Search dblp for Publications

export results for "toc:db/journals/joc/joc24.bht:"

 download as .bib file

@article{DBLP:journals/joc/AbdallaBCDMNSS11,
  author       = {Michel Abdalla and
                  James Birkett and
                  Dario Catalano and
                  Alexander W. Dent and
                  John Malone{-}Lee and
                  Gregory Neven and
                  Jacob C. N. Schuldt and
                  Nigel P. Smart},
  title        = {Wildcarded Identity-Based Encryption},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {1},
  pages        = {42--82},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-010-9060-3},
  doi          = {10.1007/S00145-010-9060-3},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/AbdallaBCDMNSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AsharovL11,
  author       = {Gilad Asharov and
                  Yehuda Lindell},
  title        = {Utility Dependence in Correct and Fair Rational Secret Sharing},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {1},
  pages        = {157--202},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-010-9064-z},
  doi          = {10.1007/S00145-010-9064-Z},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/AsharovL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BarakCLPR11,
  author       = {Boaz Barak and
                  Ran Canetti and
                  Yehuda Lindell and
                  Rafael Pass and
                  Tal Rabin},
  title        = {Secure Computation Without Authentication},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {4},
  pages        = {720--760},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-010-9075-9},
  doi          = {10.1007/S00145-010-9075-9},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BarakCLPR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BatinaGPRSV11,
  author       = {Lejla Batina and
                  Benedikt Gierlichs and
                  Emmanuel Prouff and
                  Matthieu Rivain and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Nicolas Veyrat{-}Charvillon},
  title        = {Mutual Information Analysis: a Comprehensive Study},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {2},
  pages        = {269--291},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-010-9084-8},
  doi          = {10.1007/S00145-010-9084-8},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BatinaGPRSV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BaudetLMT11,
  author       = {Mathieu Baudet and
                  David Lubicz and
                  Julien Micolod and
                  Andr{\'{e}} Tassiaux},
  title        = {On the Security of Oscillator-Based Random Number Generators},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {2},
  pages        = {398--425},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-010-9089-3},
  doi          = {10.1007/S00145-010-9089-3},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BaudetLMT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BonehB11,
  author       = {Dan Boneh and
                  Xavier Boyen},
  title        = {Efficient Selective Identity-Based Encryption Without Random Oracles},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {4},
  pages        = {659--693},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-010-9078-6},
  doi          = {10.1007/S00145-010-9078-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BonehB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/CanettiH11,
  author       = {Ran Canetti and
                  Jonathan Herzog},
  title        = {Universally Composable Symbolic Security Analysis},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {1},
  pages        = {83--147},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-009-9055-0},
  doi          = {10.1007/S00145-009-9055-0},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/CanettiH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/CanivetMLCVR11,
  author       = {Gaetan Canivet and
                  Paolo Maistri and
                  R{\'{e}}gis Leveugle and
                  Jessy Cl{\'{e}}di{\`{e}}re and
                  Florent Valette and
                  Marc Renaudin},
  title        = {Glitch and Laser Fault Attacks onto a Secure {AES} Implementation
                  on a SRAM-Based {FPGA}},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {2},
  pages        = {247--268},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-010-9083-9},
  doi          = {10.1007/S00145-010-9083-9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/CanivetMLCVR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Dominguez-OviedoHA11,
  author       = {Agustin Dominguez{-}Oviedo and
                  M. Anwar Hasan and
                  Bijan Ansari},
  title        = {Fault-Based Attack on Montgomery's Ladder Algorithm},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {2},
  pages        = {346--374},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-010-9087-5},
  doi          = {10.1007/S00145-010-9087-5},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Dominguez-OviedoHA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/EngeGT11,
  author       = {Andreas Enge and
                  Pierrick Gaudry and
                  Emmanuel Thom{\'{e}}},
  title        = {An \emph{L}(1/3) Discrete Logarithm Algorithm for Low Degree Curves},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {1},
  pages        = {24--41},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-010-9057-y},
  doi          = {10.1007/S00145-010-9057-Y},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/EngeGT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/FischlinF11,
  author       = {Marc Fischlin and
                  Roger Fischlin},
  title        = {Efficient Non-Malleable Commitment Schemes},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {1},
  pages        = {203--244},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-009-9043-4},
  doi          = {10.1007/S00145-009-9043-4},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/FischlinF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/GalbraithLS11,
  author       = {Steven D. Galbraith and
                  Xibin Lin and
                  Michael Scott},
  title        = {Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class
                  of Curves},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {3},
  pages        = {446--469},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-010-9065-y},
  doi          = {10.1007/S00145-010-9065-Y},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/GalbraithLS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/GarayMPY11,
  author       = {Juan A. Garay and
                  Philip D. MacKenzie and
                  Manoj Prabhakaran and
                  Ke Yang},
  title        = {Resource Fairness and Composability of Cryptographic Protocols},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {4},
  pages        = {615--658},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-010-9080-z},
  doi          = {10.1007/S00145-010-9080-Z},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/GarayMPY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/GrasslIMS11,
  author       = {Markus Grassl and
                  Ivana Ilic and
                  Spyros S. Magliveras and
                  Rainer Steinwandt},
  title        = {Cryptanalysis of the Tillich-Z{\'{e}}mor Hash Function},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {1},
  pages        = {148--156},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-010-9063-0},
  doi          = {10.1007/S00145-010-9063-0},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/GrasslIMS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/HellJ11,
  author       = {Martin Hell and
                  Thomas Johansson},
  title        = {Breaking the Stream Ciphers {F-FCSR-H} and {F-FCSR-16} in Real Time},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {3},
  pages        = {427--445},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-009-9053-2},
  doi          = {10.1007/S00145-009-9053-2},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/HellJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Hofheinz11,
  author       = {Dennis Hofheinz},
  title        = {Possibility and Impossibility Results for Selective Decommitments},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {3},
  pages        = {470--516},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-010-9066-x},
  doi          = {10.1007/S00145-010-9066-X},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Hofheinz11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/HohenbergerRSV11,
  author       = {Susan Hohenberger and
                  Guy N. Rothblum and
                  Abhi Shelat and
                  Vinod Vaikuntanathan},
  title        = {Securely Obfuscating Re-Encryption},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {4},
  pages        = {694--719},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-010-9077-7},
  doi          = {10.1007/S00145-010-9077-7},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/HohenbergerRSV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/IndesteegeP11,
  author       = {Sebastiaan Indesteege and
                  Bart Preneel},
  title        = {Practical Collisions for EnRUPT},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {1},
  pages        = {1--23},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-010-9058-x},
  doi          = {10.1007/S00145-010-9058-X},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/IndesteegeP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KidronL11,
  author       = {Dafna Kidron and
                  Yehuda Lindell},
  title        = {Impossibility Results for Universal Composability in Public-Key Models
                  and with Fixed Inputs},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {3},
  pages        = {517--544},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-010-9069-7},
  doi          = {10.1007/S00145-010-9069-7},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/KidronL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/LindellZ11,
  author       = {Yehuda Lindell and
                  Hila Zarosim},
  title        = {Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {4},
  pages        = {761--799},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-010-9072-z},
  doi          = {10.1007/S00145-010-9072-Z},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/LindellZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/LiskovRW11,
  author       = {Moses D. Liskov and
                  Ronald L. Rivest and
                  David A. Wagner},
  title        = {Tweakable Block Ciphers},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {3},
  pages        = {588--613},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-010-9073-y},
  doi          = {10.1007/S00145-010-9073-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/LiskovRW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/MaitiS11,
  author       = {Abhranil Maiti and
                  Patrick Schaumont},
  title        = {Improved Ring Oscillator {PUF:} An FPGA-friendly Secure Primitive},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {2},
  pages        = {375--397},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-010-9088-4},
  doi          = {10.1007/S00145-010-9088-4},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/MaitiS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/MonneratV11,
  author       = {Jean Monnerat and
                  Serge Vaudenay},
  title        = {Short Undeniable Signatures Based on Group Homomorphisms},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {3},
  pages        = {545--587},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-010-9070-1},
  doi          = {10.1007/S00145-010-9070-1},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/MonneratV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/NikovaRS11,
  author       = {Svetla Nikova and
                  Vincent Rijmen and
                  Martin Schl{\"{a}}ffer},
  title        = {Secure Hardware Implementation of Nonlinear Functions in the Presence
                  of Glitches},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {2},
  pages        = {292--321},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-010-9085-7},
  doi          = {10.1007/S00145-010-9085-7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/NikovaRS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/PaarQS11,
  author       = {Christof Paar and
                  Jean{-}Jacques Quisquater and
                  Berk Sunar},
  title        = {Guest Editorial},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {2},
  pages        = {245--246},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-011-9099-9},
  doi          = {10.1007/S00145-011-9099-9},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/PaarQS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/PoschmannMKLWL11,
  author       = {Axel Poschmann and
                  Amir Moradi and
                  Khoongming Khoo and
                  Chu{-}Wee Lim and
                  Huaxiong Wang and
                  San Ling},
  title        = {Side-Channel Resistant Crypto for Less than 2, 300 {GE}},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {2},
  pages        = {322--345},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-010-9086-6},
  doi          = {10.1007/S00145-010-9086-6},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/PoschmannMKLWL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics