},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/712},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HalakWI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hamann0M16,
  author       = {Matthias Hamann and
                  Matthias Krause and
                  Willi Meier},
  title        = {{LIZARD} - {A} Lightweight Stream Cipher for Power-constrained Devices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {926},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/926},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hamann0M16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HamlinSSVYY16,
  author       = {Ariel Hamlin and
                  Nabil Schear and
                  Emily Shen and
                  Mayank Varia and
                  Sophia Yakoubov and
                  Arkady Yerukhimovich},
  title        = {Cryptography for Big Data Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {12},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/012},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HamlinSSVYY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HanLL16,
  author       = {Shuai Han and
                  Shengli Liu and
                  Lin Lyu},
  title        = {Efficient {KDM-CCA} Secure Public-Key Encryption for Polynomial Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {829},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/829},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HanLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HanLL16a,
  author       = {Shuai Han and
                  Shengli Liu and
                  Lin Lyu},
  title        = {Super-Strong {RKA} Secure MAC, {PKE} and {SE} from Tag-based Hash
                  Proof System},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1051},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1051},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HanLL16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HanzlikK16,
  author       = {Lucjan Hanzlik and
                  Kamil Kluczniak},
  title        = {Security Analysis of ePrint Report 2016/500 "Efficient Identity-Based
                  Encryption and Public-Key Signature from Trapdoor Subgroups"},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {512},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/512},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HanzlikK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hao16,
  author       = {Yonglin Hao},
  title        = {Improved Meet-in-the-Middle Attacks on Round-Reduced Crypton-256},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {267},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/267},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hao16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaoM16,
  author       = {Yonglin Hao and
                  Willi Meier},
  title        = {Truncated Differential Based Known-Key Attacks on Round-Reduced Simon},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {20},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/020},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaoM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hartung16,
  author       = {Gunnar Hartung},
  title        = {Secure Audit Logs with Verifiable Excerpts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {283},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/283},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hartung16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HartungKKKR16,
  author       = {Gunnar Hartung and
                  Bj{\"{o}}rn Kaidel and
                  Alexander Koch and
                  Jessica Koch and
                  Andy Rupp},
  title        = {Fault-Tolerant Aggregate Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {52},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/052},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HartungKKKR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hashimoto16,
  author       = {Yasufumi Hashimoto},
  title        = {A note on Tensor Simple Matrix Encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {65},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/065},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hashimoto16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hashimoto16a,
  author       = {Yasufumi Hashimoto},
  title        = {On the security of new vinegar-like variant of multivariate signature
                  scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {787},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/787},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hashimoto16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hashimoto16b,
  author       = {Yasufumi Hashimoto},
  title        = {On the security of Cubic {UOV}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {788},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/788},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hashimoto16b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HazayV16,
  author       = {Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {On the Power of Secure Two-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {74},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/074},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HazayV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HazayV16a,
  author       = {Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Composable Adaptive Secure Protocols without Setup under Polytime
                  Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {818},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/818},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HazayV16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HazayY16,
  author       = {Carmit Hazay and
                  Avishay Yanai},
  title        = {Constant-Round Maliciously Secure Two-Party Computation in the {RAM}
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {805},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/805},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HazayY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeYXQ16,
  author       = {Libo He and
                  Chen Yuan and
                  Hu Xiong and
                  Zhiguang Qin},
  title        = {Certificateless Key Insulated Encryption: Cryptographic Primitive
                  for Achieving Key-escrow free and Key-exposure Resilience},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {501},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/501},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeYXQ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeilmanBASG16,
  author       = {Ethan Heilman and
                  Foteini Baldimtsi and
                  Leen Alshenibr and
                  Alessandra Scafuro and
                  Sharon Goldberg},
  title        = {TumbleBit: An Untrusted Tumbler for Bitcoin-Compatible Anonymous Payments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {575},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/575},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeilmanBASG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeilmanBG16,
  author       = {Ethan Heilman and
                  Foteini Baldimtsi and
                  Sharon Goldberg},
  title        = {Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain
                  Bitcoin Transactions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {56},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/056},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeilmanBG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HemenwayLOW16,
  author       = {Brett Hemenway and
                  Steve Lu and
                  Rafail Ostrovsky and
                  William Welser IV},
  title        = {High-precision Secure Computation of Satellite Collision Probabilities},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {319},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/319},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HemenwayLOW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HemenwayO16,
  author       = {Brett Hemenway and
                  Rafail Ostrovsky},
  title        = {Efficient Robust Secret Sharing from Expander Graphs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {735},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/735},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HemenwayO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Henry16,
  author       = {Ryan Henry},
  title        = {Polynomial Batch Codes for Efficient {IT-PIR}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {598},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/598},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Henry16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HerzbergK16,
  author       = {Amir Herzberg and
                  Yehonatan Kfir},
  title        = {Topology-based Plug-and-Play Key-Setup},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {60},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/060},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HerzbergK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeuerJKS16,
  author       = {Felix Heuer and
                  Tibor Jager and
                  Eike Kiltz and
                  Sven Sch{\"{a}}ge},
  title        = {On the Selective Opening Security of Practical Public-Key Encryption
                  Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {342},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/342},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeuerJKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HeuerP16,
  author       = {Felix Heuer and
                  Bertram Poettering},
  title        = {Selective Opening Security from Simulatable Data Encapsulation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {845},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/845},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HeuerP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HieuK16,
  author       = {Duong Hieu Phan and
                  Neal Koblitz},
  title        = {Cryptography during the French and American Wars in Vietnam},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1136},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1136},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HieuK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HigoTYY16,
  author       = {Haruna Higo and
                  Keisuke Tanaka and
                  Akihiro Yamada and
                  Kenji Yasunaga},
  title        = {Game-Theoretic Security for Two-Party Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1072},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1072},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HigoTYY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HillerPKS16,
  author       = {Matthias Hiller and
                  Michael Pehl and
                  Gerhard Kramer and
                  Georg Sigl},
  title        = {Algebraic Security Analysis of Key Generation with Physical Unclonable
                  Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {854},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/854},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HillerPKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hirose16,
  author       = {Shoichi Hirose},
  title        = {May-Ozerov Algorithm for Nearest-Neighbor Problem over {\(\mathbb{F}\)}\({}_{\mbox{q}}\)
                  and Its Application to Information Set Decoding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {237},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/237},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hirose16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HiroseY16,
  author       = {Shoichi Hirose and
                  Atsushi Yabumoto},
  title        = {A Tweak for a {PRF} Mode of a Compression Function and Its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {638},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/638},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HiroseY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HirtMTZ16,
  author       = {Martin Hirt and
                  Ueli Maurer and
                  Daniel Tschudi and
                  Vassilis Zikas},
  title        = {Network-Hiding Communication and Applications to Multi-Party Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {556},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/556},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HirtMTZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoangKOZ16,
  author       = {Viet Tung Hoang and
                  Jonathan Katz and
                  Adam O'Neill and
                  Mohammad Zaheri},
  title        = {Selective-Opening Security in the Presence of Randomness Failures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {868},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/868},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HoangKOZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoangT16,
  author       = {Viet Tung Hoang and
                  Stefano Tessaro},
  title        = {Key-alternating Ciphers and Key-length Extension: Exact Bounds and
                  Multi-user Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {578},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/578},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HoangT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hofheinz16,
  author       = {Dennis Hofheinz},
  title        = {Adaptive partitioning},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {373},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/373},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hofheinz16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HofheinzJR16,
  author       = {Dennis Hofheinz and
                  Tibor Jager and
                  Andy Rupp},
  title        = {Public-Key Encryption with Simulation-Based Selective-Opening Security
                  and Compact Ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {180},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/180},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HofheinzJR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HomsirikamolDFF16,
  author       = {Ekawat Homsirikamol and
                  William Diehl and
                  Ahmed Ferozpuri and
                  Farnoud Farahmand and
                  Panasayya Yalla and
                  Jens{-}Peter Kaps and
                  Kris Gaj},
  title        = {{CAESAR} Hardware {API}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {626},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/626},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HomsirikamolDFF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuZZW16,
  author       = {Yongbo Hu and
                  Chen Zhang and
                  Yeyang Zheng and
                  Mathias Wagner},
  title        = {Ciphertext and Plaintext Leakage Reveals the Entire {TDES} Key},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1143},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1143},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuZZW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangVLN16,
  author       = {Jialin Huang and
                  Serge Vaudenay and
                  Xuejia Lai and
                  Kaisa Nyberg},
  title        = {Capacity and Data Complexity in Multidimensional Linear Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {51},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/051},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangVLN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangWXWZ16,
  author       = {Senyang Huang and
                  Xiaoyun Wang and
                  Guangwu Xu and
                  Meiqin Wang and
                  Jingyuan Zhao},
  title        = {Conditional Cube Attack on Reduced-Round Keccak Sponge Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {790},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/790},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangWXWZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HulsingRSS16,
  author       = {Andreas H{\"{u}}lsing and
                  Joost Rijneveld and
                  Simona Samardjiska and
                  Peter Schwabe},
  title        = {From 5-pass MQ-based identification to MQ-based signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {708},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/708},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HulsingRSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hutchinson16,
  author       = {Daniel Hutchinson},
  title        = {A Robust and Sponge-Like {PRNG} with Improved Efficiency},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {886},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/886},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Hutchinson16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuthBGDG16,
  author       = {Christopher Huth and
                  Daniela Becker and
                  Jorge Guajardo and
                  Paul Duplys and
                  Tim G{\"{u}}neysu},
  title        = {Securing Systems with Scarce Entropy: LWE-Based Lossless Computational
                  Fuzzy Extractor for the IoT},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {982},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/982},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuthBGDG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HutterSSW16,
  author       = {Michael Hutter and
                  J{\"{u}}rgen Schilling and
                  Peter Schwabe and
                  Wolfgang Wieser},
  title        = {NaCl's Crypto{\_}Box in Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {330},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/330},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HutterSSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HutterT16,
  author       = {Michael Hutter and
                  Michael Tunstall},
  title        = {Constant-Time Higher-Order Boolean-to-Arithmetic Masking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1023},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1023},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HutterT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IgierV16,
  author       = {Mathilde Igier and
                  Serge Vaudenay},
  title        = {Distance Bounding based on {PUF}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {901},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/901},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IgierV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IkematsuDPT16,
  author       = {Yasuhiko Ikematsu and
                  Dung Hoang Duong and
                  Albrecht Petzoldt and
                  Tsuyoshi Takagi},
  title        = {Revisiting the Efficient Key Generation of {ZHFE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1065},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1065},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IkematsuDPT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ImamuraMI16,
  author       = {Kazuya Imamura and
                  Kazuhiko Minematsu and
                  Tetsu Iwata},
  title        = {Integrity Analysis of Authenticated Encryption Based on Stream Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1124},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1124},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ImamuraMI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ImpagliazzoJKKK16,
  author       = {Russell Impagliazzo and
                  Ragesh Jaiswal and
                  Valentine Kabanets and
                  Bruce M. Kapron and
                  Valerie King and
                  Stefano Tessaro},
  title        = {Simultaneous Secrecy and Reliability Amplification for a General Channel
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {760},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/760},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ImpagliazzoJKKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/InciGES16,
  author       = {Mehmet Sinan Inci and
                  Berk G{\"{u}}lmezoglu and
                  Thomas Eisenbarth and
                  Berk Sunar},
  title        = {Co-location detection on the Cloud},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {284},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/284},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/InciGES16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/InciGIES16,
  author       = {Mehmet Sinan Inci and
                  Berk G{\"{u}}lmezoglu and
                  Gorka Irazoqui and
                  Thomas Eisenbarth and
                  Berk Sunar},
  title        = {Cache Attacks Enable Bulk Key Recovery on the Cloud},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {596},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/596},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/InciGIES16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IrazoquiES16,
  author       = {Gorka Irazoqui and
                  Thomas Eisenbarth and
                  Berk Sunar},
  title        = {{MASCAT:} Stopping Microarchitectural Attacks Before Execution},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1196},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1196},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IrazoquiES16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshaiKPSY16,
  author       = {Yuval Ishai and
                  Eyal Kushilevitz and
                  Manoj Prabhakaran and
                  Amit Sahai and
                  Ching{-}Hua Yu},
  title        = {Secure Protocol Transformations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {456},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/456},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshaiKPSY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshiiDGIF16,
  author       = {Masahiro Ishii and
                  J{\'{e}}r{\'{e}}mie Detrey and
                  Pierrick Gaudry and
                  Atsuo Inomata and
                  Kazutoshi Fujikawa},
  title        = {Fast Modular Arithmetic on the Kalray {MPPA-256} Processor for an
                  Energy-Efficient Implementation of {ECM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {365},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/365},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshiiDGIF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IwataM16,
  author       = {Tetsu Iwata and
                  Kazuhiko Minematsu},
  title        = {Stronger Security Variants of {GCM-SIV}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {853},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/853},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IwataM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IwataMV16,
  author       = {Tetsu Iwata and
                  Bart Mennink and
                  Damian Viz{\'{a}}r},
  title        = {{CENC} is Optimally Secure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1087},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1087},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IwataMV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JaberiM16,
  author       = {Mehrad Jaberi and
                  Hamid Mala},
  title        = {Protocols for Authenticated Oblivious Transfer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {607},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/607},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JaberiM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JaegerRT16,
  author       = {Joseph Jaeger and
                  Thomas Ristenpart and
                  Qiang Tang},
  title        = {Honey Encryption Beyond Message Recovery Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {174},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/174},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JaegerRT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JafargholiW16,
  author       = {Zahra Jafargholi and
                  Daniel Wichs},
  title        = {Adaptive Security of Yao's Garbled Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {814},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/814},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JafargholiW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JainG16,
  author       = {Shalabh Jain and
                  Jorge Guajardo},
  title        = {Physical Layer Group Key Agreement for Automotive Controller Area
                  Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {601},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/601},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JainG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JakobsenNO16,
  author       = {Thomas P. Jakobsen and
                  Jesper Buus Nielsen and
                  Claudio Orlandi},
  title        = {A Framework for Outsourcing of Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {37},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/037},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JakobsenNO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JanaP16,
  author       = {Amit Jana and
                  Goutam Paul},
  title        = {Revisiting {RC4} Key Collision: Faster Search Algorithm and New 22-byte
                  Colliding Key Pairs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1001},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1001},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JanaP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Jarecki16,
  author       = {Stanislaw Jarecki},
  title        = {Efficient Covert Two-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1032},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1032},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Jarecki16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JareckiKKX16,
  author       = {Stanislaw Jarecki and
                  Aggelos Kiayias and
                  Hugo Krawczyk and
                  Jiayu Xu},
  title        = {Highly-Efficient and Composable Password-Protected Secret Sharing
                  (Or: How to Protect Your Bitcoin Wallet Online)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {144},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/144},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JareckiKKX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JarvinenMAL16,
  author       = {Kimmo J{\"{a}}rvinen and
                  Andrea Miele and
                  Reza Azarderakhsh and
                  Patrick Longa},
  title        = {FourQ on {FPGA:} New Hardware Speed Records for Elliptic Curve Cryptography
                  over Large Prime Characteristic Fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {569},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/569},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JarvinenMAL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JaschkeA16,
  author       = {Angela J{\"{a}}schke and
                  Frederik Armknecht},
  title        = {Accelerating Homomorphic Computations on Rational Numbers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {675},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/675},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JaschkeA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JaveedW16,
  author       = {Khalid Javeed and
                  Xiaojun Wang},
  title        = {Speed and Area Optimized Parallel Higher-Radix Modular Multipliers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {53},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/053},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JaveedW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Jean16,
  author       = {J{\'{e}}r{\'{e}}my Jean},
  title        = {Cryptanalysis of Haraka},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {396},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/396},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Jean16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JeanN16,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Ivica Nikolic},
  title        = {Efficient Design Strategies Based on the {AES} Round Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {299},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/299},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JeanN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JeongK16,
  author       = {Jinhyuck Jeong and
                  Taechan Kim},
  title        = {Extended Tower Number Field Sieve with Application to Finite Fields
                  of Arbitrary Composite Extension Degree},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {526},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/526},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JeongK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JhaN16,
  author       = {Ashwin Jha and
                  Mridul Nandi},
  title        = {Revisiting Structure Graph and Its Applications to {CBC-MAC} and {EMAC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {161},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/161},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JhaN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JiaLL16,
  author       = {Dingding Jia and
                  Xianhui Lu and
                  Bao Li},
  title        = {Constructions Secure against Receiver Selective Opening and Chosen
                  Ciphertext Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1083},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1083},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JiaLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JivanyanKOR16,
  author       = {Aram Jivanyan and
                  Gurgen Khachatryan and
                  Andriy Oliynyk and
                  Mykola Raievskyi},
  title        = {Efficient Oblivious Transfer Protocols based on White-Box Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {734},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/734},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JivanyanKOR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Jones16,
  author       = {John Jones},
  title        = {A Columnar Transposition cipher in a contemporary setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {5},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/005},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Jones16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JoyeP16,
  author       = {Marc Joye and
                  Alain Passel{\`{e}}gue},
  title        = {Practical Trade-Offs for Multi-Input Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {622},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/622},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JoyeP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JuelsKS16,
  author       = {Ari Juels and
                  Ahmed E. Kosba and
                  Elaine Shi},
  title        = {The Ring of Gyges: Investigating the Future of Criminal Smart Contracts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {358},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/358},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JuelsKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JutlaR16,
  author       = {Charanjit S. Jutla and
                  Arnab Roy},
  title        = {Smooth {NIZK} Arguments with Applications to Asymmetric {UC-PAKE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {233},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/233},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JutlaR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KahrobaeiS16,
  author       = {Delaram Kahrobaei and
                  Vladimir Shpilrain},
  title        = {Using semidirect product of (semi)groups in public key cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {378},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/378},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KahrobaeiS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KalaiRR16,
  author       = {Yael Tauman Kalai and
                  Guy N. Rothblum and
                  Ron D. Rothblum},
  title        = {From Obfuscation to the Security of Fiat-Shamir for Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {303},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/303},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KalaiRR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KamaraM16,
  author       = {Seny Kamara and
                  Tarik Moataz},
  title        = {{SQL} on Structurally-Encrypted Databases},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {453},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/453},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KamaraM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KammerstetterMB16,
  author       = {Markus Kammerstetter and
                  Markus Muellner and
                  Daniel Burian and
                  Christian Kudera and
                  Wolfgang Kastner},
  title        = {Efficient High-Speed {WPA2} Brute Force Attacks using Scalable Low-Cost
                  {FPGA} Clustering},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {547},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/547},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KammerstetterMB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kar16,
  author       = {Jayaprakash Kar},
  title        = {Certi cateless Aggregate Short Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {305},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/305},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kar16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KarN16,
  author       = {Jayaprakash Kar and
                  Sagar Naik},
  title        = {Generic Construction of Certificateless Signcryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {318},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/318},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KarN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KaratiS16,
  author       = {Sabyasachi Karati and
                  Palash Sarkar},
  title        = {Kummer for Genus One over Prime Order Fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {938},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/938},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KaratiS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KarmakarRVV16,
  author       = {Angshuman Karmakar and
                  Sujoy Sinha Roy and
                  Frederik Vercauteren and
                  Ingrid Verbauwhede},
  title        = {Efficient Finite field multiplication for isogeny based post quantum
                  cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1046},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1046},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KarmakarRVV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KarvelasPK16,
  author       = {Nikolaos P. Karvelas and
                  Andreas Peter and
                  Stefan Katzenbeisser},
  title        = {Blurry-ORAM: {A} Multi-Client Oblivious Storage Architecture},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1077},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1077},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KarvelasPK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Katsumata016,
  author       = {Shuichi Katsumata and
                  Shota Yamada},
  title        = {Partitioning via Non-Linear Polynomial Functions: More Compact IBEs
                  from Ideal Lattices and Bilinear Maps},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {843},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/843},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Katsumata016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KatzMW16,
  author       = {Jonathan Katz and
                  Alex J. Malozemoff and
                  Xiao Wang},
  title        = {Efficiently Enforcing Input Validity in Secure Two-party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {184},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/184},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KatzMW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KawamuraYKS16,
  author       = {Shin{-}ichi Kawamura and
                  Tomoko Yonemura and
                  Yuichi Komano and
                  Hideo Shimizu},
  title        = {Exact Error Bound of Cox-Rower Architecture for {RNS} Arithmetic},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {266},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/266},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KawamuraYKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KellerOS16,
  author       = {Marcel Keller and
                  Emmanuela Orsini and
                  Peter Scholl},
  title        = {{MASCOT:} Faster Malicious Arithmetic Secure Computation with Oblivious
                  Transfer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {505},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/505},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KellerOS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KempkaKKS16,
  author       = {Carmen Kempka and
                  Ryo Kikuchi and
                  Susumu Kiyoshima and
                  Koutarou Suzuki},
  title        = {Garbling Scheme for Formulas with Constant Size of Garbled Gates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {563},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/563},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KempkaKKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KennedyKW16,
  author       = {W. Sean Kennedy and
                  Vladimir Kolesnikov and
                  Gordon T. Wilfong},
  title        = {Overlaying Circuit Clauses for Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {685},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/685},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KennedyKW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhairallahG16,
  author       = {Mustafa Khairallah and
                  Maged Ghoneima},
  title        = {Tile-Based Modular Architecture for Accelerating Homomorphic Function
                  Evaluation on {FPGA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {725},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/725},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KhairallahG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhatiMV16,
  author       = {Louiza Khati and
                  Nicky Mouha and
                  Damien Vergnaud},
  title        = {Full Disk Encryption: Bridging Theory and Practice},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1114},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1114},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KhatiMV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhedrG16,
  author       = {Alhassan Khedr and
                  P. Glenn Gulak},
  title        = {SecureMed: Secure Medical Computation using GPU-Accelerated Homomorphic
                  Encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {445},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/445},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KhedrG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhooLPS16,
  author       = {Khoongming Khoo and
                  Eugene Lee and
                  Thomas Peyrin and
                  Siang Meng Sim},
  title        = {Human-readable Proof of the Related-Key Security of {AES-128}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {25},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/025},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KhooLPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhuranaMS16,
  author       = {Dakshita Khurana and
                  Hemanta K. Maji and
                  Amit Sahai},
  title        = {Secure Computation from Elastic Noisy Channels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {497},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/497},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KhuranaMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasKRDO16,
  author       = {Aggelos Kiayias and
                  Ioannis Konstantinou and
                  Alexander Russell and
                  Bernardo David and
                  Roman Oliynykov},
  title        = {A Provably Secure Proof-of-Stake Blockchain Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {889},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/889},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasKRDO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiayiasP16,
  author       = {Aggelos Kiayias and
                  Giorgos Panagiotakos},
  title        = {On Trees, Chains and Fast Transactions in the Blockchain},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {545},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/545},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiayiasP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KieferM16,
  author       = {Franziskus Kiefer and
                  Mark Manulis},
  title        = {Blind Password Registration for Verifier-based {PAKE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {442},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/442},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KieferM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KieferM16a,
  author       = {Franziskus Kiefer and
                  Mark Manulis},
  title        = {Universally Composable Two-Server {PAKE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {520},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/520},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KieferM16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiltzMP16,
  author       = {Eike Kiltz and
                  Daniel Masny and
                  Jiaxin Pan},
  title        = {Optimal Security Proofs for Signatures from Identification Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {191},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/191},
  timestamp    = {Tue, 21 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiltzMP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimKKKYS16,
  author       = {Sungwook Kim and
                  Jinsu Kim and
                  Dongyoung Koo and
                  Yuna Kim and
                  Hyunsoo Yoon and
                  Jun{-}Bum Shin},
  title        = {Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {232},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/232},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimKKKYS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimLLRTW16,
  author       = {Myungsun Kim and
                  Hyung Tae Lee and
                  San Ling and
                  Shu Qin Ren and
                  Benjamin Hong Meng Tan and
                  Huaxiong Wang},
  title        = {Better Security for Queries on Encrypted Databases},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {470},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/470},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimLLRTW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimLMMRW16,
  author       = {Sam Kim and
                  Kevin Lewi and
                  Avradip Mandal and
                  Hart William Montgomery and
                  Arnab Roy and
                  David J. Wu},
  title        = {Function-Hiding Inner Product Encryption is Practical},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {440},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/440},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimLMMRW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimSGA16,
  author       = {Jongkil Kim and
                  Willy Susilo and
                  Fuchun Guo and
                  Man Ho Au},
  title        = {A Tag Based Encoding: An Efficient Encoding for Predicate Encoding
                  in Prime Order Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {655},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/655},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimSGA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimSGA16a,
  author       = {Jongkil Kim and
                  Willy Susilo and
                  Fuchun Guo and
                  Man Ho Au},
  title        = {Functional Encryption for Computational Hiding in Prime Order Groups
                  via Pair Encodings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {949},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/949},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimSGA16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kiraz16,
  author       = {Mehmet Sabir Kiraz},
  title        = {Solving the Secure Storage Dilemma: An Efficient Scheme for Secure
                  Deduplication with Privacy-Preserving Public Auditing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {696},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/696},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kiraz16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KirazU16,
  author       = {Mehmet Sabir Kiraz and
                  Osmanbey Uzunkol},
  title        = {Still Wrong Use of Pairings in Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {223},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/223},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KirazU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kirchner16,
  author       = {Paul Kirchner},
  title        = {Algorithms on Ideal over Complex Multiplication order},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {220},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/220},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kirchner16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KirchnerF16,
  author       = {Paul Kirchner and
                  Pierre{-}Alain Fouque},
  title        = {Time-Memory Trade-Off for Lattice Enumeration in a Ball},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {222},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/222},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KirchnerF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KirchnerF16a,
  author       = {Paul Kirchner and
                  Pierre{-}Alain Fouque},
  title        = {Comparison between Subfield and Straightforward Attacks on {NTRU}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {717},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/717},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KirchnerF16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kirshanova0W16,
  author       = {Elena Kirshanova and
                  Alexander May and
                  Friedrich Wiemer},
  title        = {Parallel Implementation of {BDD} enumeration for {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {380},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/380},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kirshanova0W16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kiss016,
  author       = {{\'{A}}gnes Kiss and
                  Thomas Schneider},
  title        = {Valiant's Universal Circuit is Practical},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {93},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/093},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kiss016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KissKRS16,
  author       = {{\'{A}}gnes Kiss and
                  Juliane Kr{\"{a}}mer and
                  Pablo Rauzy and
                  Jean{-}Pierre Seifert},
  title        = {Algorithmic Countermeasures Against Fault Attacks and Power Analysis
                  for {RSA-CRT}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {238},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/238},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KissKRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kitagawa0HT16,
  author       = {Fuyuki Kitagawa and
                  Takahiro Matsuda and
                  Goichiro Hanaoka and
                  Keisuke Tanaka},
  title        = {On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {243},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/243},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kitagawa0HT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kluczniak16,
  author       = {Kamil Kluczniak},
  title        = {Domain-Specific Pseudonymous Signatures Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {70},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/070},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kluczniak16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kohl16,
  author       = {Lisa Kohl},
  title        = {New Tools for Multi-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {417},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/417},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kohl16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KolblLMR16,
  author       = {Stefan K{\"{o}}lbl and
                  Martin M. Lauridsen and
                  Florian Mendel and
                  Christian Rechberger},
  title        = {Haraka - Efficient Short-Input Hashing for Post-Quantum Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {98},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/098},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KolblLMR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KolesnikovKLMR16,
  author       = {Vladimir Kolesnikov and
                  Hugo Krawczyk and
                  Yehuda Lindell and
                  Alex J. Malozemoff and
                  Tal Rabin},
  title        = {Attribute-based Key Exchange with General Policies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {518},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/518},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KolesnikovKLMR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KolesnikovKRT16,
  author       = {Vladimir Kolesnikov and
                  Ranjit Kumaresan and
                  Mike Rosulek and
                  Ni Trieu},
  title        = {Efficient Batched Oblivious {PRF} with Applications to Private Set
                  Intersection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {799},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/799},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KolesnikovKRT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Komargodski16,
  author       = {Ilan Komargodski},
  title        = {Leakage Resilient One-Way Functions: The Auxiliary-Input Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {791},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/791},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Komargodski16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KomargodskiNY16,
  author       = {Ilan Komargodski and
                  Moni Naor and
                  Eylon Yogev},
  title        = {How to Share a Secret, Infinitely},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {194},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/194},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KomargodskiNY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KondoSI16,
  author       = {Kota Kondo and
                  Yu Sasaki and
                  Tetsu Iwata},
  title        = {On the Design Rationale of {SIMON} Block Cipher: Integral Attacks
                  and Impossible Differential Attacks against {SIMON} Variants},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {625},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/625},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KondoSI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoppulaW16,
  author       = {Venkata Koppula and
                  Brent Waters},
  title        = {Circular Security Counterexamples for Arbitrary Length Cycles from
                  {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {117},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/117},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoppulaW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoshibaT16,
  author       = {Takeshi Koshiba and
                  Katsuyuki Takashima},
  title        = {Pairing Cryptography Meets Isogeny: {A} New Framework of Isogenous
                  Pairing Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1138},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1138},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoshibaT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KowalczykMUZ16,
  author       = {Lucas Kowalczyk and
                  Tal Malkin and
                  Jonathan R. Ullman and
                  Mark Zhandry},
  title        = {Strong Hardness of Privacy from Weak Traitor Tracing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {721},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/721},
  timestamp    = {Tue, 27 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KowalczykMUZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KozielAJK16,
  author       = {Brian Koziel and
                  Reza Azarderakhsh and
                  David Jao and
                  Mehran Mozaffari Kermani},
  title        = {On Fast Calculation of Addition Chains for Isogeny-Based Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1045},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1045},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KozielAJK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KozielAK16,
  author       = {Brian Koziel and
                  Reza Azarderakhsh and
                  Mehran Mozaffari Kermani},
  title        = {Fast Hardware Architectures for Supersingular Isogeny Diffie-Hellman
                  Key Exchange on {FPGA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1044},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1044},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KozielAK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KraschewskiKMPS16,
  author       = {Daniel Kraschewski and
                  Dakshita Khurana and
                  Hemanta K. Maji and
                  Manoj Prabhakaran and
                  Amit Sahai},
  title        = {All Complete Functionalities are Reversible},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {496},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/496},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KraschewskiKMPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Krawczyk16,
  author       = {Hugo Krawczyk},
  title        = {A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with
                  Applications to Client Authentication in {TLS} 1.3)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {711},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/711},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Krawczyk16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KrishnaR16,
  author       = {Duggirala Meher Krishna and
                  Duggirala Ravi},
  title        = {Multivariate Cryptography with Mappings of Discrete Logarithms and
                  Polynomials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {821},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/821},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KrishnaR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kudo16,
  author       = {Momonari Kudo},
  title        = {Attacks against search Poly-LWE},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1153},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1153},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kudo16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KukkalaSI16,
  author       = {Varsha Bhat Kukkala and
                  Jaspal Singh Saini and
                  S. R. S. Iyengar},
  title        = {Network Deprived {SNA} : An Alternative To Anonymization},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {427},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/427},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KukkalaSI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KuldeepYS16,
  author       = {Gajraj Kuldeep and
                  Devendra Kumar Yadav and
                  A. K. Sharma},
  title        = {Weaknesses in Hadamard Based Symmetric Key Encryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {75},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/075},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KuldeepYS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KulisLZ16,
  author       = {Michal Kulis and
                  Pawel Lorek and
                  Filip Zag{\'{o}}rski},
  title        = {Randomized stopping times and provably secure pseudorandom permutation
                  generators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1049},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1049},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KulisLZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KulshresthaK16,
  author       = {Preeti Kulshrestha and
                  Arun Kumar},
  title        = {A {NEW} {UNLINKABLE} {SECRET} {HANDSHAKES} {SCHEME} {BASED} {ON} {ZSS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {41},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/041},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KulshresthaK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KumaresanRS16,
  author       = {Ranjit Kumaresan and
                  Srinivasan Raghuraman and
                  Adam Sealfon},
  title        = {Network Oblivious Transfer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {584},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/584},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KumaresanRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KunihiroT16,
  author       = {Noboru Kunihiro and
                  Yuki Takahashi},
  title        = {Improved Key Recovery Algorithms from Noisy {RSA} Secret Keys with
                  Analog Noise},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1095},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1095},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KunihiroT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KustersMST16,
  author       = {Ralf K{\"{u}}sters and
                  Johannes M{\"{u}}ller and
                  Enrico Scapin and
                  Tomasz Truderung},
  title        = {sElect: {A} Lightweight Verifiable Remote Voting System},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {438},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/438},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KustersMST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaVigne16,
  author       = {Rio LaVigne},
  title        = {Simple Homomorphisms of Cocks {IBE} and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1150},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1150},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LaVigne16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Laarhoven16,
  author       = {Thijs Laarhoven},
  title        = {Randomized lattice sieving for the closest vector problem (with preprocessing)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {888},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/888},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Laarhoven16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LabrandeT16,
  author       = {Hugo Labrande and
                  Emmanuel Thom{\'{e}}},
  title        = {Computing theta functions in quasi-linear time in genus 2 and above},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {179},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/179},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LabrandeT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LafitteLMH16,
  author       = {Fr{\'{e}}d{\'{e}}ric Lafitte and
                  Liran Lerman and
                  Olivier Markowitch and
                  Dirk Van Heule},
  title        = {SAT-based cryptanalysis of {ACORN}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {521},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/521},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LafitteLMH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaiTWC16,
  author       = {Russell W. F. Lai and
                  Raymond K. H. Tai and
                  Harry W. H. Wong and
                  Sherman S. M. Chow},
  title        = {A Zoo of Homomorphic Signatures: Multi-Key and Key-Homomorphism},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {834},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/834},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LaiTWC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lambaek16,
  author       = {Mikkel Lamb{\ae}k},
  title        = {Breaking and Fixing Private Set Intersection Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {665},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/665},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lambaek16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LampertWLL16,
  author       = {Ben Lampert and
                  Riad S. Wahby and
                  Shane Leonard and
                  Philip Alexander Levis},
  title        = {Robust, low-cost, auditable random number generation for embedded
                  system security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {884},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/884},
  timestamp    = {Mon, 30 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LampertWLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LancrenonST16,
  author       = {Jean Lancrenon and
                  Marjan Skrobot and
                  Qiang Tang},
  title        = {Two More Efficient Variants of the {J-PAKE} Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {379},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/379},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LancrenonST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaudP16,
  author       = {Peeter Laud and
                  Alisa Pankova},
  title        = {Securing Multiparty Protocols against the Exposure of Data to Honest
                  Parties},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {650},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/650},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LaudP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaudP16a,
  author       = {Peeter Laud and
                  Alisa Pankova},
  title        = {Optimizing Secure Computation Programs with Private Conditionals},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {942},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/942},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LaudP16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lee16,
  author       = {Kwangsu Lee},
  title        = {Revocable Hierarchical Identity-Based Encryption with Adaptive Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {749},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/749},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lee16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeKHSH16,
  author       = {Hochang Lee and
                  HyungChul Kang and
                  Deukjo Hong and
                  Jaechul Sung and
                  Seokhie Hong},
  title        = {New Impossible Differential Characteristic of {SPECK64} using {MILP}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1137},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1137},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeKHSH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeL16,
  author       = {Kwangsu Lee and
                  Dong Hoon Lee},
  title        = {Two-Input Functional Encryption for Inner Products from Bilinear Maps},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {432},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/432},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeLSWY16,
  author       = {Hyung Tae Lee and
                  San Ling and
                  Jae Hong Seo and
                  Huaxiong Wang and
                  Taek{-}Young Youn},
  title        = {Public Key Encryption with Equality Test in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1182},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1182},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeLSWY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeLW16,
  author       = {Hyung Tae Lee and
                  San Ling and
                  Huaxiong Wang},
  title        = {Analysis of Gong et al.'s CCA2-Secure Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {19},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/019},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeP16,
  author       = {Kwangsu Lee and
                  Seunghwan Park},
  title        = {Revocable Hierarchical Identity-Based Encryption with Shorter Private
                  Keys and Update Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {460},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/460},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeS16,
  author       = {Peter Hyun{-}Jeen Lee and
                  Siamak Fayyaz Shahandashti},
  title        = {Theoretical Attacks on {E2E} Voting Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {447},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/447},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LermanMV16,
  author       = {Liran Lerman and
                  Olivier Markowitch and
                  Nikita Veshchikov},
  title        = {Comparing Sboxes of Ciphers from the Perspective of Side-Channel Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {993},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/993},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LermanMV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LewiMACFWABK016,
  author       = {Kevin Lewi and
                  Alex J. Malozemoff and
                  Daniel Apon and
                  Brent Carmer and
                  Adam Foltzer and
                  Daniel Wagner and
                  David W. Archer and
                  Dan Boneh and
                  Jonathan Katz and
                  Mariana Raykova},
  title        = {5Gen: {A} Framework for Prototyping Applications Using Multilinear
                  Maps and Matrix Branching Programs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {619},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/619},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LewiMACFWABK016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LewiW16,
  author       = {Kevin Lewi and
                  David J. Wu},
  title        = {Order-Revealing Encryption: New Constructions, Applications, and Lower
                  Bounds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {612},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/612},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LewiW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Li16,
  author       = {Jianwei Li},
  title        = {On the smallest ratio problem of lattice bases},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {847},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/847},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Li16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiGM16,
  author       = {Zengpeng Li and
                  Steven D. Galbraith and
                  Chunguang Ma},
  title        = {Preventing Adaptive Key Recovery Attacks on the Gentry-Sahai-Waters
                  Leveled Homomorphic Encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1146},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1146},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiGM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiL16,
  author       = {Ming Li and
                  Dongdai Lin},
  title        = {The Adjacency Graphs of Linear Feedback Shift Registers with Primitive-like
                  Characteristic Polynomials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {269},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/269},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiL16a,
  author       = {Ming Li and
                  Dongdai Lin},
  title        = {Adjacency Graphs, Irreducible Polynomials and Cyclotomy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {393},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/393},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiL16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiLLW16,
  author       = {Xiaoyi Li and
                  Kaitai Liang and
                  Zhen Liu and
                  Duncan S. Wong},
  title        = {Attribute Based Encryption: Traitor Tracing, Revocation and Fully
                  Security on Prime Order Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1140},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1140},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiLLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiM16,
  author       = {Baiyu Li and
                  Daniele Micciancio},
  title        = {Compactness vs Collusion Resistance in Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {561},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/561},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiM16a,
  author       = {Baiyu Li and
                  Daniele Micciancio},
  title        = {Equational Security Proofs of Oblivious Transfer Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {624},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/624},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiM16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiMZQ16,
  author       = {Yin Li and
                  Xingpo Ma and
                  Yu Zhang and
                  Chuanda Qi},
  title        = {Mastrovito form of Karatsuba Multiplier for All Trinomials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {694},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/694},
  timestamp    = {Thu, 15 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiMZQ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiW16,
  author       = {Yongqiang Li and
                  Mingsheng Wang},
  title        = {On the Construction of Lightweight Circulant Involutory {MDS} Matrices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {406},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/406},
  timestamp    = {Mon, 31 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiYZ16,
  author       = {Jiguo Li and
                  Hong Yuan and
                  Yichen Zhang},
  title        = {Cryptanalysis and improvement of certificateless aggregate signature
                  with conditional privacy-preserving for vehicular sensor networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {692},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/692},
  timestamp    = {Thu, 09 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiYZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertLMNW16,
  author       = {Beno{\^{\i}}t Libert and
                  San Ling and
                  Fabrice Mouhartem and
                  Khoa Nguyen and
                  Huaxiong Wang},
  title        = {Signature Schemes with Efficient Protocols and Dynamic Group Signatures
                  from Lattice Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {101},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/101},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertLMNW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertLMNW16a,
  author       = {Beno{\^{\i}}t Libert and
                  San Ling and
                  Fabrice Mouhartem and
                  Khoa Nguyen and
                  Huaxiong Wang},
  title        = {Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based
                  Group Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {879},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/879},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertLMNW16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertRY16,
  author       = {Beno{\^{\i}}t Libert and
                  Somindu C. Ramanna and
                  Moti Yung},
  title        = {Functional Commitment Schemes: From Polynomial Commitments to Pairing-Based
                  Accumulators from Simple Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {766},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/766},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertRY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lin16,
  author       = {Huijia Lin},
  title        = {Indistinguishability Obfuscation from Constant-Degree Graded Encoding
                  Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {257},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/257},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lin16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lin16a,
  author       = {Huijia Lin},
  title        = {Indistinguishability Obfuscation from {DDH} on 5-linear Maps and Locality-5
                  PRGs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1096},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1096},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lin16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinPST16,
  author       = {Huijia Lin and
                  Rafael Pass and
                  Karn Seth and
                  Sidharth Telang},
  title        = {Indistinguishability Obfuscation with Non-trivial Efficiency},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {6},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/006},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinPST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinQZ16,
  author       = {Xi Jun Lin and
                  Haipeng Qu and
                  Xiaoshuai Zhang},
  title        = {New Efficient and Flexible Algorithms for Secure Outsourcing of Bilinear
                  Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {76},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/076},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinQZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinQZ16a,
  author       = {Xi Jun Lin and
                  Haipeng Qu and
                  Xiaoshuai Zhang},
  title        = {Public Key Encryption Supporting Equality Test and Flexible Authorization
                  without Bilinear Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {277},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/277},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinQZ16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinSQZ16,
  author       = {Xi Jun Lin and
                  Lin Sun and
                  Haipeng Qu and
                  Xiaoshuai Zhang},
  title        = {New Approaches for Secure Outsourcing Algorithm for Modular Exponentiations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {45},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/045},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinSQZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinV16,
  author       = {Huijia Lin and
                  Vinod Vaikuntanathan},
  title        = {Indistinguishability Obfuscation from DDH-like Assumptions on Constant-Degree
                  Graded Encodings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {795},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/795},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinW16,
  author       = {Li Lin and
                  Wenling Wu},
  title        = {Improved Meet-in-the-Middle Attacks on Reduced-Round Kalyna-128/256
                  and Kalyna-256/512},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {722},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/722},
  timestamp    = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LinW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinWZ16,
  author       = {Li Lin and
                  Wenling Wu and
                  Yafei Zheng},
  title        = {Automatic Search for Key-Bridging Technique: Applications to LBlock
                  and {TWINE} (Full Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {414},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/414},
  timestamp    = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LinWZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lindell16,
  author       = {Yehuda Lindell},
  title        = {How To Simulate It - {A} Tutorial on the Simulation Proof Technique},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {46},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/046},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lindell16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LindellSS16,
  author       = {Yehuda Lindell and
                  Nigel P. Smart and
                  Eduardo Soria{-}Vazquez},
  title        = {More Efficient Constant-Round Multi-Party Computation from {BMR} and
                  {SHE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {156},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/156},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LindellSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Linder16,
  author       = {Peter Linder},
  title        = {DEcryption Contract ENforcement Tool {(DECENT):} {A} Practical Alternative
                  to Government Decryption Backdoors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {245},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/245},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Linder16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LipmaaMS16,
  author       = {Helger Lipmaa and
                  Payman Mohassel and
                  Seyed Saeed Sadeghian},
  title        = {Valiant's Universal Circuit: Improvements, Implementation, and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {17},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/017},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LipmaaMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ListN16,
  author       = {Eik List and
                  Mridul Nandi},
  title        = {Revisiting Full-PRF-Secure {PMAC} and Using It for Beyond-Birthday
                  Authenticated Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1174},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1174},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ListN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Liu16,
  author       = {Tianren Liu},
  title        = {On Basing Search {SIVP} on NP-Hardness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {906},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/906},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Liu16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuCM16,
  author       = {Jian Liu and
                  Lusheng Chen and
                  Sihem Mesnager},
  title        = {Partially homomorphic encryption schemes over finite fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {430},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/430},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuCM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuGL16,
  author       = {Guozhen Liu and
                  Mohona Ghosh and
                  Song Ling},
  title        = {Security Analysis of {SKINNY} under Related-Tweakey Settings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1108},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1108},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuGL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuLWQNF16,
  author       = {Weiran Liu and
                  Jianwei Liu and
                  Qianhong Wu and
                  Bo Qin and
                  David Naccache and
                  Houda Ferradi},
  title        = {Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption
                  for Fuzzy-entity Data Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {634},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/634},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuLWQNF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuS16,
  author       = {Meicheng Liu and
                  Siang Meng Sim},
  title        = {Lightweight {MDS} Generalized Circulant Matrices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {186},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/186},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuW16,
  author       = {Bin Liu and
                  Bogdan Warinschi},
  title        = {Universally Composable Cryptographic Role-Based Access Control},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {902},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/902},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LohrkeTBS16,
  author       = {Heiko Lohrke and
                  Shahin Tajik and
                  Christian Boit and
                  Jean{-}Pierre Seifert},
  title        = {No Place to Hide: Contactless Probing of Secret Data on FPGAs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {593},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/593},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LohrkeTBS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Longa16,
  author       = {Patrick Longa},
  title        = {FourQNEON: Faster Elliptic Curve Scalar Multiplications on {ARM} Processors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {645},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/645},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Longa16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LongaN16,
  author       = {Patrick Longa and
                  Michael Naehrig},
  title        = {Speeding up the Number Theoretic Transform for Faster Ideal Lattice-Based
                  Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {504},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/504},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LongaN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Longo0MOSS16,
  author       = {Jake Longo and
                  Daniel P. Martin and
                  Luke Mather and
                  Elisabeth Oswald and
                  Benjamin Sach and
                  Martijn Stam},
  title        = {How low can you go? Using side-channel data to enhance brute-force
                  key recovery},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {609},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/609},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Longo0MOSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LongoMS16,
  author       = {Riccardo Longo and
                  Chiara Marcolla and
                  Massimiliano Sala},
  title        = {Collaborative Multi-Authority {KP-ABE} for Shorter Keys and Parameters},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {262},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/262},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LongoMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuD16,
  author       = {Yi Lu and
                  Yvo Desmedt},
  title        = {Walsh-Hadamard Transform and Cryptographic Applications in Bias Computing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {419},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/419},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuKS16,
  author       = {Wenjie Lu and
                  Shohei Kawasaki and
                  Jun Sakuma},
  title        = {Using Fully Homomorphic Encryption for Statistical Analysis of Categorical,
                  Ordinal and Numerical Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1163},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1163},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lund016,
  author       = {Anders Smedstuen Lund and
                  Martin Strand},
  title        = {Decryption phase in Norwegian electronic voting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1002},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1002},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lund016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuoF16,
  author       = {Pei Luo and
                  Yunsi Fei},
  title        = {Faulty Clock Detection for Crypto Circuits Against Differential Fault
                  Analysis Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {967},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/967},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuoF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuoFZD16,
  author       = {Pei Luo and
                  Yunsi Fei and
                  Liwei Zhang and
                  A. Adam Ding},
  title        = {Differential Fault Analysis of {SHA3-224} and {SHA3-256}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {709},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/709},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuoFZD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuoLF16,
  author       = {Pei Luo and
                  Chao Luo and
                  Yunsi Fei},
  title        = {System Clock and Power Supply Cross-Checking for Glitch Detection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {968},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/968},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuoLF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuoZFD16,
  author       = {Pei Luo and
                  Liwei Zhang and
                  Yunsi Fei and
                  A. Adam Ding},
  title        = {An Improvement of Both Security and Reliability for Keccak Implementations
                  on Smart Card},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {214},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/214},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuoZFD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuuCOSH16,
  author       = {Loi Luu and
                  Duc{-}Hiep Chu and
                  Hrishi Olickel and
                  Prateek Saxena and
                  Aquinas Hobor},
  title        = {Making Smart Contracts Smarter},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {633},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/633},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuuCOSH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuykxMN16,
  author       = {Atul Luykx and
                  Bart Mennink and
                  Samuel Neves},
  title        = {Security Analysis of BLAKE2's Modes of Operation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {827},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/827},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuykxMN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuykxPSY16,
  author       = {Atul Luykx and
                  Bart Preneel and
                  Alan Szepieniec and
                  Kan Yasuda},
  title        = {On the Influence of Message Length in PMAC's Security Bounds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {185},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/185},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuykxPSY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuykxPTY16,
  author       = {Atul Luykx and
                  Bart Preneel and
                  Elmar Tischhauser and
                  Kan Yasuda},
  title        = {A {MAC} Mode for Lightweight Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {190},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/190},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuykxPTY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lyubashevsky16,
  author       = {Vadim Lyubashevsky},
  title        = {Digital Signatures Based on the Hardness of Ideal Lattice Problems
                  in all Rings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {796},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/796},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lyubashevsky16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ma0ZQ16,
  author       = {Qiumao Ma and
                  Jinsheng Zhang and
                  Wensheng Zhang and
                  Daji Qiao},
  title        = {{SE-ORAM:} {A} Storage-Efficient Oblivious {RAM} for Privacy-Preserving
                  Access to Cloud Storage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {256},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/256},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ma0ZQ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaLJ16,
  author       = {Yuan Ma and
                  Jingqiang Lin and
                  Jiwu Jing},
  title        = {On the Entropy of Oscillator-Based True Random Number Generators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1091},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1091},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaLJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaghrebiPP16,
  author       = {Houssem Maghrebi and
                  Thibault Portigliatti and
                  Emmanuel Prouff},
  title        = {Breaking Cryptographic Implementations Using Deep Learning Techniques},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {921},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/921},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaghrebiPP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaghrebiSB16,
  author       = {Houssem Maghrebi and
                  Victor Servant and
                  Julien Bringer},
  title        = {There is Wisdom in Harnessing the Strengths of your Enemy: Customized
                  Encoding to Thwart Side-Channel Attacks - Extended Version -},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {183},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/183},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaghrebiSB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MahmoodyMNPS16,
  author       = {Mohammad Mahmoody and
                  Ameer Mohammed and
                  Soheil Nematihaji and
                  Rafael Pass and
                  Abhi Shelat},
  title        = {A Note on Black-Box Complexity of Indistinguishability Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {316},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/316},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MahmoodyMNPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MahmudluBBB16,
  author       = {Rauf Mahmudlu and
                  Valentina Banciu and
                  Lejla Batina and
                  Ileana Buhan},
  title        = {LDA-Based Clustering as a Side-Channel Distinguisher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1024},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1024},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MahmudluBBB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MalavoltaMKM16,
  author       = {Giulio Malavolta and
                  Pedro Moreno{-}Sanchez and
                  Aniket Kate and
                  Matteo Maffei},
  title        = {SilentWhispers: Enforcing Security and Privacy in Decentralized Credit
                  Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1054},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1054},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MalavoltaMKM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MalekiRD16,
  author       = {Hoda Maleki and
                  Reza Rahaeimehr and
                  Marten van Dijk},
  title        = {LightSource: Ultra Lightweight Clone Detection of {RFID} Tags from
                  Software Unclonable Responses},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {608},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/608},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MalekiRD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MalhotraG16,
  author       = {Aanchal Malhotra and
                  Sharon Goldberg},
  title        = {Attacking NTP's Authenticated Broadcast Mode},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {55},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/055},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MalhotraG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MalhotraGVKGG16,
  author       = {Aanchal Malhotra and
                  Matthew Van Gundy and
                  Mayank Varia and
                  Haydn Kennedy and
                  Jonathan Gardner and
                  Sharon Goldberg},
  title        = {The Security of NTP's Datagram Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1006},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1006},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MalhotraGVKGG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MandalAP16,
  author       = {Kalikinkar Mandal and
                  Basel Alomair and
                  Radha Poovendran},
  title        = {Secure Error-Tolerant Graph Matching Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {908},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/908},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MandalAP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MarcedonePS16,
  author       = {Antonio Marcedone and
                  Rafael Pass and
                  Abhi Shelat},
  title        = {Bounded {KDM} Security from iO and {OWF}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {688},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/688},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MarcedonePS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MarianoLB16,
  author       = {Artur Mariano and
                  Thijs Laarhoven and
                  Christian H. Bischof},
  title        = {A Parallel Variant of LDSieve for the {SVP} on Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {890},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/890},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MarianoLB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MarinASP16,
  author       = {Eduard Marin and
                  Enrique Argones{-}R{\'{u}}a and
                  Dave Singel{\'{e}}e and
                  Bart Preneel},
  title        = {A survey on physiological-signal-based security for medical devices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {867},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/867},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MarinASP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MassolinoBCM16,
  author       = {Pedro Maat C. Massolino and
                  Lejla Batina and
                  Ricardo Chaves and
                  Nele Mentens},
  title        = {Low Power Montgomery Modular Multiplication on Reconfigurable Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {280},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/280},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MassolinoBCM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MassolinoRB16,
  author       = {Pedro Maat C. Massolino and
                  Joost Renes and
                  Lejla Batina},
  title        = {Implementing Complete Formulas on Weierstrass Curves in Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1133},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1133},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MassolinoRB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MatsumotoR16,
  author       = {Stephanos Matsumoto and
                  Raphael M. Reischuk},
  title        = {{IKP:} Turning a {PKI} Around with Blockchains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1018},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1018},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MatsumotoR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaurerR16,
  author       = {Ueli Maurer and
                  Renato Renner},
  title        = {From Indifferentiability to Constructive Cryptography (and Back)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {903},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/903},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaurerR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Mayer16,
  author       = {Christoph M. Mayer},
  title        = {Implementing a Toolkit for Ring-LWE Based Cryptography in Arbitrary
                  Cyclotomic Number Fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {49},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/049},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Mayer16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/McCannWO16,
  author       = {David McCann and
                  Carolyn Whitnall and
                  Elisabeth Oswald},
  title        = {{ELMO:} Emulating Leaks for the {ARM} Cortex-M0 without Access to
                  a Side Channel Lab},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {517},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/517},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/McCannWO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/McCorryMSH16,
  author       = {Patrick McCorry and
                  Malte M{\"{o}}ser and
                  Siamak Fayyaz Shahandashti and
                  Feng Hao},
  title        = {Towards Bitcoin Payment Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {408},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/408},
  timestamp    = {Tue, 10 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/McCorryMSH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/McCorrySH16,
  author       = {Patrick McCorry and
                  Siamak Fayyaz Shahandashti and
                  Feng Hao},
  title        = {Refund attacks on Bitcoin's Payment Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {24},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/024},
  timestamp    = {Tue, 10 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/McCorrySH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/McGrewKFGBB16,
  author       = {David A. McGrew and
                  Panos Kampanakis and
                  Scott R. Fluhrer and
                  Stefan{-}Lukas Gazdag and
                  Denis Butin and
                  Johannes Buchmann},
  title        = {State Management for Hash Based Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {357},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/357},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/McGrewKFGBB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MeauxJSC16,
  author       = {Pierrick M{\'{e}}aux and
                  Anthony Journault and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Claude Carlet},
  title        = {Towards Stream Ciphers for Efficient {FHE} with Low-Noise Ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {254},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/254},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MeauxJSC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MechlerMN16,
  author       = {Jeremias Mechler and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Tobias Nilges},
  title        = {Universally Composable (Non-Interactive) Two-Party Computation from
                  Untrusted Reusable Hardware Tokens},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {615},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/615},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MechlerMN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MelchorBDGZ16,
  author       = {Carlos Aguilar Melchor and
                  Olivier Blazy and
                  Jean{-}Christophe Deneuville and
                  Philippe Gaborit and
                  Gilles Z{\'{e}}mor},
  title        = {Efficient Encryption from Random Quasi-Cyclic Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1194},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1194},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MelchorBDGZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MenezesSS16,
  author       = {Alfred Menezes and
                  Palash Sarkar and
                  Shashank Singh},
  title        = {Challenges with Assessing the Impact of {NFS} Advances on the Security
                  of Pairing-based Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1102},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1102},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MenezesSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Miao16,
  author       = {Peihan Miao},
  title        = {Cut-and-Choose for Garbled {RAM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {907},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/907},
  timestamp    = {Wed, 02 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Miao16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MiersM16,
  author       = {Ian Miers and
                  Payman Mohassel},
  title        = {{IO-DSSE:} Scaling Dynamic Searchable Encryption to Millions of Indexes
                  By Improving Locality},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {830},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/830},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MiersM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MilesSZ16,
  author       = {Eric Miles and
                  Amit Sahai and
                  Mark Zhandry},
  title        = {Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability
                  Obfuscation over {GGH13}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {147},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/147},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MilesSZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MilesSZ16a,
  author       = {Eric Miles and
                  Amit Sahai and
                  Mark Zhandry},
  title        = {Secure obfuscation in a weak multilinear map model: {A} simple construction
                  secure against all known attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {588},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/588},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MilesSZ16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MilesV16,
  author       = {Eric Miles and
                  Emanuele Viola},
  title        = {On the complexity of constructing pseudorandom functions (especially
                  when they don't exist)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {343},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/343},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MilesV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MillerSSV16,
  author       = {Douglas Miller and
                  Adam Scrivener and
                  Jesse Stern and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {On Negation Complexity of Injections, Surjections and Collision-Resistance
                  in Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {192},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/192},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MillerSSV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MillerXCSS16,
  author       = {Andrew Miller and
                  Yu Xia and
                  Kyle Croman and
                  Elaine Shi and
                  Dawn Song},
  title        = {The Honey Badger of {BFT} Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {199},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/199},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MillerXCSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MiracleY16,
  author       = {Sarah Miracle and
                  Scott Yilek},
  title        = {Reverse Cycle Walking and Its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {865},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/865},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MiracleY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MittelbachV16,
  author       = {Arno Mittelbach and
                  Daniele Venturi},
  title        = {Fiat-Shamir for Highly Sound Protocols is Instantiable},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {313},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/313},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MittelbachV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MohamedP16,
  author       = {Mohamed Saied Emam Mohamed and
                  Albrecht Petzoldt},
  title        = {The Shortest Signatures Ever},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {911},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/911},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MohamedP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MohamedWZ16,
  author       = {Mojahed Mohamed and
                  Xiaofen Wang and
                  Xiaosong Zhang},
  title        = {Tightly-Secure Authenticated Key Exchange without NAXOS' approach
                  based on Decision Linear Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {388},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/388},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MohamedWZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MolleviMP16,
  author       = {Oriol Farr{\`{a}}s and
                  Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and
                  Carles Padr{\'{o}}},
  title        = {A Note on Non-Perfect Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {348},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/348},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MolleviMP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoosMR16,
  author       = {Thorben Moos and
                  Amir Moradi and
                  Bastian Richter},
  title        = {Static Power Side-Channel Analysis of a Threshold Implementation Prototype
                  Chip},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1135},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1135},
  timestamp    = {Mon, 10 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoosMR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoradiS16,
  author       = {Amir Moradi and
                  Tobias Schneider},
  title        = {Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption
                  of 5, 6, and 7 Series},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {249},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/249},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoradiS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoradiS16a,
  author       = {Amir Moradi and
                  Tobias Schneider},
  title        = {Side-Channel Analysis Protection and Low-Latency in Action - case
                  study of {PRINCE} and Midori},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {481},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/481},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoradiS16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoranO16,
  author       = {Tal Moran and
                  Ilan Orlov},
  title        = {Proofs of Space-Time and Rational Proofs of Storage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {35},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/035},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoranO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MorchonRTTLG0S16,
  author       = {Oscar Garc{\'{\i}}a Morchon and
                  Ronald Rietman and
                  Ludo Tolhuizen and
                  Jose Luis Torre{-}Arce and
                  Moon Sung Lee and
                  Domingo G{\'{o}}mez{-}P{\'{e}}rez and
                  Jaime Gutierrez and
                  Berry Schoenmakers},
  title        = {Attacks and parameter choices in {HIMMO}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {152},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/152},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MorchonRTTLG0S16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MortazaviSD16,
  author       = {Amir S. Mortazavi and
                  Mahmoud Salmasizadeh and
                  Amir Daneshgar},
  title        = {Strong Continuous Non-malleable Encoding Schemes with Tamper-Detection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {43},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/043},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MortazaviSD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MortazaviSD16a,
  author       = {Amir S. Mortazavi and
                  Mahmoud Salmasizadeh and
                  Amir Daneshgar},
  title        = {{FMNV} Continuous Non-malleable Encoding Scheme is More Efficient
                  Than Believed},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {604},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/604},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MortazaviSD16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MrabetMLRBMM16,
  author       = {Amine Mrabet and
                  Nadia El Mrabet and
                  Ronan Lashermes and
                  Jean{-}Baptiste Rigaud and
                  Belgacem Bouallegue and
                  Sihem Mesnager and
                  Mohsen Machhout},
  title        = {A Systolic Hardware Architectures of Montgomery Modular Multiplication
                  for Public Key Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {487},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/487},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MrabetMLRBMM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Munilla16,
  author       = {Jorge Munilla},
  title        = {{KP+} : Fixing Availability Issues on {KP} Ownership Transfer Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1008},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1008},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Munilla16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nadeem16,
  author       = {Muhammad Nadeem},
  title        = {Standard quantum bit commitment - an indefinite commitment time},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {39},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/039},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nadeem16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nadeem16a,
  author       = {Muhammad Nadeem},
  title        = {Secure positioning and quantum non-local correlations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {59},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/059},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nadeem16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nagao16,
  author       = {Koh{-}ichi Nagao},
  title        = {Bit Coincidence Mining Algorithm {II}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {924},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/924},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nagao16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaitoY16,
  author       = {Yusuke Naito and
                  Kan Yasuda},
  title        = {New Bounds for Keyed Sponges with Extendable Output: Independence
                  between Capacity and Message Length},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {292},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/292},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaitoY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NascimentoCOS16,
  author       = {Erick Nascimento and
                  Lukasz Chmielewski and
                  David F. Oswald and
                  Peter Schwabe},
  title        = {Attacking embedded {ECC} implementations through cmov side channels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {923},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/923},
  timestamp    = {Thu, 07 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/NascimentoCOS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NayakK16,
  author       = {Kartik Nayak and
                  Jonathan Katz},
  title        = {An Oblivious Parallel {RAM} with O(log\({}^{\mbox{2}}\) {N)} Parallel
                  Runtime Blowup},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1141},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1141},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NayakK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NayakRAP16,
  author       = {Kartik Nayak and
                  Ling Ren and
                  Ittai Abraham and
                  Benny Pinkas},
  title        = {An Oblivious {RAM} with Sub-logarithmic Bandwidth Blowup},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {849},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/849},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NayakRAP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NemanaV16,
  author       = {Lalitha Kiran Nemana and
                  V. Ch. Venkaiah},
  title        = {An Empirical Study towards Refining the {AKS} Primality Testing Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {362},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/362},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NemanaV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Neumaier16,
  author       = {Arnold Neumaier},
  title        = {Bounding basis reduction properties},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {4},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/004},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Neumaier16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NeumaierS16,
  author       = {Arnold Neumaier and
                  Damien Stehl{\'{e}}},
  title        = {Faster LLL-type Reduction of Lattice Bases},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {852},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/852},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NeumaierS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NguyenS16,
  author       = {Phuong Ha Nguyen and
                  Durga Prasad Sahoo},
  title        = {An Efficient and Scalable Modeling Attack on Lightweight Secure Physically
                  Unclonable Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {428},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/428},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NguyenS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NguyenWZ16,
  author       = {Khoa Nguyen and
                  Huaxiong Wang and
                  Juanyang Zhang},
  title        = {Server-Aided Revocable Identity-Based Encryption from Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {974},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/974},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/NguyenWZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NielsenO16,
  author       = {Jesper Buus Nielsen and
                  Claudio Orlandi},
  title        = {Cross{\&}Clean: Amortized Garbled Circuits with Constant Overhead},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {495},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/495},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NielsenO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NielsenR16,
  author       = {Jesper Buus Nielsen and
                  Samuel Ranellucci},
  title        = {On the Computational Overhead of {MPC} with Dishonest Majority},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {643},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/643},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NielsenR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NielsenST16,
  author       = {Jesper Buus Nielsen and
                  Thomas Schneider and
                  Roberto Trifiletti},
  title        = {Constant Round Maliciously Secure 2PC with Function-independent Preprocessing
                  using {LEGO}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1069},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1069},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NielsenST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NikolicS16,
  author       = {Ivica Nikolic and
                  Yu Sasaki},
  title        = {Refinements of the k-tree Algorithm for the Generalized Birthday Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {312},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/312},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NikolicS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NikolicS16a,
  author       = {Ivica Nikolic and
                  Yu Sasaki},
  title        = {A New Algorithm for the Unbalanced Meet-in-the-Middle Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {851},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/851},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NikolicS16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nilges16,
  author       = {Tobias Nilges},
  title        = {Efficient Resettably Secure Two-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1009},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1009},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nilges16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NitajST16,
  author       = {Abderrahmane Nitaj and
                  Willy Susilo and
                  Joseph Tonien},
  title        = {Dirichlet Product for Boolean Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {673},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/673},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NitajST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NunezAL16,
  author       = {David Nu{\~{n}}ez and
                  Isaac Agudo and
                  Javier L{\'{o}}pez},
  title        = {A Parametric Family of Attack Models for Proxy Re-Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {293},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/293},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NunezAL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NunezAL16a,
  author       = {David Nu{\~{n}}ez and
                  Isaac Agudo and
                  Javier L{\'{o}}pez},
  title        = {Attacks to a proxy-mediated key agreement protocol based on symmetric
                  encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1081},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1081},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NunezAL16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OFlynn16,
  author       = {Colin O'Flynn},
  title        = {Fault Injection using Crowbars on Embedded Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {810},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/810},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OFlynn16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OderSPG16,
  author       = {Tobias Oder and
                  Tobias Schneider and
                  Thomas P{\"{o}}ppelmann and
                  Tim G{\"{u}}neysu},
  title        = {Practical CCA2-Secure and Masked Ring-LWE Implementation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1109},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1109},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OderSPG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OgataK16,
  author       = {Wakaha Ogata and
                  Kaoru Kurosawa},
  title        = {Efficient No-dictionary Verifiable {SSE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {981},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/981},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OgataK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OharaEHIOS16,
  author       = {Kazuma Ohara and
                  Keita Emura and
                  Goichiro Hanaoka and
                  Ai Ishida and
                  Kazuo Ohta and
                  Yusuke Sakai},
  title        = {Shortening the Libert-Peters-Yung Revocable Group Signature Scheme
                  by Using the Random Oracle Methodology},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {477},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/477},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OharaEHIOS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ohata0M16,
  author       = {Satsuya Ohata and
                  Takahiro Matsuda and
                  Kanta Matsuura},
  title        = {Provably Secure Password Reset Protocol: Model, Definition, and Generic
                  Construction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {345},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/345},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ohata0M16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OliveiraLR16,
  author       = {Thomaz Oliveira and
                  Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {Software implementation of Koblitz curves over quadratic fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {603},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/603},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OliveiraLR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OrruOS16,
  author       = {Michele Orr{\`{u}} and
                  Emmanuela Orsini and
                  Peter Scholl},
  title        = {Actively Secure 1-out-of-N {OT} Extension with Application to Private
                  Set Intersection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {933},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/933},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OrruOS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OsadchyHGDe16,
  author       = {Margarita Osadchy and
                  Julio C. Hernandez{-}Castro and
                  Stuart J. Gibson and
                  Orr Dunkelman and
                  Daniel P{\'{e}}rez{-}Cabo},
  title        = {No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial
                  Examples with Applications to {CAPTCHA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {336},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/336},
  timestamp    = {Fri, 08 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OsadchyHGDe16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PakniatN16,
  author       = {Nasrollah Pakniat and
                  Mahnaz Noroozi},
  title        = {Cryptanalysis of a certificateless aggregate signature scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1147},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1147},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PakniatN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PanBLL16,
  author       = {Wenlun Pan and
                  Zhenzhen Bao and
                  Dongdai Lin and
                  Feng Liu},
  title        = {An Algorithm for Counting the Number of 2\({}^{\mbox{n}}\)-Periodic
                  Binary Sequences with Fixed k-Error Linear Complexity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1025},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1025},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PanBLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PanaitPSVS16,
  author       = {Ioana{-}Cristina Panait and
                  Cristian Pop and
                  Alexandru Sirbu and
                  Adelina Vidovici and
                  Emil Simion},
  title        = {{TOR} - Didactic pluggable transport},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {506},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/506},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PanaitPSVS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PandeyMD16,
  author       = {Shashi Kant Pandey and
                  Prasanna Raghaw Mishra and
                  B. K. Dass},
  title        = {A Maiorana-McFarland Construction of a {GBF} on Galois ring},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {97},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/097},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PandeyMD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Papapagiannopoulos16,
  author       = {Kostas Papapagiannopoulos},
  title        = {High throughput in slices: the case of PRESENT, {PRINCE} and {KATAN64}
                  ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {945},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/945},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Papapagiannopoulos16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ParkLL16,
  author       = {Jong Hwan Park and
                  Kwangsu Lee and
                  Dong Hoon Lee},
  title        = {Efficient Identity-Based Encryption and Public-Key Signature from
                  Trapdoor Subgroups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {500},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/500},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ParkLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ParkR16,
  author       = {Sunoo Park and
                  Ronald L. Rivest},
  title        = {Towards Secure Quadratic Voting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {400},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/400},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ParkR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Parsovs16,
  author       = {Arnis Parsovs},
  title        = {Homomorphic Tallying for the Estonian Internet Voting System},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {776},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/776},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Parsovs16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PasalicMHG16,
  author       = {Enes Pasalic and
                  Amela Muratovic{-}Ribic and
                  Samir Hodzic and
                  Sugata Gangopadhyay},
  title        = {On derivatives of polynomials over finite fields through integration},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {22},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/022},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PasalicMHG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Paskin-Cherniavsky16,
  author       = {Anat Paskin{-}Cherniavsky},
  title        = {How to infinitely share a secret more efficiently},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1088},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1088},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Paskin-Cherniavsky16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PassS16,
  author       = {Rafael Pass and
                  Abhi Shelat},
  title        = {Micropayments for Decentralized Currencies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {332},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/332},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PassS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PassS16a,
  author       = {Rafael Pass and
                  Elaine Shi},
  title        = {FruitChains: {A} Fair Blockchain},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {916},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/916},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PassS16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PassS16b,
  author       = {Rafael Pass and
                  Elaine Shi},
  title        = {Hybrid Consensus: Efficient Consensus in the Permissionless Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {917},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/917},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PassS16b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PassSS16,
  author       = {Rafael Pass and
                  Lior Seeman and
                  Abhi Shelat},
  title        = {Analysis of the Blockchain Protocol in Asynchronous Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {454},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/454},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PassSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PassST16,
  author       = {Rafael Pass and
                  Elaine Shi and
                  Florian Tram{\`{e}}r},
  title        = {Formal Abstractions for Attested Execution Secure Processors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1027},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1027},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PassST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Patarin16,
  author       = {Jacques Patarin},
  title        = {Mirror Theory and Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {702},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/702},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Patarin16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Patarin16a,
  author       = {Jacques Patarin},
  title        = {Two Simple Composition Theorems with H-coefficients},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {956},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/956},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Patarin16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatarinN16,
  author       = {Jacques Patarin and
                  Val{\'{e}}rie Nachef},
  title        = {Commutativity, Associativity, and Public Key Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {171},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/171},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatarinN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatersonSU16,
  author       = {Maura B. Paterson and
                  Douglas R. Stinson and
                  Jalaj Upadhyay},
  title        = {Multi-prover Proof-of-Retrievability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {265},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/265},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatersonSU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatraSS16,
  author       = {Arpita Patra and
                  Pratik Sarkar and
                  Ajith Suresh},
  title        = {Fast Actively Secure {OT} Extension for Short Secrets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {940},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/940},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatraSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatranabisM16,
  author       = {Sikhar Patranabis and
                  Debdeep Mukhopadhyay},
  title        = {Identity-Based Key Aggregate Cryptosystem from Multilinear Maps},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {693},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/693},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatranabisM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatrickYGS16,
  author       = {Conor Patrick and
                  Bilgiday Yuce and
                  Nahid Farhady Ghalaty and
                  Patrick Schaumont},
  title        = {Lightweight Fault Attack Resistance in Software Using Intra-Instruction
                  Redundancy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {850},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/850},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/PatrickYGS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Peikert16,
  author       = {Chris Peikert},
  title        = {How (Not) to Instantiate Ring-LWE},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {351},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/351},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Peikert16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PeikertS16,
  author       = {Chris Peikert and
                  Sina Shiehian},
  title        = {Multi-Key {FHE} from LWE, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {196},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/196},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PeikertS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PengHCCCY16,
  author       = {Bo{-}Yuan Peng and
                  Yuan{-}Che Hsu and
                  Yu{-}Jia Chen and
                  Di{-}Chia Chueh and
                  Chen{-}Mou Cheng and
                  Bo{-}Yin Yang},
  title        = {Multi-core {FPGA} Implementation of {ECC} with Homogeneous Co-Z Coordinate
                  Representation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {909},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/909},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PengHCCCY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PerrinU16,
  author       = {L{\'{e}}o Perrin and
                  Aleksei Udovenko},
  title        = {Algebraic Insights into the Secret Feistel Network (Full version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {398},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/398},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PerrinU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PerrinUB16,
  author       = {L{\'{e}}o Perrin and
                  Aleksei Udovenko and
                  Alex Biryukov},
  title        = {Cryptanalysis of a Theorem: Decomposing the Only Known Solution to
                  the Big {APN} Problem (Full Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {539},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/539},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PerrinUB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PetzoldtDW16,
  author       = {Albrecht Petzoldt and
                  Jintai Ding and
                  Lih{-}Chung Wang},
  title        = {Eliminating Decryption Failures from the Simple Matrix Encryption
                  Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {10},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/010},
  timestamp    = {Mon, 30 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/PetzoldtDW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Peyrin16,
  author       = {Thomas Peyrin},
  title        = {Collision Attack on {GRINDAHL}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {295},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/295},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Peyrin16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PhalakarnPS16,
  author       = {Kittiphop Phalakarn and
                  Kittiphon Phalakarn and
                  Vorapong Suppakitpaisarn},
  title        = {Parallelized Side-Channel Attack Resisted Scalar Multiplication Using
                  q-Based Addition-Subtraction k-chains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {899},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/899},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PhalakarnPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PhongWANB16,
  author       = {Le Trieu Phong and
                  Lihua Wang and
                  Yoshinori Aono and
                  Manh Ha Nguyen and
                  Xavier Boyen},
  title        = {Proxy Re-Encryption Schemes with Key Privacy from {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {327},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/327},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PhongWANB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Piedra16,
  author       = {Antonio de la Piedra},
  title        = {Beyond the selective disclosure of ABCs on RAM-constrained devices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {31},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/031},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Piedra16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PierrotW16,
  author       = {C{\'{e}}cile Pierrot and
                  Benjamin Wesolowski},
  title        = {Malleability of the blockchain's entropy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {370},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/370},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PierrotW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PietrzakS16,
  author       = {Krzysztof Pietrzak and
                  Maciej Skorski},
  title        = {Pseudoentropy: Lower-bounds for Chain rules and Transformations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {159},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/159},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PietrzakS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Pinkas0Z16,
  author       = {Benny Pinkas and
                  Thomas Schneider and
                  Michael Zohner},
  title        = {Scalable Private Set Intersection Based on {OT} Extension},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {930},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/930},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Pinkas0Z16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PinoLP16,
  author       = {Rafa{\"{e}}l Del Pino and
                  Vadim Lyubashevsky and
                  David Pointcheval},
  title        = {The Whole is Less than the Sum of its Parts: Constructing More Efficient
                  Lattice-Based AKEs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {435},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/435},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PinoLP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PiotrowskaHGDH16,
  author       = {Ania M. Piotrowska and
                  Jamie Hayes and
                  Nethanel Gelernter and
                  George Danezis and
                  Amir Herzberg},
  title        = {AnoNotify: {A} Private Notification Service},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {466},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/466},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PiotrowskaHGDH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PoddarBP16,
  author       = {Rishabh Poddar and
                  Tobias Boelter and
                  Raluca Ada Popa},
  title        = {Arx: {A} Strongly Encrypted Database System},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {591},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/591},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PoddarBP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PopaSHVZKB16,
  author       = {Raluca Ada Popa and
                  Emily Stark and
                  Jonas Helfer and
                  Steven Valdez and
                  Nickolai Zeldovich and
                  M. Frans Kaashoek and
                  Hari Balakrishnan},
  title        = {Building web applications on top of encrypted data using Mylar},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {893},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/893},
  timestamp    = {Fri, 05 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/PopaSHVZKB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Popov16,
  author       = {Serguei Popov},
  title        = {On a decentralized trustless pseudo-random number generation algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {228},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/228},
  timestamp    = {Sat, 26 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Popov16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Poppelen16,
  author       = {Alex van Poppelen},
  title        = {Cryptographic decoding of the Leech lattice},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1050},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1050},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Poppelen16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Poulakis16,
  author       = {Dimitrios Poulakis},
  title        = {New Lattice Attacks on {DSA} Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {58},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/058},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Poulakis16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PoussierSG16,
  author       = {Romain Poussier and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Vincent Grosso},
  title        = {Simple Key Enumeration (and Rank Estimation) using Histograms: an
                  Integrated Approach},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {571},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/571},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PoussierSG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PozoS16,
  author       = {Santos Merino Del Pozo and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Blind Source Separation from Single Measurements using Singular Spectrum
                  Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {314},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/314},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PozoS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PozoS16a,
  author       = {Santos Merino Del Pozo and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {A note on the security of threshold implementations with d+1 input
                  shares},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {420},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/420},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PozoS16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PulkusV16,
  author       = {J{\"{u}}rgen Pulkus and
                  Srinivas Vivek},
  title        = {Reducing the Number of Non-linear Multiplications in Masking Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {831},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/831},
  timestamp    = {Mon, 11 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/PulkusV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/QinC16,
  author       = {Lingyue Qin and
                  Huaifeng Chen},
  title        = {Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-guessing
                  Techniques},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {66},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/066},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/QinC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RabaninejadADM16,
  author       = {Reyhaneh Rabaninejad and
                  Mohammad Hassan Ameri and
                  Mahshid Delavar and
                  Javad Mohajeri},
  title        = {An Attribute-Based Anonymous Broadcast Encryption Scheme with Adaptive
                  Security in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1086},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1086},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RabaninejadADM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ramanna16,
  author       = {Somindu C. Ramanna},
  title        = {More Efficient Constructions for Inner-Product Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {356},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/356},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ramanna16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RashidiSF16,
  author       = {Bahram Rashidi and
                  Sayed Masoud Sayedi and
                  Reza Rezaeian Farashahi},
  title        = {High-speed {VLSI} implementation of Digit-serial Gaussian normal basis
                  Multiplication over GF(2m)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {966},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/966},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RashidiSF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RasoolzadehR16,
  author       = {Shahram Rasoolzadeh and
                  H{\aa}vard Raddum},
  title        = {Multidimensional Meet in the Middle Cryptanalysis of {KATAN}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {77},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/077},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RasoolzadehR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RasoolzadehR16a,
  author       = {Shahram Rasoolzadeh and
                  H{\aa}vard Raddum},
  title        = {Cryptanalysis of {PRINCE} with Minimal Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {80},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/080},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RasoolzadehR16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RasoolzadehR16b,
  author       = {Shahram Rasoolzadeh and
                  H{\aa}vard Raddum},
  title        = {Cryptanalysis of 6-round {PRINCE} using 2 Known Plaintexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {132},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/132},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RasoolzadehR16b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RasoolzadehR16c,
  author       = {Shahram Rasoolzadeh and
                  H{\aa}vard Raddum},
  title        = {Faster Key Recovery Attack on Round-Reduced {PRINCE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {828},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/828},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RasoolzadehR16c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Raz16,
  author       = {Ran Raz},
  title        = {Fast Learning Requires Good Memory: {A} Time-Space Lower Bound for
                  Parity Learning},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {170},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/170},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Raz16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RenD16,
  author       = {Ling Ren and
                  Srinivas Devadas},
  title        = {Proof of Space from Stacked Bipartite Graphs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {333},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/333},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RenD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RenesSSB16,
  author       = {Joost Renes and
                  Peter Schwabe and
                  Benjamin Smith and
                  Lejla Batina},
  title        = {{\textbackslash}({\textbackslash}mu{\textbackslash})Kummer: efficient
                  hyperelliptic signatures and key exchange on microcontrollers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {366},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/366},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RenesSSB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Reparaz16,
  author       = {Oscar Reparaz},
  title        = {Detecting flawed masking schemes with leakage detection tests},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {282},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/282},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Reparaz16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ReparazBV16,
  author       = {Oscar Reparaz and
                  Josep Balasch and
                  Ingrid Verbauwhede},
  title        = {Dude, is my code constant time?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1123},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1123},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ReparazBV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ReyhanitabarVV16,
  author       = {Reza Reyhanitabar and
                  Serge Vaudenay and
                  Damian Viz{\'{a}}r},
  title        = {Authenticated Encryption with Variable Stretch},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {463},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/463},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ReyhanitabarVV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ReyzinMCI16,
  author       = {Leonid Reyzin and
                  Dmitry Meshkov and
                  Alexander Chepurnoy and
                  Sasha Ivanov},
  title        = {Improving Authenticated Dynamic Dictionaries, with Applications to
                  Cryptocurrencies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {994},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/994},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ReyzinMCI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RindalR16,
  author       = {Peter Rindal and
                  Mike Rosulek},
  title        = {Faster Malicious 2-party Secure Computation with Online/Ofine Dual
                  Execution},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {632},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/632},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RindalR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RindalR16a,
  author       = {Peter Rindal and
                  Mike Rosulek},
  title        = {Improved Private Set Intersection against Malicious Adversaries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {746},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/746},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RindalR16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RivestS16,
  author       = {Ronald L. Rivest and
                  Jacob C. N. Schuldt},
  title        = {Spritz - a spongy RC4-like stream cipher and hash function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {856},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/856},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RivestS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RonenOSW16,
  author       = {Eyal Ronen and
                  Colin O'Flynn and
                  Adi Shamir and
                  Achi{-}Or Weingarten},
  title        = {IoT Goes Nuclear: Creating a ZigBee Chain Reaction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1047},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1047},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RonenOSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ronjom16,
  author       = {Sondre R{\o}njom},
  title        = {Invariant subspaces in Simpira},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {248},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/248},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ronjom16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RosenSS16,
  author       = {Alon Rosen and
                  Gil Segev and
                  Ido Shahaf},
  title        = {Can {PPAD} Hardness be Based on Standard Cryptographic Assumptions?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {375},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/375},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RosenSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RoyBPMG16,
  author       = {Debapriya Basu Roy and
                  Shivam Bhasin and
                  Sikhar Patranabis and
                  Debdeep Mukhopadhyay and
                  Sylvain Guilley},
  title        = {What Lies Ahead: Extending {TVLA} Testing Methodology Towards Success
                  Rate},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1152},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1152},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RoyBPMG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RoyM16,
  author       = {Dibyendu Roy and
                  Sourav Mukhopadhyay},
  title        = {Fault analysis and weak key-IV attack on Sprout},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {207},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/207},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RoyM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RoyM16a,
  author       = {Dibyendu Roy and
                  Sourav Mukhopadhyay},
  title        = {Some results on {ACORN}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1132},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1132},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RoyM16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Rozic0MV16,
  author       = {Vladimir Rozic and
                  Bohan Yang and
                  Nele Mentens and
                  Ingrid Verbauwhede},
  title        = {Canary Numbers: Design for Light-weight Online Testability of True
                  Random Number Generators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {386},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/386},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Rozic0MV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RuffingMK16,
  author       = {Tim Ruffing and
                  Pedro Moreno{-}Sanchez and
                  Aniket Kate},
  title        = {{P2P} Mixing and Unlinkable Bitcoin Transactions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {824},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/824},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RuffingMK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ruhrmair16,
  author       = {Ulrich R{\"{u}}hrmair},
  title        = {On the Security of {PUF} Protocols under Bad PUFs and PUFs-inside-PUFs
                  Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {322},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/322},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ruhrmair16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Russell0YZ16,
  author       = {Alexander Russell and
                  Qiang Tang and
                  Moti Yung and
                  Hong{-}Sheng Zhou},
  title        = {Destroying Steganography via Amalgamation: Kleptographically {CPA}
                  Secure Public Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {530},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/530},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Russell0YZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ryabko16,
  author       = {Boris Ryabko},
  title        = {Information-Theoretical Analysis of Two Shannon's Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {429},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/429},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ryabko16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SaabRH16,
  author       = {Sami Saab and
                  Pankaj Rohatgi and
                  Craig Hampel},
  title        = {Side-Channel Protections for Cryptographic Instruction Set Extensions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {700},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/700},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SaabRH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Saarinen16,
  author       = {Markku{-}Juhani O. Saarinen},
  title        = {Arithmetic Coding and Blinding Countermeasures for Ring-LWE},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {276},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/276},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Saarinen16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Saarinen16a,
  author       = {Markku{-}Juhani O. Saarinen},
  title        = {Ring-LWE Ciphertext Compression and Error Correction: Tools for Lightweight
                  Post-Quantum Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1058},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1058},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Saarinen16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SabtT16,
  author       = {Mohamed Sabt and
                  Jacques Traor{\'{e}}},
  title        = {Breaking Into the KeyStore: {A} Practical Forgery Attack Against Android
                  KeyStore},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {677},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/677},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SabtT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SadeghiMB16,
  author       = {Sadegh Sadeghi and
                  Tahere Mohammadi and
                  Nasour Bagheri},
  title        = {Cryptanalysis of Reduced round {SKINNY} Block Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1120},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1120},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SadeghiMB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SafkhaniB16,
  author       = {Masoumeh Safkhani and
                  Nasour Bagheri},
  title        = {Passive Secret Disclosure Attack on an Ultralightweight Authentication
                  Protocol for Internet of Things},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {838},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/838},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SafkhaniB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SafkhaniB16a,
  author       = {Masoumeh Safkhani and
                  Nasour Bagheri},
  title        = {Generalized Desynchronization Attack on {UMAP:} Application to RCIA,
                  KMAP, {SLAP} and SASI\({}^{\mbox{+}}\) protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {905},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/905},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SafkhaniB16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Saha16,
  author       = {Tanujay Saha},
  title        = {{TV-PUF} : {A} Fast Lightweight Analog Physically Unclonable Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {582},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/582},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Saha16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SahaC16,
  author       = {Dhiman Saha and
                  Dipanwita Roy Chowdhury},
  title        = {EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis
                  with a Case-Study on {PAEQ}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {623},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/623},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SahaC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SahaS16,
  author       = {Tanujay Saha and
                  Vikash Sehwag},
  title        = {{TV-PUF} : {A} Fast Lightweight Aging-Resistant Threshold Voltage
                  {PUF}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {774},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/774},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SahaS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SahooMCN16,
  author       = {Durga Prasad Sahoo and
                  Debdeep Mukhopadhyay and
                  Rajat Subhra Chakraborty and
                  Phuong Ha Nguyen},
  title        = {A Multiplexer based Arbiter {PUF} Composition with Enhanced Reliability
                  and Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1031},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1031},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SahooMCN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SahooNCM16,
  author       = {Durga Prasad Sahoo and
                  Phuong Ha Nguyen and
                  Rajat Subhra Chakraborty and
                  Debdeep Mukhopadhyay},
  title        = {Architectural Bias: a Novel Statistical Metric to Evaluate Arbiter
                  {PUF} Variants},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {57},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/057},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SahooNCM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SahooPMC16,
  author       = {Durga Prasad Sahoo and
                  Sikhar Patranabis and
                  Debdeep Mukhopadhyay and
                  Rajat Subhra Chakraborty},
  title        = {Fault Tolerant Implementations of Delay-based Physically Unclonable
                  Functions on {FPGA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {441},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/441},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SahooPMC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SakaiAH16,
  author       = {Yusuke Sakai and
                  Nuttapong Attrapadung and
                  Goichiro Hanaoka},
  title        = {Attribute-Based Signatures for Circuits from Bilinear Map},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {242},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/242},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SakaiAH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SalamBDPSW16,
  author       = {Md. Iftekhar Salam and
                  Harry Bartlett and
                  Ed Dawson and
                  Josef Pieprzyk and
                  Leonie Simpson and
                  Kenneth Koon{-}Ho Wong},
  title        = {Investigating Cube Attacks on the Authenticated Encryption Stream
                  Cipher {ACORN}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {743},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/743},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SalamBDPSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SamajderS16,
  author       = {Subhabrata Samajder and
                  Palash Sarkar},
  title        = {A New Test Statistic for Key Recovery Attacks Using Multiple Linear
                  Approximations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {404},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/404},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SamajderS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SamajderS16a,
  author       = {Subhabrata Samajder and
                  Palash Sarkar},
  title        = {Multiple Differential Cryptanalysis: {A} Rigorous Analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {405},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/405},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SamajderS16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SamajderS16b,
  author       = {Subhabrata Samajder and
                  Palash Sarkar},
  title        = {Can Large Deviation Theory be Used for Estimating Data Complexity?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {465},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/465},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SamajderS16b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SamardjiskaG16,
  author       = {Simona Samardjiska and
                  Danilo Gligoroski},
  title        = {An Encryption Scheme based on Random Split of St-Gen Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {202},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/202},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SamardjiskaG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Samid16,
  author       = {Gideon Samid},
  title        = {T-Proof: Secure Communication via Non-Algorithmic Randomization},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {474},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/474},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Samid16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Samid16a,
  author       = {Gideon Samid},
  title        = {Drone Targeted Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {499},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/499},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Samid16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Samid16b,
  author       = {Gideon Samid},
  title        = {Cyber Passport: Preventing Massive Identity Theft},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {627},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/627},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Samid16b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Sarkar016,
  author       = {Palash Sarkar and
                  Shashank Singh},
  title        = {Tower Number Field Sieve Variant of a Recent Polynomial Selection
                  Method},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {401},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/401},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Sarkar016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Sarkar016a,
  author       = {Palash Sarkar and
                  Shashank Singh},
  title        = {A General Polynomial Selection Method and New Asymptotic Complexities
                  for the Tower Number Field Sieve Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {485},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/485},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Sarkar016a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Sarkar016b,
  author       = {Palash Sarkar and
                  Shashank Singh},
  title        = {A Generalisation of the Conjugation Method for Polynomial Selection
                  for the Extended Tower Number Field Sieve Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {537},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/537},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Sarkar016b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SarkarS16,
  author       = {Sumanta Sarkar and
                  Siang Meng Sim},
  title        = {A deeper understanding of the {XOR} count distribution in the context
                  of lightweight cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {422},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/422},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SarkarS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SarkarS16a,
  author       = {Sumanta Sarkar and
                  Habeeb Syed},
  title        = {Lightweight Diffusion Layer: Importance of Toeplitz Matrices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {835},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/835},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SarkarS16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SasakiT16,
  author       = {Yu Sasaki and
                  Yosuke Todo},
  title        = {New Impossible Differential Search Tool from Design and Cryptanalysis
                  Aspects},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1181},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1181},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SasakiT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SasdrichG16,
  author       = {Pascal Sasdrich and
                  Tim G{\"{u}}neysu},
  title        = {Closing the Gap in {RFC} 7748: Implementing Curve448 in Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {352},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/352},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SasdrichG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SasdrichMG16,
  author       = {Pascal Sasdrich and
                  Amir Moradi and
                  Tim G{\"{u}}neysu},
  title        = {White-Box Cryptography in the Gray Box - {A} Hardware Implementation
                  and its Side Channels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {203},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/203},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SasdrichMG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SasdrichMG16a,
  author       = {Pascal Sasdrich and
                  Amir Moradi and
                  Tim G{\"{u}}neysu},
  title        = {Hiding Higher-Order Side-Channel Leakage - Randomizing Cryptographic
                  Implementations in Reconfigurable Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1111},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1111},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SasdrichMG16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ScerriS16,
  author       = {Guillaume Scerri and
                  Ryan Stanley{-}Oakes},
  title        = {Analysis of Key Wrapping APIs: Generic Policies, Computational Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {433},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/433},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ScerriS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SchabhuserDB16,
  author       = {Lucas Schabh{\"{u}}ser and
                  Denise Demirel and
                  Johannes Buchmann},
  title        = {An Unconditionally Hiding Auditing Procedure for Multi-Party Computations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {546},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/546},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SchabhuserDB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SchaubBHB16,
  author       = {Alexander Schaub and
                  R{\'{e}}mi Bazin and
                  Omar Hasan and
                  Lionel Brunie},
  title        = {A trustless privacy-preserving reputation system},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {16},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/016},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SchaubBHB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Schneider0G16,
  author       = {Tobias Schneider and
                  Amir Moradi and
                  Tim G{\"{u}}neysu},
  title        = {ParTI - Towards Combined Hardware Countermeasures against Side-Channel
                  and Fault-Injection Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {648},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/648},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Schneider0G16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SchneiderMSG16,
  author       = {Tobias Schneider and
                  Amir Moradi and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Tim G{\"{u}}neysu},
  title        = {Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation
                  beyond Gaussian Templates and Histograms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {719},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/719},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SchneiderMSG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SchwabeS16,
  author       = {Peter Schwabe and
                  Ko Stoffelen},
  title        = {All the {AES} You Need on Cortex-M3 and {M4}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {714},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/714},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SchwabeS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Schwenk16,
  author       = {J{\"{o}}rg Schwenk},
  title        = {Nonce-based Kerberos is a Secure Delegated {AKE} Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {219},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/219},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Schwenk16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Scott16,
  author       = {Mike Scott},
  title        = {A Novel Multi-factor ID-based Designated Verifier Signature scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1151},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1151},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Scott16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SeijasTM16,
  author       = {Pablo Lamela Seijas and
                  Simon J. Thompson and
                  Darryl McAdams},
  title        = {Scripting smart contracts for distributed ledger technology},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1156},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1156},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SeijasTM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SelvamSAR16,
  author       = {Ravikumar Selvam and
                  Dillibabu Shanmugam and
                  Suganya Annadurai and
                  Jothi Rangasamy},
  title        = {Decomposed S-Boxes and {DPA} Attacks: {A} Quantitative Case Study
                  using {PRINCE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {630},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/630},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SelvamSAR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Semaev16,
  author       = {Igor A. Semaev},
  title        = {On low degree polynomials in 2-round {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {141},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/141},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Semaev16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Sha16,
  author       = {Tanujay Sha},
  title        = {A Generalized Ideal Secret Sharing Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {929},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/929},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Sha16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics