Search dblp for Publications

export results for "toc:db/journals/joc/joc32.bht:"

 download as .bib file

@article{DBLP:journals/joc/AbdallaBP19,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  David Pointcheval},
  title        = {On the Tightness of Forward-Secure Signature Reductions},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {1},
  pages        = {84--150},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9283-2},
  doi          = {10.1007/S00145-018-9283-2},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/AbdallaBP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AbeCDD19,
  author       = {Masayuki Abe and
                  Jan Camenisch and
                  Rafael Dowsley and
                  Maria Dubovitskaya},
  title        = {On the Impossibility of Structure-Preserving Deterministic Primitives},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {1},
  pages        = {239--264},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9292-1},
  doi          = {10.1007/S00145-018-9292-1},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/AbeCDD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AbeGKOT19,
  author       = {Masayuki Abe and
                  Jens Groth and
                  Markulf Kohlweiss and
                  Miyako Ohkubo and
                  Mehdi Tibouchi},
  title        = {Efficient Fully Structure-Preserving Signatures and Shrinking Commitments},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {3},
  pages        = {973--1025},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9300-5},
  doi          = {10.1007/S00145-018-9300-5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/AbeGKOT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BaiGLS19,
  author       = {Shi Bai and
                  Steven D. Galbraith and
                  Liangze Li and
                  Daniel Sheffield},
  title        = {Improved Combinatorial Algorithms for the Inhomogeneous Short Integer
                  Solution Problem},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {1},
  pages        = {35--83},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9304-1},
  doi          = {10.1007/S00145-018-9304-1},
  timestamp    = {Tue, 30 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BaiGLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BarbulescuD19,
  author       = {Razvan Barbulescu and
                  Sylvain Duquesne},
  title        = {Updating Key Size Estimations for Pairings},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {4},
  pages        = {1298--1336},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9280-5},
  doi          = {10.1007/S00145-018-9280-5},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BarbulescuD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BartheFFMSS19,
  author       = {Gilles Barthe and
                  Edvard Fagerholm and
                  Dario Fiore and
                  John C. Mitchell and
                  Andre Scedrov and
                  Benedikt Schmidt},
  title        = {Automated Analysis of Cryptographic Assumptions in Generic Group Models},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {2},
  pages        = {324--360},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9302-3},
  doi          = {10.1007/S00145-018-9302-3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BartheFFMSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BermanHKN19,
  author       = {Itay Berman and
                  Iftach Haitner and
                  Ilan Komargodski and
                  Moni Naor},
  title        = {Hardness-Preserving Reductions via Cuckoo Hashing},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {2},
  pages        = {361--392},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9293-0},
  doi          = {10.1007/S00145-018-9293-0},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BermanHKN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BernardHFN19,
  author       = {Florent Bernard and
                  Patrick Haddad and
                  Viktor Fischer and
                  Jean Nicolai},
  title        = {From Physical to Stochastic Modeling of a TERO-Based {TRNG}},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {2},
  pages        = {435--458},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9291-2},
  doi          = {10.1007/S00145-018-9291-2},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BernardHFN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BockBBHMMGTT19,
  author       = {Estuardo Alpirez Bock and
                  Joppe W. Bos and
                  Chris Brzuska and
                  Charles Hubain and
                  Wil Michiels and
                  Cristofaro Mune and
                  Eloi Sanfelix Gonzalez and
                  Philippe Teuwen and
                  Alexander Treff},
  title        = {White-Box Cryptography: Don't Forget About Grey-Box Attacks},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {4},
  pages        = {1095--1143},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-019-09315-1},
  doi          = {10.1007/S00145-019-09315-1},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BockBBHMMGTT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BrassardHKKLS19,
  author       = {Gilles Brassard and
                  Peter H{\o}yer and
                  Kassem Kalach and
                  Marc Kaplan and
                  Sophie Laplante and
                  Louis Salvail},
  title        = {Key Establishment {\`{a}} la Merkle in a Quantum World},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {3},
  pages        = {601--634},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-019-09317-z},
  doi          = {10.1007/S00145-019-09317-Z},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BrassardHKKLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Chaigneau0GJR19,
  author       = {Colin Chaigneau and
                  Thomas Fuhr and
                  Henri Gilbert and
                  J{\'{e}}r{\'{e}}my Jean and
                  Jean{-}Ren{\'{e}} Reinhard},
  title        = {Cryptanalysis of {NORX} v2.0},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {4},
  pages        = {1423--1447},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9297-9},
  doi          = {10.1007/S00145-018-9297-9},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Chaigneau0GJR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/CheonHLRS19,
  author       = {Jung Hee Cheon and
                  Kyoohyung Han and
                  Changmin Lee and
                  Hansol Ryu and
                  Damien Stehl{\'{e}}},
  title        = {Cryptanalysis of the {CLT13} Multilinear Map},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {2},
  pages        = {547--565},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9307-y},
  doi          = {10.1007/S00145-018-9307-Y},
  timestamp    = {Fri, 26 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/CheonHLRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/ChoiKSYZ19,
  author       = {Seung Geol Choi and
                  Jonathan Katz and
                  Dominique Schr{\"{o}}der and
                  Arkady Yerukhimovich and
                  Hong{-}Sheng Zhou},
  title        = {(Efficient) Universally Composable Oblivious Transfer Using a Minimal
                  Number of Stateless Tokens},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {2},
  pages        = {459--497},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9288-x},
  doi          = {10.1007/S00145-018-9288-X},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/ChoiKSYZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/CohenCGZ19,
  author       = {Ran Cohen and
                  Sandro Coretti and
                  Juan A. Garay and
                  Vassilis Zikas},
  title        = {Probabilistic Termination and Composability of Cryptographic Protocols},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {3},
  pages        = {690--741},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9279-y},
  doi          = {10.1007/S00145-018-9279-Y},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/CohenCGZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Dachman-SoledGL19,
  author       = {Dana Dachman{-}Soled and
                  S. Dov Gordon and
                  Feng{-}Hao Liu and
                  Adam O'Neill and
                  Hong{-}Sheng Zhou},
  title        = {Leakage Resilience from Program Obfuscation},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {3},
  pages        = {742--824},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9286-z},
  doi          = {10.1007/S00145-018-9286-Z},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Dachman-SoledGL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Dachman-SoledLP19,
  author       = {Dana Dachman{-}Soled and
                  Chang Liu and
                  Charalampos Papamanthou and
                  Elaine Shi and
                  Uzi Vishkin},
  title        = {Oblivious Network {RAM} and Leveraging Parallelism to Achieve Obliviousness},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {3},
  pages        = {941--972},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9301-4},
  doi          = {10.1007/S00145-018-9301-4},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Dachman-SoledLP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/DinurDKS19,
  author       = {Itai Dinur and
                  Orr Dunkelman and
                  Nathan Keller and
                  Adi Shamir},
  title        = {Efficient Dissection of Bicomposite Problems with Cryptanalytic Applications},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {4},
  pages        = {1448--1490},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9303-2},
  doi          = {10.1007/S00145-018-9303-2},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/DinurDKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/DucDF19,
  author       = {Alexandre Duc and
                  Stefan Dziembowski and
                  Sebastian Faust},
  title        = {Unifying Leakage Models: From Probing Attacks to Noisy Leakage},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {1},
  pages        = {151--177},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9284-1},
  doi          = {10.1007/S00145-018-9284-1},
  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/DucDF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/DucFS19,
  author       = {Alexandre Duc and
                  Sebastian Faust and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Making Masking Security Proofs Concrete (Or How to Evaluate the Security
                  of Any Leaking Device), Extended Version},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {4},
  pages        = {1263--1297},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9277-0},
  doi          = {10.1007/S00145-018-9277-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/DucFS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/FleischhackerJS19,
  author       = {Nils Fleischhacker and
                  Tibor Jager and
                  Dominique Schr{\"{o}}der},
  title        = {On Tight Security Proofs for Schnorr Signatures},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {2},
  pages        = {566--599},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-019-09311-5},
  doi          = {10.1007/S00145-019-09311-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/FleischhackerJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/FuchsbauerHS19,
  author       = {Georg Fuchsbauer and
                  Christian Hanser and
                  Daniel Slamanig},
  title        = {Structure-Preserving Signatures on Equivalence Classes and Constant-Size
                  Anonymous Credentials},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {2},
  pages        = {498--546},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9281-4},
  doi          = {10.1007/S00145-018-9281-4},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/FuchsbauerHS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/HazayMRTN19,
  author       = {Carmit Hazay and
                  Gert L{\ae}ss{\o}e Mikkelsen and
                  Tal Rabin and
                  Tomas Toft and
                  Angelo Agatino Nicolosi},
  title        = {Efficient {RSA} Key Generation and Threshold Paillier in the Two-Party
                  Setting},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {2},
  pages        = {265--323},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-017-9275-7},
  doi          = {10.1007/S00145-017-9275-7},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/HazayMRTN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/HazayV19,
  author       = {Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {On Black-Box Complexity of Universally Composable Security in the
                  {CRS} Model},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {3},
  pages        = {635--689},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-019-09326-y},
  doi          = {10.1007/S00145-019-09326-Y},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/HazayV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/HazayV19a,
  author       = {Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {What Security Can We Achieve Within 4 Rounds?},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {4},
  pages        = {1200--1262},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-019-09323-1},
  doi          = {10.1007/S00145-019-09323-1},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/HazayV19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/HazayY19,
  author       = {Carmit Hazay and
                  Avishay Yanai},
  title        = {Constant-Round Maliciously Secure Two-Party Computation in the {RAM}
                  Model},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {4},
  pages        = {1144--1199},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-019-09321-3},
  doi          = {10.1007/S00145-019-09321-3},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/HazayY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/HermelinCN19,
  author       = {Miia Hermelin and
                  Joo Yeon Cho and
                  Kaisa Nyberg},
  title        = {Multidimensional Linear Cryptanalysis},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {1},
  pages        = {1--34},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9308-x},
  doi          = {10.1007/S00145-018-9308-X},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/HermelinCN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/JovanovicLMSY19,
  author       = {Philipp Jovanovic and
                  Atul Luykx and
                  Bart Mennink and
                  Yu Sasaki and
                  Kan Yasuda},
  title        = {Beyond Conventional Security in Sponge-Based Authenticated Encryption
                  Modes},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {3},
  pages        = {895--940},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9299-7},
  doi          = {10.1007/S00145-018-9299-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/JovanovicLMSY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Kiyoshima19,
  author       = {Susumu Kiyoshima},
  title        = {Round-Efficient Black-Box Construction of Composable Multi-Party Computation},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {1},
  pages        = {178--238},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9276-1},
  doi          = {10.1007/S00145-018-9276-1},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Kiyoshima19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Kiyoshima19a,
  author       = {Susumu Kiyoshima},
  title        = {Non-black-box Simulation in the Fully Concurrent Setting, Revisited},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {2},
  pages        = {393--434},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-09309-5},
  doi          = {10.1007/S00145-018-09309-5},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Kiyoshima19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/LacerdaRR19,
  author       = {Felipe Gomes Lacerda and
                  Joseph M. Renes and
                  Renato Renner},
  title        = {Classical Leakage Resilience from Fault-Tolerant Quantum Computation},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {4},
  pages        = {1071--1094},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-019-09310-6},
  doi          = {10.1007/S00145-019-09310-6},
  timestamp    = {Fri, 17 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/LacerdaRR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/LindellPSY19,
  author       = {Yehuda Lindell and
                  Benny Pinkas and
                  Nigel P. Smart and
                  Avishay Yanai},
  title        = {Efficient Constant-Round Multi-party Computation Combining {BMR} and
                  {SPDZ}},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {3},
  pages        = {1026--1069},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-019-09322-2},
  doi          = {10.1007/S00145-019-09322-2},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/LindellPSY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/OkamotoT19,
  author       = {Tatsuaki Okamoto and
                  Katsuyuki Takashima},
  title        = {Fully Secure Functional Encryption with a Large Class of Relations
                  from the Decisional Linear Assumption},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {4},
  pages        = {1491--1573},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9305-0},
  doi          = {10.1007/S00145-018-9305-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/OkamotoT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/OliveiraLCR19,
  author       = {Thomaz Oliveira and
                  Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez and
                  Daniel Cervantes{-}V{\'{a}}zquez and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {Koblitz Curves over Quadratic Fields},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {3},
  pages        = {867--894},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9294-z},
  doi          = {10.1007/S00145-018-9294-Z},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/OliveiraLCR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Takayasu0P19,
  author       = {Atsushi Takayasu and
                  Yao Lu and
                  Liqiang Peng},
  title        = {Small CRT-Exponent {RSA} Revisited},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {4},
  pages        = {1337--1382},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9282-3},
  doi          = {10.1007/S00145-018-9282-3},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Takayasu0P19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/TodoLS19,
  author       = {Yosuke Todo and
                  Gregor Leander and
                  Yu Sasaki},
  title        = {Nonlinear Invariant Attack: Practical Attack on Full SCREAM, iSCREAM,
                  and Midori64},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {4},
  pages        = {1383--1422},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9285-0},
  doi          = {10.1007/S00145-018-9285-0},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/TodoLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Zhandry19,
  author       = {Mark Zhandry},
  title        = {The Magic of ELFs},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {3},
  pages        = {825--866},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9289-9},
  doi          = {10.1007/S00145-018-9289-9},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Zhandry19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics